Garrett: Secure Boot and Restricted Boot
Garrett: Secure Boot and Restricted Boot
Posted Mar 27, 2013 18:45 UTC (Wed) by tshow (subscriber, #6411)In reply to: Garrett: Secure Boot and Restricted Boot by mjg59
Parent article: Garrett: Secure Boot and Restricted Boot
I do not. That said, I fail to see how that is relevant to the discussion; what I'm worried about is that the people who brought you (for instance, since I believe you're intimately familiar with this) the samsung laptop bricking bug are going to be the same people doing the firmware infrastructure for user key management.
User key management and disabling "secure boot" are going to be the less-trodden path, and the OEMs are going to treat them as such. The more excuses we give them to ignore or sideline those paths, the more likely they are to either be dropped, or (more likely) shipped in a worked-for-QA-the-one-time-they-tried-it-part-way-through-alpha state.
If they wind up shipping broken user key management or broken "insecure boot", what we don't want is for them to say: "Workaround: use $(corporation)-signed stuff" and then just let the bug go stale in the bug database. We want them to feel they need to fix it, even if it's one of those horrible "we did it all wrong, and the implications have tentacles reaching everywhere" can of worms bugs.
So, no, there are no such systems this year (as far as I know, assuming we're excluding winrt). That's not relevant. What's relevant is the balance of incentives for OEMs. The OEMs want to spend as little as possible developing products, and as little effort as possible on post-release maintenance. If we're going to keep the less-popular options available, we do ourselves no favours with workarounds, because it reduces the loss threat to the OEMs. If most people can get by with "just use stock $(corporation)-signed stuff", then the expense/reward math for the OEMs to fix "secure boot" or user key management bugs is dominated by the expense.
To be clear here, it's not malice on anyone's part I'm concerned with. My concern is that if we assume the major parties are imperfect (ie: their products will at times contain bugs) and are going to concentrate on their own short-term fiscal interest, we need (as much as we can) to set the playing field so the incentives are as favourable as possible to the outcome we want, which is for user key management and "secure boot" disabling to remain viable, and for problems in those systems to be treated seriously and fixed when they crop up.
That means anything the other players can point internally and say "well, only 0.0n% of users are actually affected by this because of $workaround" is poisonous.
