Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Posted Feb 4, 2013 21:37 UTC (Mon) by Aliasundercover (guest, #69009)Parent article: Garrett: Don't like Secure Boot? Don't buy a Chromebook
All this secure boot stuff lowers my security. My security was never the goal as secure boot is intended to serve the vendor's security at my expense.
Google's switch erasing all user data is a fine excuse for claiming you have the freedom to control your machine when actually doing so will inevitably eat up more time than the fool thing is worth.
Will normal people ever catch on to how their computers serve another master before them? Or did they always feel this way perceiving no net change as it becomes fact?
Posted Feb 4, 2013 22:03 UTC (Mon)
by rengolin (guest, #48414)
[Link] (17 responses)
Posted Feb 5, 2013 0:06 UTC (Tue)
by segedunum (guest, #60948)
[Link] (2 responses)
Posted Feb 5, 2013 9:02 UTC (Tue)
by khim (subscriber, #9252)
[Link]
Posted Feb 5, 2013 14:35 UTC (Tue)
by drag (guest, #31333)
[Link]
Or you can just buy hardware from a vendor that isn't a asshat. There are lots of ways to make sure your hardware is linux unfriendly. Taking advantage of secure boot is just one of them.
Posted Feb 5, 2013 14:18 UTC (Tue)
by drag (guest, #31333)
[Link] (13 responses)
Pfff. hyperbole.
You can use it to improve the security of your computer. Without the ability to have a secure way to check the checksums your kernel and it's kernel modules at boot up it's impossible to know if your system has been subverted by a LKM root kit.
Kernel-level root kits are not theoretical and are a real issue on Windows and on Linux. Both systems have kernel level root kits that are widely available and are in common use by attackers. You CANNOT depend on userland code, no matter how clever (aka rootkit detector or virus scanner) to verify the security of your system. Any attempts to 'recover' a compromised system is a exercise in abject folly and is one of the purest example of self-defeat you can find in the computer security world.
There are two ways I know of to effectively be able to check your system; One is to boot your system from external media or remove the drive. create a list of checksums of a known good state, and then periodically take your system off line to compare.
The other way is to have a secure boot mechanism.
Now I understand this form of 'secure boot' isn't perfect, but it's a good start.
Posted Feb 5, 2013 16:43 UTC (Tue)
by jedidiah (guest, #20319)
[Link] (3 responses)
Being put in a situation where you are forced to depend on the competence of Microsoft (or even Google) is just absurd. It's especially so when you are also forbidden from fending for yourself.
YOU are probably far more dependable in this area than Microsoft.
Posted Feb 5, 2013 17:44 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (2 responses)
This is a real system with real documentation and real implementations with real data so that we don't have to make blind suppositions based on nothing more than "MS sux".
Posted Feb 5, 2013 18:15 UTC (Tue)
by hummassa (subscriber, #307)
[Link] (1 responses)
One more thing: rootkits worth their salt know if the system is trying to checksum some blocks on disk, and return the original blocks for the checksummer program to check, even if the system used other, different blocks to load.
Posted Feb 5, 2013 18:18 UTC (Tue)
by hummassa (subscriber, #307)
[Link]
Posted Feb 5, 2013 18:11 UTC (Tue)
by hummassa (subscriber, #307)
[Link]
This is an error.
Even with the ability to have a way of checking the checksums of your kernel and modules, there are ways to subvert the kernel and force the loading of a (signed or unsigned) kernel-module-root-kit.
So, even WITH "the ability to have a secure way to check the checksums your kernel and its kernel modules at boot up", it's still "impossible to know if your system has been subverted by a LKM root kit".
Helping some software and hardware manufacturers to maintain dominance is the only thing secure boot tech is effective at.
> You CANNOT depend on userland code, no matter how clever (aka rootkit detector or virus scanner) to verify the security of your system.
That's the problem. Both Windows' kernels and Other OS's kernels depend heavily on userland code and data, and can be manipulated by userland code and data via exploits to load and execute kernelland code. Rootkits abound on all platforms and secure boot initiative never resist attacks long. Non-Windows examples are jailbreaking Apple products, rooting originally-non-rootable Androids, unlocking Sony PS3s, PSPs, among other products.
Honorable mention for resilience so far to AppleTVs model 3, which some people claim are jailbreakable, but the method to do so has not been disclosed publicly yet.
> There are two ways I know of to effectively be able to check your system; One is to boot your system from external media or remove the drive. create a list of checksums of a known good state, and then periodically take your system off line to compare.
How exactly do you know your "checksums of known good state" are really from a good state? once you start checksumming, the system can already be compromised. Other thing: even if you get to "ok, at this point you have to be at what I'll call a known good state", unless you checksum the whole contents of RAM, you don't have any way to know if you do not have an invisible kernel module lurking around somewhere in RAM. Even if your boot media is read-only, it can contain vulnerabilities that make it rootable soon-after-boot (like happens in thethered jailbreaks for Apple products).
> The other way is to have a secure boot mechanism.
Which, for all reasons above, is not an effective way to check it either.
> Now I understand this form of 'secure boot' isn't perfect, but it's a good start.
That is the point: it's not a good start, not only because it isn't worth a damn, but because the thing it *is* good at is "preventing non-technical people from installing another OS in the device or customizing from a certain, manufactured-decided, point on".
Example: Apple. Unless you jailbreak your device (which is fairly simple today, but once upon a time was an ordeal that could need the owner to open up her hardware) you can't change iPhone keyboard layouts or interactions, nor install AppleTV third-party programs, much less install Linux on your AppleTV (which works very well, thank you very much).
The funny part of this example is that jailbreaks normally work by exploiting some unsecured bug on the device's original firmware that could be exploited by malicious third parties. IOW: the security of "secure boot" leaves the devices MORE vulnerable to exploits.
Posted Feb 5, 2013 18:19 UTC (Tue)
by hummassa (subscriber, #307)
[Link] (7 responses)
One more thing: rootkits worth their salt know if the system is trying to checksum some blocks on disk, and return the original blocks for the checksummer program to check, even if the system used other, different blocks to load.
Posted Feb 5, 2013 19:22 UTC (Tue)
by dlang (guest, #313)
[Link] (6 responses)
Posted Feb 5, 2013 19:30 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (5 responses)
Posted Feb 5, 2013 21:49 UTC (Tue)
by hummassa (subscriber, #307)
[Link] (4 responses)
Posted Feb 5, 2013 22:12 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (3 responses)
Posted Feb 6, 2013 0:17 UTC (Wed)
by FranTaylor (guest, #80190)
[Link]
Posted Feb 7, 2013 4:10 UTC (Thu)
by paulj (subscriber, #341)
[Link] (1 responses)
Posted Feb 7, 2013 15:18 UTC (Thu)
by raven667 (subscriber, #5198)
[Link]
Posted Feb 4, 2013 23:00 UTC (Mon)
by zlynx (guest, #2285)
[Link] (11 responses)
Erasing data when disabling secure boot is something I *want* to happen. Otherwise something like a key logger can be installed without ever noticing it.
That (intercept and log the decryption passphrase) is a known attack on encrypted drives, so don't pretend it doesn't happen.
Posted Feb 4, 2013 23:45 UTC (Mon)
by jzb (editor, #7867)
[Link] (5 responses)
Posted Feb 4, 2013 23:57 UTC (Mon)
by mjg59 (subscriber, #23239)
[Link]
Posted Feb 5, 2013 0:00 UTC (Tue)
by segedunum (guest, #60948)
[Link] (3 responses)
VMware are going to be in for a bit of a shock.
Posted Feb 5, 2013 0:30 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (2 responses)
Posted Feb 6, 2013 0:23 UTC (Wed)
by FranTaylor (guest, #80190)
[Link] (1 responses)
Secure boot can most certainly be used to enforce licensing. The serial number of the system can be used as part of the key. The vendor provides an expiring kernel image that only boots on your system. If you don't keep paying and updating your license, someday your computer stops booting. Easy enough.
Posted Feb 6, 2013 3:07 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link]
Posted Feb 5, 2013 5:35 UTC (Tue)
by ThinkRob (guest, #64513)
[Link] (2 responses)
Posted Feb 5, 2013 7:00 UTC (Tue)
by raven667 (subscriber, #5198)
[Link] (1 responses)
Posted Feb 6, 2013 16:19 UTC (Wed)
by ThinkRob (guest, #64513)
[Link]
So basically you want to nuke the sensitive data on each state transition: full access -> "secure" to ensure nothing nasty's picked up, "secure" -> full access to protected private data. Got it.
Posted Feb 5, 2013 17:32 UTC (Tue)
by Aliasundercover (guest, #69009)
[Link] (1 responses)
If you want it that is your choice. You are choosing to value security against leaking data very highly over security against losing data. This feature may actually give a tiny increment in safety against leaking data to someone who gains physical control of your computer. For that it substantially increases the risk of losing your data. Security against an attacker who has physical possession of your computer is at best an up hill battle.
You are certainly welcome to value every increment of leak protection while ignoring security against ordinary mishaps leading to data loss. I don't think that corner solution is good for everyone. It isn't like there is an easy way to gain the data safety back. Every backup is also a leak path.
> Are you trying to make a security feature sound like a evil conspiracy?
Well, yes actually, security is being used as cover for taking control away from owners and users giving it to vendors. Security is the tech equivalent of "think of the children".
Posted Feb 5, 2013 17:49 UTC (Tue)
by raven667 (subscriber, #5198)
[Link]
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
How is it related to secure boot? Laptops routinely refused to boot with vendor-unapproved WiFi-cards for years and had no need for secure boot for that.
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Erasing data when disabling secure boot is something I *want* to happen. Otherwise something like a key logger can be installed without ever noticing it.
Isn't think backwards?
I mean, don't you want tabula rasa when you're going from open -> "secure"? After all, if "Secure Boot" is working correctly, shouldn't it be impossible for untrusted code (i.e. a keylogger) to execute? If so, then open access mode is the only way it would be able to be installed, so you'd want to nuke everything and start from scratch on the transition back into "secure" mode.
No?
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook
Garrett: Don't like Secure Boot? Don't buy a Chromebook