Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
Posted Jun 5, 2012 23:02 UTC (Tue) by russell (guest, #10458)Parent article: Fedora, secure boot, and an insecure future
I wish fedora would figure out who their users are. You can't be bleeding edge and for newbies all at the same time. In my opinion, it's just not working.
Posted Jun 5, 2012 23:19 UTC (Tue)
by dashesy (guest, #74652)
[Link]
I am reading this, and Samsung is one of the best hardware manufactures anyways, so if they apply "Your Freedom Respected" sticker suggested above, I do not need any other option.
Posted Jun 6, 2012 6:15 UTC (Wed)
by smurf (subscriber, #17840)
[Link] (4 responses)
One needs to distinguish between the initiall small bootloader, signed by M$/Verisign, and everything else, which will be signed by Fedora.
* store a list of hashes in the kernel, modules having that hash being forbidden to load.
* Use a sub-key for signing modules / the kernel; if buggy, revoke that subkey, distribute another one, distribute new signatures for non-affected parts of the system. This probably boils down to "don't trust any subkey created before <date>".
* Build a new mini-bootloader that only knows a new Fedora key, and install that. Ship new signatures for GRUB, the kernel, and all modules.
In none of these scenarios is there any possibility of the system being non-bootable – the running system can easily verify that there signature chain is unbroken before rebooting.
Posted Jun 6, 2012 6:51 UTC (Wed)
by neilbrown (subscriber, #359)
[Link] (3 responses)
Because the bootloader would have to contain Fedora's key, so it could verify the kernel that it was loading.
If the kernel is exploitable, then anything which trusts the key is exploitable, so the bootloader containing the key is exploitable, so the key which verifies it must be revoked.
Is that right?
Posted Jun 6, 2012 18:46 UTC (Wed)
by pjones (subscriber, #31722)
[Link] (2 responses)
Posted Jun 14, 2012 5:07 UTC (Thu)
by kevinm (guest, #69913)
[Link] (1 responses)
Posted Jun 14, 2012 12:03 UTC (Thu)
by mjg59 (subscriber, #23239)
[Link]
Posted Jun 6, 2012 19:03 UTC (Wed)
by daniels (subscriber, #16193)
[Link] (2 responses)
The option you always have is disabling secure boot, which means that in its very very worst case it's no better than not doing anything at all. In its best (and presumably overwhelmingly dominant) case then it's infinitely better.
I'm struggling to see the downside.
Posted Jun 9, 2012 0:28 UTC (Sat)
by wookey (guest, #5501)
[Link] (1 responses)
Posted Jun 9, 2012 1:27 UTC (Sat)
by raven667 (subscriber, #5198)
[Link]
If any key, I guess it would be the boot loader key that is revoked, assuming that it is the actual Fedora key purchased for 99$. In that case once a Windows security update is applied (changing BIOS perhaps) boot loader signature will not be valid anymore. If this is true, you cannot run Windows either (or maybe chainload is automatically triggered in such scenario ?).
Unless the revocation is only applied to newly manufactured hardware.
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
If some security-circumventing bug is found, there are a couple of options:
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future
Fedora, secure boot, and an insecure future