|
|
Subscribe / Log in / New account

Fedora considers deprecating legacy BIOS

By Jake Edge
April 20, 2022

A proposal to "deprecate" support for BIOS-only systems for Fedora, by no longer supporting new installations on those systems, led to a predictably long discussion on the Fedora devel mailing list. There are, it seems, quite a few users who still have BIOS-based systems; many do not want to have to switch away from Fedora simply to keep their systems up to date. But, sometime in the future, getting rid of BIOS support seems inevitable since the burden on those maintaining the tools for installing and booting those systems is non-trivial and likely to grow over time. To head that off, a special interest group (SIG) may form to help keep BIOS support alive until it really is no longer needed.

Proposal

The proposal to "Deprecate Legacy BIOS" was, as usual, posted on behalf of its owners, Robbie Harwood, Jiří Konečný, and Brian C. Lane, by Fedora program manager Ben Cotton. It currently targets Fedora 37, which is due in October, though there is reason to believe the change will not happen quite that soon. The reasons for removing the support are described in the proposal:

UEFI is defined by a versioned standard that can be tested and certified against. By contrast, every legacy BIOS is unique. Legacy BIOS is widely considered deprecated (Intel, AMD, Microsoft, Apple) and on its way out. As it ages, maintainability has decreased, and the status quo of maintaining both stacks in perpetuity is not viable for those currently doing that work.

[...] While this will eventually reduce workload for boot/installation components (grub2 reduces surface area, syslinux goes away entirely, anaconda reduces surface area), the reduction in support burden extends much further into the stack - for instance, VESA support can be removed from the distro.

The proposal says that, eventually, BIOS support will have to be removed, but that maintaining the ability to boot existing Fedora systems with BIOS is meant to help smooth the process. Fedora already has requirements that effectively restrict it to systems made after 2006, so this change would extend those restrictions somewhat further.

Intel stopped shipping the last vestiges of BIOS support in 2020 (as have other vendors, and Apple and Microsoft), so this is clearly the way things are heading - and therefore aligns with Fedora's "First" objective.

The subject was raised back in 2020, which also led to a (predictably) long thread, though it was not a change proposal at that time. Some of the "relevant points from that thread" are listed in the Feedback section of the proposal. There are, of course, machines that are BIOS-only and any kind of hardware deprecation for the distribution is impossible "without causing some amount of friction". In addition, there is no way to migrate from a BIOS installation to a UEFI-based system, since "repartitioning effectively mandates a reinstall". In particular, a UEFI partition would need to be added to the system.

The Contingency Plan section of the proposal describes an ugly future for the status quo, but also a possible way forward:

Leave things as they are. Code continues to rot. Community assistance is required to continue the status quo. Current owners plan to orphan some packages regardless of whether the proposal is accepted.

Another fallback option could be, if a Legacy BIOS SIG organizes, to donate the relevant packages there and provide some initial mentoring. Longer term, packages that cannot be wholly donated could be split, though it is unclear whether the synchronization thereby required would reduce the work for anyone.

Affected systems

As might be guessed, multiple replies from users of affected systems were seen in the thread, starting with Neal Gompa. He said that he is sympathetic to the change, but thinks that it is "way too early to do across the board". He has a system that struggles to boot Linux with UEFI and his workarounds are beyond the abilities of most users.

David Airlie said that he recently worked on a project to rewrite the Mesa driver for a wide range of Intel GPUs. Many of the systems he used to develop and validate those drivers are pre-UEFI systems, but it was "of great benefit to me and the community" that he could use Fedora for that work. For future projects, he would have to consider moving away from Fedora, which would be a sad state of affairs.

Hans de Goede said that he had several systems at home that were BIOS-only and happily running Fedora now. Obsoleting them just contributes to the e-waste problem; "Looking specifically at fixed PCs and not laptops this proposal would (eventually) turn 2/5 PCs in my home unusable, which really is unacceptable IMHO." He also pointed to Airlie's work on Intel GPUs, saying that "it seems rather silly to drop support for this hw after just investing a significant chunk of time to breathe new [life] into their GPU support"

But it is not just desktops and laptops that are affected by a change of this sort. Fedora is also installed on cloud servers and virtual machines of various sorts, some of which do not support anything other than booting via BIOS. The proposal noted that the time of the 2020 discussion, Amazon's AWS did not support UEFI, but that has changed. Marc Pervaz Boocha pointed out that many virtual private server (VPS) providers do not support UEFI, giving Linode and Vultr as examples. Dominik "Rathann" Mierzejewski reported that OVH is also affected:

OVH is another big provider and they don't offer UEFI boot with their VPS range. I've just confirmed it with their support.

Since one of my servers is hosted by OVH, I'd have to either migrate to another hosting provider or migrate off Fedora. Which is ironic, considering my involvement in Fedora.

Stewart Smith added some "thoughts both from an EC2 [Elastic Compute Cloud] perspective, and an Amazon Linux as a downstream of Fedora perspective". Most EC2 instance types boot using BIOS by default, though many can use UEFI and new types are likely to get UEFI support, but there are "a *lot* of instance types, a whole bunch of which are less likely to support UEFI". There is no installer for cloud images, instead they use the Amazon Machine Image (AMI) format, but "AMIs that don't run on all instance types tend to cause confusion, no matter how [clearly] you document the limitations". So Amazon Linux has an interest in ensuring that BIOS booting still works well, "likely for a decent number of years to come (however much I wish this wasn't the case)".

Gompa complained that the change is not really a deprecation, but is instead a removal, because the lack of packages and tooling that support BIOS "makes several scenarios (including recovery) harder". It also puts the burden on users to determine if their hardware can boot and install Fedora, but UEFI has not yet reached a critical mass where it can be assumed to work. Alberto Abrao agreed, noting that this change would "leave behind a LOT of serviceable hardware", especially in the server space:

Ironically, Fedora is one of the distributions out there that allows me to extract the most out of older hardware. It would be a terrible loss to have to move to a different one, but it's hard to reason purchasing new hardware - especially right now, with pandemic-related supply issues still ongoing - to keep up with this change.

In that message, Gompa also said that he is a "a fan of using UEFI instead of BIOS" and that he has done work to add UEFI support to Fedora cloud images. He just does not believe that it is time, yet, to make that switch. Part of the reason is that he believes the UEFI experience on Fedora is not all that good.

A wander into secure boot

In his original reply to the proposal, Gompa also asked about Fedora support for NVIDIA drivers under UEFI secure boot. Peter Robinson said that was out of the scope of the proposal, since users can disable secure boot if they need support for drivers, like NVIDIA's, that are not signed by the Fedora kernel-module keys. But Gompa replied that it is sometimes easier to have users fall back to booting from BIOS; furthermore:

You're right that these are different problems, but I've also seen very little appetite for reducing the suffering of Fedora Linux users on UEFI Secure Boot with the *most common issue* we have: an NVIDIA driver that doesn't do anything because of the lockdown feature. If you're planning to say that UEFI is the only way to boot, then that means you need to be prepared to accept that our UEFI experience is *worse* than our BIOS one right now, and someone needs to take ownership to improve it.

Harwood, who is one of the feature owners, said that NVIDIA users can either use the open-source nouveau driver (which is signed), sign their own copy of the driver "(involves messing with certificates, so not appropriate for all users)", or disable secure boot. But several people pointed out that nouveau does not really solve the problem, especially for more recent NVIDIA hardware; it does not provide access to accelerated graphics operations for recent GPUs and tends to have quite a few bugs even for the older models. Michael Catanzaro pointed out that the options Harwood described are problematic from a user-experience perspective:

The user experience requirement is: user searches for NVIDIA in GNOME Software and clicks Install. No further action should be necessary. We didn't make the NVIDIA driver available from the graphical installer with the intention that arcane workarounds would be required to use it.

But Adam Jackson thought that the NVIDIA problem was not Fedora's to solve. There are technical means to make it work and "NVIDIA are the ones with the private source code". But Chris Murphy sees things differently, noting that Fedora is sending mixed messages:

When users have a suboptimal experience by default, it makes Fedora look bad. We can't have security concerns overriding all other concerns. But it's really pernicious to simultaneously say security is important, but we're also not going to sign proprietary drivers. This highly incentivizes the user to disable Secure Boot because that's so much easier than users signing kernel modules and enrolling keys with the firmware, and therefore makes the user *less safe*.

On the other hand, Fedora does not actually have a full secure boot implementation, Lennart Poettering said, so by disabling it "you effectively lose exactly nothing in terms of security right now". The reason is that the initrd is not signed, so it can be subverted:

What good is a trusted boot loader or kernel if it then goes on loading an initrd that is not authenticated, super easy to modify (I mean, seriously, any idiot script kiddie can unpack a cpio, add some shell script and pack it up again, replacing the original one) – and it's the component that actually reads your FDE LUKS password.

SIG

In his message linked above, De Goede volunteered to form a SIG along the lines suggested in the proposal. He noted that previous attempts to keep 32-bit x86 alive when Fedora removed support for i686 had run aground, but felt that BIOS is different:

Legacy BIOS boot support is basically only about the image-creation tools + the bootloader. As various people have mentioned in the thread BIOS support is still very much a thing in data-centers, so I expect the upstream kernel community to keep the kernel working with this for at least a couple of years. Where as both the kernel + many userspace apps were breaking on i686.

After Fedora project leader Matthew Miller started a new thread about the possibility of having a video call to discuss the BIOS issue, which was generally seen as not being something that would do much more than rehash what had already been aired, De Goede renewed his call for a Legacy BIOS SIG. He envisioned it as a lightweight organization that focused on testing Fedora on BIOS systems, particularly the next version of Fedora early in its development, in order to file and fix bugs.

The new thread largely went over the same ground as the first, at some length, naturally, though there was also some concrete planning of what a new SIG would do—and how. Harwood said that what is needed is a place to assign bugs and a way to get those problems addressed. "The overall goal of the SIG needs to be to reduce load on existing bootloader contributors." But Harwood also wondered whether Fedora should redefine its support for BIOS:

Given there is consensus that legacy BIOS is on its way out, we think Fedora release criteria in this area should be re-evaluated. Not only does support change from "fully supported" to "best effort", but we should re-evaluate what is/isn't release blocking, and probably clarify who owns what parts.

Several people disagreed with that characterization of the status of BIOS. Chris Adams said: "I don't think this statement is true, unless Fedora doesn't want to be considered for a bunch of popular VM hosts (e.g. Linode and such) that have no stated plans to support UEFI." Perhaps BIOS support for physical hardware could be phased out, though. De Goede agreed that BIOS support is still needed in some contexts:

Given what the server product folks have indicated that BIOS boot support is quite important for them I'm not sure if changing the release criteria is in order. I do agree that any blocker bugs related to legacy BIOS booting should be assigned to; and taken care of by the legacy BIOS boot SIG.

The change proposal will be discussed and decided by the Fedora engineering steering committee (FESCo), but its prospects do not look good. The FESCo ticket for the proposal has already gotten five "-1" votes from members and there are nine on the committee. Those votes are not binding, but it still looks pretty unlikely this change will go through—at least for Fedora 37.

But the change will, seemingly, happen eventually. One of the complaints seen in the ticket (and threads) is that the proposal calls it a deprecation, but that is not really what it entails; new versions of Fedora will not be able to be installed on the older hardware, which could be problematic if an in-place upgrade goes awry. In addition, Fedora versions are only supported for about a year, so at some point upgrading may not really be an option if BIOS support is removed. That means users of those systems would have to migrate to a different distribution or keep running an unsupported version as it slowly bitrots. In a blog post about the change, Cotton pointed out that while he did not think the distribution "should abandon old hardware willy-nilly", there is a balance to be struck:

I think some distros should strive to provide indefinite support for older hardware. I don't think all distros need to. In particular, Fedora does not need to. That's not what Fedora is. "First" is one of our Four Foundations for a reason. Other distros focus on long-term support and less on integrating the latest from upstreams. That's good. We want different distros to focus on different benefits.

With luck, the SIG will take over any packages needed to keep BIOS functioning, since their owners plan to orphan them regardless of the outcome of the proposal. Keeping BIOS alive on Fedora for another few years—how many is difficult to guess—would seem to have a fair number of benefits at this point, though there is obviously a maintenance burden associated with it as well. If the change does not get approved this time around, we will likely see the proposal recur for Fedora 38 (or later), but if the SIG takes off, that may be postponed for some time. When it does come up again, however, we can probably expect another lengthy discussion in Fedora-land.



to post comments

Fedora considers deprecating legacy BIOS

Posted Apr 20, 2022 22:52 UTC (Wed) by atai (subscriber, #10977) [Link] (1 responses)

bad idea. I the era of chip shortage, the legacy systems shall continue to be used for as long as they work. Software shall continue to support these systems. Free software, especially.

Fedora considers deprecating legacy BIOS

Posted Apr 20, 2022 22:52 UTC (Wed) by atai (subscriber, #10977) [Link]

"I" => "In"

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 0:15 UTC (Thu) by fenncruz (subscriber, #81417) [Link] (33 responses)

Are these companies that seem to be completely dependant on legacy BIOS still working ready to contribute the workers/cash to keep it working?

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 7:48 UTC (Thu) by taladar (subscriber, #68407) [Link] (4 responses)

Are the people who champion UEFI willing to put in the work to make it actually work as well or better than BIOS?

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 10:27 UTC (Thu) by leoluk (guest, #97665) [Link] (3 responses)

Yes - there is a ton of ongoing work on EFI in projects like EDKII[1] and the various bootloaders and utilities. Things like TPM-backed attestation and Secure Boot require EFI. Meanwhile, Legacy BIOS is stagnant and only kept around for compatibility reasons.

[1]: https://github.com/tianocore/edk2

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 23:35 UTC (Thu) by trini (subscriber, #70570) [Link]

I suspect the coreboot people would like to have a word. I'm a bit surprised this wasn't mentioned in the summary (and I didn't check the thread itself). There is very much an active community around non-UEFI x86-64 firmware support.

Fedora considers deprecating legacy BIOS

Posted Apr 24, 2022 4:37 UTC (Sun) by Conan_Kudo (subscriber, #103240) [Link] (1 responses)

EDK2 is only one part of UEFI. In the entire thread, there was no commitment by the proposers to improve the experience with UEFI on Fedora Linux. There are several dimensions there to improve, but the fundamental assumption was that the current experience is fine, when it is clearly not.

Fedora considers deprecating legacy BIOS

Posted Apr 24, 2022 6:48 UTC (Sun) by johannbg (guest, #65743) [Link]

Their change proposal is about deprecating legacy BIOS which basically just involves making documentation changes mentioning that UEFI is now a hardware requirement for new Fedora installations on platforms that support it.

The installer still supports installing Fedora on non uefi platforms.
Fedora will still work on non uefi platforms, it's just considered unsupported

What their change proposal effectively just does, is to open up the door for *other* change proposal to make further changes in Fedora which more or less will involve the elimination of the technical debt in Fedora that has been gathered since it's inception around legacy bios support.

At best it flips a switch or two for component defaulting to uefi but the fact is various upstream have already start defaulting to uefi and will eventually do code cleanups that drops any support for legacy bios regardless what downstream "feels" about it.

Those distribution that feel so strongly about it will have to carry and maintain everything themselves, they should not expect upstreams to do that *for them*.

Improving UEFI experience can and should be handled by a different change proposal in Fedora ( not that I'm seeing how since the experience from the installer is not "bad", the rest is relevant to upstream as in no downstream contributor is going to change that, let alone some individuals that are doing change proposal in Fedora, which is just a marketing gimmick for the distribution ).

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 9:41 UTC (Thu) by johannbg (guest, #65743) [Link] (27 responses)

If Amazon indirectly advertises itself like a big billboard sign, that it's subjective to persistent BIOS infections on fedora devel I doubt that all the other legacy bios dependent users/companies have neither the skill or the financial resources to contribute anything of value and I'm not even sure what that is supposed to be.

The fact is it's quite easy these days to setup "refurbish" shop that plays into peoples/companies environmental guilt, that buys used known exploitable hardware then refurbish it's and injects it with persistant bios exploitation and resell's it to that target audience ( "Green" individuals/companies ).

And for whatever reason people seem to be under the assumption that bios is not used after boot, which could not be further from the truth since the OS needs the bios for various reason and since it does, the OS always *trusts* the bios.

One ( popular ) way to exploit that fact is to use the BIOS-32 calls OS have and do an direct-to-kernel binary execution from there ( here you can see where the Linux Kernel detects and calls this service [1] ) so fourth and so on ( people can educate themselves how to best exploit legacy/cms bios, there are enough examples out there and in use in the wild ).

Anyways Fedora could not only be leading the way of moving the Linux ecosystem towards UEFI but also get rid of so much of technical debt in Fedora in the process and just leave the legacy users to some distribution better suited for that ( some LTS distro like CentOS, RHEL, etc ) but it seem that "my usecase matters the most even thou I dont contribute jack to Fedora or the ecosystem in general ) crowd wins again and this will be postponed to F40 and this whole dialog had again in the community. <sigh>

[1] https://github.com/torvalds/linux/blob/b253435746d9a4a701...

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 10:22 UTC (Thu) by pbonzini (subscriber, #60935) [Link] (1 responses)

BIOS-32 is only used on 32-bit systems.

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 10:34 UTC (Thu) by johannbg (guest, #65743) [Link]

Yes I know I was just using it as an example.

I'm not sure if you are aware of it but everytime any distro mentions anything about deprecating 32-bit support, a squeel like from a pig is heard in the void and someone's pony dies so 32-bit still seems to be live and well to me :)

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 10:32 UTC (Thu) by LtWorf (subscriber, #124958) [Link] (24 responses)

So we should throw away millions of tonnes of perfectly good computers because of some hypothetical attack?

Typical security person mindset.

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 12:12 UTC (Thu) by johannbg (guest, #65743) [Link] (23 responses)

Sorry I dont follow as in I'm not sure what you mean these are hypothetical attacks, these attacks have existed in the wild since last century ( for example Chernobyl a.k.a CIH a.k.a Spacefiller )

Well funded ( law enforcement ) agencies have them in their arsenal to circumwent hard-drive encryption and in covert operation ( confuscating a computer, insert the exploit, release the subject and monitor the subject ) as well as pretending to be hardware sales company that sells drug cartels or other questionable businesses hardware ( used or new ), to infiltrate and monitor their operations while the other "darker" side is using those exploits to extort or otherwise profit from them.

These attacks are very much real and have existed in the wild for over two decades.
There is nothing hypothetical about them at all.

And I'm not sure what you mean by throwing away a perfectly good computer. What do you consider a perfectly good computer?

I'm all for recycling and reuse but the fact is computers dont last forever and computer's longevity is based on, it's usage,the environment it resides in and the quality of the component it's made out of so it can last as little as couple of days or for as long as one or two decades in otherwords people's milage might vary in that regard depending on the manufacture or even just product lines between manufactures.

The fact is distributions cannot be expect having to support old hw forever since it increases it's maintainership and will hinder the adoption of new technologies for those distribution so it's better to just use a distribution that is tailored to such usecases for that target audience.
( like LTS distribution or something like I guess slackware which presumably looks and operate just like it did when it was initally created at least it's website is most certainly from that era )

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 13:39 UTC (Thu) by wtarreau (subscriber, #51152) [Link] (20 responses)

> These attacks are very much real and have existed in the wild for over two decades.
> There is nothing hypothetical about them at all.

Yes they've existed, no they're not hypothetical, but they're totally outdated and pointless nowadays when it's both ultra-cheap and effective to develop a browser malware and that this has become by far the most effective way to steal users' information to the point that it's an industry now (look for "malware as a service").

Sorry but I do not want to mess up with that secure boot. It's only as secure as my ability to use it properly, which is basically zero.
However it surely guarantees that I will eventually lose my data when not being able to recover my system after some bugs, crashes or other issues with my machine.

We should not force the user to endure pain that is designed to "protect them" against their will from attacks that are not relevant to them. We should instead educate users to where risks are and how to care about what matters. We'd already make a much bigger progress if people stopped reading HTML e-mails...

While I had been seriously considering migrating from Slackware to Fedora a few months ago when slack15 was really longing to come, at least this discusssion just convinced me that it was absolutely not a good idea!

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 18:01 UTC (Thu) by johannbg (guest, #65743) [Link] (1 responses)

There is no such thing as outdated means of explotation, you use the right tool, for the right job that helps you obtaining your objectives and likewise with your computer which is a computer originally designed to make your life easier, so you choose the distribution that works for you.

If that happens to be slack good for you, if it happens to be Fedora great, if that happens to be *BSD awesome but please dont fall into this whole "I would have moved to x distro" or worse "If x feature is implemented I stop using the x distro" crowd.

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 20:29 UTC (Thu) by jwarnica (subscriber, #27492) [Link]

This is a physical attack. I'd be sympathetic for remote holes being allowed by policy. It still requires more than a casual attacker.

I won't be that guy to say that if you don't have anything to hide then law enforcement will leave you alone.

But I will say that if you do have something to hide from law enforcement, then its your problem to get a sufficiently modern system to keep them out.

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 22:17 UTC (Thu) by nix (subscriber, #2304) [Link] (17 responses)

> However it surely guarantees that I will eventually lose my data when not being able to recover my system after some bugs, crashes or other issues with my machine.

This is exactly why I'm not using secure boot -- but I note that secure boot works for millions of people perfectly well. I suspect the reason why is simply that they are not systems hackers regularly futzing with early boot (most people aren't). Those people (like us) who *are* systems hackers regularly futzing with early boot should either learn how secure boot works or simply not use it, but that doesn't mean it's not appropriate for the vast majority who aren't routinely doing things like that.

(As for the added security: many of the attacks secure boot protects against are physical, and I'm not worried about those: anyone who can attack systems I care about that way has broken into my house and I have much bigger problems. But I'm not sure what to do about the possibility of remote attackers implanting persistent malware in my UEFI firmware or something. Secure boot would protect against that, but I still have it turned off because it would also make it more likely to turn a moderately bad boot problem into a disastrous one, and frankly the system failing to boot because of UEFI malware *is* a disaster, arguably worse for me than it booting with the malware active would be. It's a tradeoff... how common *is* UEFI malware anyway? Is it even a threat worth worrying about for someone like me who is basically a random boring person and thus unlikely to be of interest to major governments unless they are malware-implanting literally everyone in the population?)

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 0:23 UTC (Fri) by rgmoore (✭ supporter ✭, #75) [Link]

Secure boot would protect against that, but I still have it turned off because it would also make it more likely to turn a moderately bad boot problem into a disastrous one, and frankly the system failing to boot because of UEFI malware *is* a disaster, arguably worse for me than it booting with the malware active would be.

This makes perfect sense. You have to protect against two kinds of security failures: granting access to people who shouldn't have it and denying access to people who should. Getting locked out of your own system and losing data- or losing a lot of time going through some complicated procedure to recover your data- is a security failure just as surely as letting script kiddies in is. For your personal threat model, losing access is a much bigger danger, so it makes sense to take steps to mitigate it by turning off secure boot, even if that increases your chances of getting pwned.

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 0:49 UTC (Fri) by bartoc (guest, #124262) [Link]

not to mention that even with secure-boot disabled the system will _still_ verify the signatures of firmware updates before flashing them, and possibly will even verify the signature of the stuff in the ROM before starting to execute it (so you can't just unsolder the ROM chip and flash it manually, without going through whatever it's connected to).

Heh, come to think of it, my desktop's firmware doesn't really do anything to indicate secure-boot is off, so if someone just went and disabled it I might not know! Same with my laptop. My Surface tablet does indicate this in firmware (the boot-splash gains a huge red warning).

I think secure-boot (implemented well, like you gotta sign the initrd, come on) is probably useful against like, customs officials quickly adding a boot-kit onto your disk though, which is worth defending against for a lot of people.

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 15:47 UTC (Fri) by abatters (✭ supporter ✭, #6932) [Link] (14 responses)

> how common *is* UEFI malware anyway?

This was just in the news: Ars Technica: Hackers can infect >100 Lenovo models with unremovable malware.

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 20:31 UTC (Fri) by johannbg (guest, #65743) [Link] (13 responses)

This put 30M Dell devices at risk for remote BIOS attacks

https://www.dell.com/support/kbdoc/en-is/000188682/dsa-20...

Many of OEM's are using insyde

https://cybersecurityworldconference.com/2022/02/02/exper...

Insyde Software Security Advisory can be found here
https://www.insyde.com/security-pledge

Report issued by U.S. Department of Homeland Security (DHS) and Department of Commerce

"Firmware presents a large and ever-expanding attack surface, as the population of electronic
devices grows. Securing the firmware layer is often overlooked, but it is a single point of failure
in devices and is one of the stealthiest methods in which an attacker can compromise devices at
scale. Over the past few years, hackers have increasingly targeted firmware to launch
devastating attacks."

https://www.dhs.gov/sites/default/files/2022-02/ICT%20Sup...

And the list goes on...

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 3:17 UTC (Mon) by wtarreau (subscriber, #51152) [Link] (12 responses)

So in short, only attacks targetting the UEFI crap that would not have been possible with a read-only BIOS that doesn't try to provide operating system-like functions. When you see the Dell one which is able to download updates via https, no comments.

These examples just show that the most effective fix against all such problems is to refuse UEFI and revert back to BIOS instead.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 3:26 UTC (Mon) by Cyberax (✭ supporter ✭, #52523) [Link]

BIOS-es haven't been read-only since forever. Though they are typically well-protected by very obscure toolchains that are required to build them and 16-bit x86 code that you'll have to write.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 3:40 UTC (Mon) by mjg59 (subscriber, #23239) [Link] (10 responses)

The security situation around BIOS was *much* worse than on UEFI, it's just that the general platform security situation was sufficiently bad that nobody was really looking at it.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 14:09 UTC (Mon) by khim (subscriber, #9252) [Link] (6 responses)

I think you should separate the XX century from the XXI century here.

I still remember MS-6309.

Year 2000 edition had a nice, simple jumper which made ROM read-only. Yes, certain change in configuration cause complaints at boot, but it was a simple matter of changing its position for one boot and return it back after that.

It was as protected from malware as one can imagine.

And then version 5 from 2001 (or was it 2002?) which not only lacked jumper in that place, it refused to boot if you short these two numbs which were left in it's place!

So, please don't tell about the problematic situation with BIOS. It wasn't problematic when people cared. It is, of course, became problematic when people started thinking only about flexibility and forgot that it's not a good idea to have computers which are trivially bricked.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 14:26 UTC (Mon) by pizza (subscriber, #46) [Link] (4 responses)

> I still remember MS-6309.
>Year 2000 edition had a nice, simple jumper which made ROM read-only. Yes, certain change in configuration cause complaints at boot, but it was a simple matter of changing its position for one boot and return it back after that.

Meanwhile, the other 99.999% of motherboards lacked that feature, including, as you mentioned, later versions of that same motherboard. One data point does not a generalization make.

BIOS is layered-hacks-on-top-of-layered-hacks built that goes all the way back to 1982. [1] It's long past time to shoot it in the head. And it's also why, to this day, our bleeding edge Ryzen processors still pretend to be a 44-year-old 16-bit i8086 when powering up.

[1] As in when Compaq released PC clones using a clean-room reverse-engineered BIOS.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 15:14 UTC (Mon) by khim (subscriber, #9252) [Link] (3 responses)

> Meanwhile, the other 99.999% of motherboards lacked that feature, including, as you mentioned, later versions of that same motherboard. One data point does not a generalization make.

Sorry, but no. It's most definitely not 99.999%. I know for the fact that you had to replace ROM chips on Risc PC, Amiga (in fact you can still buy a replacement chips) and I have seen "Flash Protect" switch on lots and lots of motherboards made in XX centory.

I remember that one specifically because it was a surprise to me that they would remove it.

> BIOS is layered-hacks-on-top-of-layered-hacks built that goes all the way back to 1982.

Yes, so what? It works. It's secure (more secure than the XXI century abomination). And easy to provide in virtual environment.

EFI is huge mess with the only redeeming quality: it can support >4TB SSDs. That's great, but I'm not sure all that pointless complexity is worth it.

Insecure-by-design POS which can not be protected by design — and I'm supposed to use for sake of “security”? Puhlease.

Sure, I use EFI when I have no choice, but that doesn't mean it's not POS.

> And it's also why, to this day, our bleeding edge Ryzen processors still pretend to be a 44-year-old 16-bit i8086 when powering up.

So what? One doesn't need that many transistors to implement that more and today there are billions of them on any x86 CPU.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 15:41 UTC (Mon) by farnz (subscriber, #17727) [Link] (1 responses)

Note, though, that on all modern x86 hardware platforms, "traditional" BIOS is implemented as a module running atop UEFI; so you get all the vulnerabilities of UEFI, plus extra holes due to the CSM that implements the BIOS interface.

Which, in turn, makes the claims about BIOS being more secure questionable - you're talking about an additional layer atop UEFI, which can have its own vulnerabilities, plus you have the full stack of UEFI beneath it to compromise.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 15:46 UTC (Mon) by khim (subscriber, #9252) [Link]

That's very true, sure. I see no reason to use the BIOS interface on the system where it's emulated via CSM.

But I don't think it's imlemented that way in virtual systems and other small systems where Linux can still run.

Although I wonder how many of these are out there which may not just run Linux, but specifically Fedora. It's pretty heavy novadays.

Fedora considers deprecating legacy BIOS

Posted Apr 29, 2022 15:48 UTC (Fri) by ms-tg (subscriber, #89231) [Link]

@corbet Any thoughts on the level and style of discourse on these BIOS and UEFI threads? Doesn't seem in keeping with LWN, wondering if you had any thoughts.

Fedora considers deprecating legacy BIOS

Posted Apr 25, 2022 18:24 UTC (Mon) by wtarreau (subscriber, #51152) [Link]

> Year 2000 edition had a nice, simple jumper which made ROM read-only

Many of us have had much more robust than a jumper, an EPROM that required UV light to erase them, and a special programmer delivering 21V to the VPP pin to program them :-) There was no need for a jumper, and as an added bonus, not being upgradable in field tended to make them less bogus (at least they were more tested than my core i7's AMI BIOS).

Fedora considers deprecating legacy BIOS

Posted Apr 28, 2022 12:55 UTC (Thu) by stock (guest, #5849) [Link] (2 responses)

I think you need to back that up. Here's a recent example to the
contrary :
https://www.theregister.com/2022/04/27/microsoft-linux-vu...
which is vulnerability within systemd and only happens on UEFI hardware.

Fedora considers deprecating legacy BIOS

Posted Apr 28, 2022 13:47 UTC (Thu) by pizza (subscriber, #46) [Link]

> which is vulnerability within systemd and only happens on UEFI hardware.

The vulnerability is actually with networkd-dispatcher, which is developed (and distributed!) independently from systemd. It's not even widely packaged in distributions! It's not a "systemd vulnerability" any more than a vulnerability in NetworkManager or Apache (or any other random daemon) can be called a "systemd vulnerability."

Meanwhile I see nothing in the article about how this vulnerability can only affect UEFI systems -- it seems to involve relatively run-of-the-mill symlink traversal, and the CVE descriptions are still redacted. Can you point us towards some sort of supporting evidence for your assertion?

Fedora considers deprecating legacy BIOS

Posted Apr 28, 2022 21:09 UTC (Thu) by johannbg (guest, #65743) [Link]

> https://www.theregister.com/2022/04/27/microsoft-linux-vu...
which is vulnerability within systemd and only happens on UEFI hardware.

Interesting even Keith Richards drugs aren't strong enough to reach that conclusion in otherwords please explain to the audience here on LWN how a security flaw in networkd-dispatcher has anything to do with systemd and it only be happening on uefi hardware.

I eagerly await your response on the matter backing that up...

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 0:42 UTC (Fri) by bartoc (guest, #124262) [Link] (1 responses)

> as well as pretending to be hardware sales company that sells drug cartels or other questionable businesses hardware ( used or new ), to infiltrate and monitor their operations while the other "darker" side is using those exploits to extort or otherwise profit from them.

If you are buying hardware from the FBI (or generally if the actual, no shit, manufacturer of the hw is attacking you) you are completely screwed, even remote attestation won't save you (because it'll attest it is unmodified from what you bought!).

I don't really see what this has to do with removing BIOS, sure, you can do hardware attacks. Even secure boot can't prevent these attacks without robust attestation support, or extreme levels of tivoization. You _definately_ can't if you don't even bother to sign the initrd.

I think many modern systems will verify firmware code before allowing it to be flashed, even code that implements the legacy BIOS interfaces (ofc with physical access and enough sophistication you can just replace whatever is doing that verification or storing those keys, though sometimes this ends up being the entire processor).

In any event without an acute awareness of these kinds of attacks and a whole bunch of supporting infrastructure I don't think most systems will be able to prevent this, as it involves some significant useability (and freedom) tradeoffs to protect against an attack model that is uncommon (and if that model applies to you then you had better be well aware of that fact, otherwise you've already lost).

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 1:22 UTC (Fri) by mjg59 (subscriber, #23239) [Link]

> If you are buying hardware from the FBI (or generally if the actual, no shit, manufacturer of the hw is attacking you) you are completely screwed, even remote attestation won't save you (because it'll attest it is unmodified from what you bought!).

Not entirely. If you're on Intel and Boot Guard is enabled, the firmware will be measured before it's executed. If you're specifically targeted with modified firmware (even if it's signed appropriately), then those measurements will be different and there'll be reasons to ask questions. Of course, if the vendor just ships backdoored firmware to everyone, that doesn't help (but it does increase the probability that someone will notice the backdoor) - and if Intel is in on it, then obviously all bets are off.

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 0:16 UTC (Thu) by sub2LWN (subscriber, #134200) [Link]

Arbitrarily removing support for the installer but keeping support for BIOS itself could lead to the jankiest assortment of cloned/re-imaged installations imaginable. Maybe a forked installer would appear, although distro-hopping or not updating would be more likely. ±1 for interesting times.

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 6:57 UTC (Thu) by LtWorf (subscriber, #124958) [Link]

On my work machine (6 years old) enabling UEFI makes the wifi work very unreliably, so I boot it in BIOS mode.

Clouds and VPSes

Posted Apr 21, 2022 8:11 UTC (Thu) by rwmj (subscriber, #5474) [Link] (39 responses)

A lot of comments so far talking about hardware, but to my mind it's really the cloud providers (especially the second tier ones) and VPS hosters where this is going to be painful. We've supported UEFI (OVMF) in qemu since the early 2010s, and the other hypervisors have also had UEFI for a long time, but BIOS boot is still very common for VMs running in clouds and often the only option supported.

Clouds and VPSes

Posted Apr 21, 2022 10:23 UTC (Thu) by johannbg (guest, #65743) [Link] (36 responses)

I'm not seeing the relevance here I mean that this is being painful for some cloud/vps providers presumably due to them experiencing some sort of management tools issues is a self inflicted wound is it not?

Those companies should have the required means to prevent this from happening or is the (f)oss ecosystem supposed to be handholding businesses these days?

Clouds and VPSes

Posted Apr 21, 2022 10:28 UTC (Thu) by rwmj (subscriber, #5474) [Link] (24 responses)

I'm going to guess they have a system that works (BIOS) and has done for 15+ years, they have management tooling all around that, probably custom stuff written a decade ago, so why would they see any need to change?

There is a technical issue too since UEFI is considerably slower to boot and has much greater complexity.

Clouds and VPSes

Posted Apr 21, 2022 11:13 UTC (Thu) by johannbg (guest, #65743) [Link] (18 responses)

> I'm going to guess they have a system that works (BIOS) and has done for 15+ years, they have management tooling all around that, probably custom stuff written a decade ago, so why would they see any need to change?

UEFI is just one step short from becoming mandatory requirements in government contracts and usually if for example the U.S government says jumps, the vendors jump and businesses better be in shape when that call to jump comes.

Anyways still not seeing why *we* ( and by we I mean the entire (f)oss ecosystem ) should care I mean it's companies own responsibility to keep themselves relevant and competitive on the market, we do not exist to do that for them.

> There is a technical issue too since UEFI is considerably slower to boot and has much greater complexity.

This is the direction the industry is taking ( and has been for quite a while, as you yourself are very much aware of ), so it's not like there are any other choice other than to put in work to mitigate any downsides it brings.

People might not like it and businesses might choose to stick their head in the sand and ignore it but it is what it is.

Clouds and VPSes

Posted Apr 22, 2022 3:13 UTC (Fri) by dvdeug (guest, #10998) [Link] (17 responses)

> This is the direction the industry is taking ... so it's not like there are any other choice other than to put in work to mitigate any downsides it brings.

Or the FOSS community can put its weight where it is most useful. There's no value to forcing cloud computing to move from BIOS to UEFI, and as long as Linux supports it, these cloud providers can continue using it. Not permitting AWS to run away with everything is of value for the FOSS community; it reduces the leverage Amazon has over the community, and more generally the FOSS community is opposed to monopolies.

Clouds and VPSes

Posted Apr 22, 2022 7:21 UTC (Fri) by johannbg (guest, #65743) [Link] (16 responses)

Yes and no the fact is we live in an interconnected world were devices need to be protected not just at the application and OS levels, but all the way down to the firmware and hardware levels.

And now the industry is faced with deep, firmware- and hardware-level attacks and the reason for that being is there is a major firmware security gap with zero visibility in it.

In this interconnected world we (now?) live in, organazations and businesses need to be able verify that the internal components of their purchased computing devices are genuine and have not been altered with during the manufacturing and distribution processes ( for example manufactures swapped out components during the chip shortage for different ones, from different suppliers ) or otherwise modified throughout the device´s life cycles in their infrastructure or during the warranty of the device as a part of their business solution(s).

That the firmware that the every day device relies on, be it the "smart" coffee machine, corporate laptops, the network equipment, the servers or the even the personal/corporate EV's ( you dont want your Tesla's to run rampage, plowing down pedestrians like an elephant tramping over ants do you, or turn left when it should be turning right after the vehicle recieved altered firmware update over the air right? ) has not been tampered with.

All these devices have firmware on them so it's vital that organazations and businesses have their cybersecurity supply chain in check.

The unified extensible firmware interfaces is an critical components in the cybersecurity supply chain since it's an integrated part of infrastructures that runs this fairly newly founded interconnected world and I most certainly would think that the FOSS community would want to be integrated part in helping pushing, validate and securing and otherwise help strengthen the cybersecurity supply chain as well as phase out solutions like legacy bios's that are no longer being maintained and are considered obsolete in the industry since more often than not Linux is the underlying technology running this new world.

I'm not too overly concerned with cloud vendors or other buisnesses that do not have their cybersecurity supply chain in check since the free market will take care of those that wont ( they break the root of trust and will just be stuck with financially starved clients ).

For example if I was a government entity or a car manufacturer like Toyota,Volvo or Tesla I would not be doing any business with companies that dont have their cybersecurity supply chain in check and one of the things I would be checking for would be if the relevant vendor supported uefi and which hw manufacture it ran, in it's infrastructure on ( all the way down to component level ) etc. so I could validate and ensure that *my* cybersecurity supply chain was in check and *my* root of trust was secure.

I would exclude IBM/RH/Amazone from every government/business contracts since it's quite apparent based on the feedback here and on fedora-devel that they are not ready for this.

Their cybersecurity supply chain is not in order thus cannot be trusted and wont be for years ( from the looks of it ) thus I would choose a different vendor that provided me with a secure root of trust. ( There are business opportunity for those that can, to get ahead of large vendors like Amazon for example )

Fedora will not be allowed to make the required change to prepare RHEL due to the legacy trolls that come crawling out of last century, screaming ME ME ME, MY USECASE, FOREVER!!!! while riding on their roating,rusting, steam powered technology devices demanding that the technology universe remains frozen in time and be supported forever, as is ( another example is Adam trying to deprecate the legacy xorg driver ) as opposed to be thinking a bit further away from their own noses, ahead into the future, to the state that the industry is in now and evolving into.

The Fedora solutions MOAR Community Burecracy ( because that as worked so well! ) by forming a "Legacy SIG" to deal with the problem. So RHEL 10, nope propably more like RHEL 11...

Clouds and VPSes

Posted Apr 22, 2022 8:22 UTC (Fri) by LtWorf (subscriber, #124958) [Link]

> the free market will take care

Have you seen the world? The free market doesn't take care of putting bad products out of business.

Clouds and VPSes

Posted Apr 22, 2022 8:23 UTC (Fri) by LtWorf (subscriber, #124958) [Link]

Also USA federal government and armed forces are quite happy with using ubuntu. I guess they are equally as happy to use red hat.

Clouds and VPSes

Posted Apr 25, 2022 3:41 UTC (Mon) by wtarreau (subscriber, #51152) [Link] (13 responses)

> Fedora will not be allowed to make the required change to prepare RHEL due to the legacy trolls that come crawling out of last century, screaming ME ME ME, MY USECASE, FOREVER!!!! while riding on their roating,rusting, steam powered technology devices demanding that the technology universe remains frozen in time and be supported forever, as is ( another example is Adam trying to deprecate the legacy xorg driver ) as opposed to be thinking a bit further away from their own noses, ahead into the future, to the state that the industry is in now and evolving into.

This paragraph is very interesting because I've long been interpreting the situation exactly the other way. What if those unnecessary changes were only pushed hard by a few vendors who need to force their customers to regularly buy new hardware, and by software developers who see it as a guarantee to get a lifetime job ? I mean, I'm fine with changes that bring improvements, but there are many changes we're forced to swallow that significantly degrade our user experience. Sometimes you're even forced to abandon hardware by lack of support from new software, and for what justification, beyond "look how great the new version is" ?

I used to have machines that took 3 seconds to start to boot from power-on in the past. At work in the lab we have a UEFI machine that takes more than one minute doing whatever in your back before trying to boot, and you have just 2 seconds to decide what device to boot from so you're forced to stay in front counting in your head. That's one of the machines I run test kernels on... It's a good example of crap I don't need and that significantly degrades my experience by preventing me from remotely booting test kernels.

It's not about wanting to stay in the previous century, it's a concrete example of "improvements" that I didn't need and that makes users suffer for no reason except some vendors forcefully pushing that down their customers' throat.

It would be nice if software developers could sometimes try to argument their improvements as benefits perceived by their *users* and not only by themselves as software maintainers. Just claiming that "new feature X is much better and if you don't want to adopt it we'll remove the previous one and you'll have no other choice" isn't exactly how the free software movement started, quite the opposite in fact. I remember the time when we were proud to recycle old machines to make powerful Linux servers. Nowadays some linux distros force you to trash powerful machines. There must be something really wrong with that policy. The only reason I'm thinking about is the distro's policy possibly being dictated by too powerful companies whose business does not benefit from small systems.

But surely I'm wrong on all that line and it's normal to trash perfectly working hardware, I'm the only one concerned about e-waste and with purposely spending my money to buy less pleasant replacement hardware...

Clouds and VPSes

Posted Apr 25, 2022 7:30 UTC (Mon) by johannbg (guest, #65743) [Link] (9 responses)

> But surely I'm wrong on all that line and it's normal to trash perfectly working hardware, I'm the only one concerned about e-waste

That would be insecure working hardware, connected to the network that requires more "power" than current solutions, which adds to the environmental problem.

The people/companies that live by a concept called "carbon footprint" installed by the oil companies as part of an deceptive PR campaigns [1] on their behalf, the biggest one in history and claim that they care about the environment should not be buying/using anything involving computers,solar panels, tv's etc since in the devices manufacturing process is an chemical ( that is among few that was conveniently left out of the Kyoto Protocol international climate change agreement ) called Nitrogen Trifluoride(NF3) is being used.

"The gas is 17,000 times more potent as a global warming agent than a similar mass of carbon dioxide. It survives in the atmosphere about five times longer than carbon dioxide" [2]
It's use increases as the world is being deliberately pushed into adopting more technology as can be clearly seen in the market projections for the chemical [3].

People wont like what I'm about to say but the fact is we are way beyond point of no return for our planet at this point so if people genuenly care about the environment then they should disconnect, find another line of work and go and live like an Amish in the literal sense and figuring out solution that a) change the worlds economy in an instant and b) reduce the human population because *none* of the solution out there fix anything ( but they do produce profit ), at best they just delay it.

This whole act of people pretenting to be "green" to ease their environmental guilt which has been installed by their government in conjunction with the oil companies and an trillion dollar environmental industry is just ridiculous.

1. https://mashable.com/feature/carbon-footprint-pr-campaign...
2. https://scripps.ucsd.edu/news/potent-greenhouse-gas-more-...
3. https://www.marketquest.biz/report/108079/global-nitrogen...

Clouds and VPSes

Posted Apr 25, 2022 8:49 UTC (Mon) by kleptog (subscriber, #1183) [Link] (6 responses)

While I agree that them term carbon footprint can be misleading, some of your other points are off the mark. NF3 has been regulated under the Kyoto Protocol since 2012, largely as a result of the the research you're referring to. Its total radiative forcing compared to CO2 is rounding error. It's something to monitored, but hardly a major issue.

Sources:
https://en.wikipedia.org/wiki/Nitrogen_trifluoride#Greenh...
https://unfccc.int/process-and-meetings/transparency-and-...

Perfect is the enemy of good. If we only accept perfect solutions we'll never get anywhere.

I don't disagree with your sentiment that we're already basically screwed, but I don't think that's an excuse to just give up completely.

Clouds and VPSes

Posted Apr 25, 2022 17:36 UTC (Mon) by johannbg (guest, #65743) [Link] (5 responses)

> Perfect is the enemy of good. If we only accept perfect solutions we'll never get anywhere.

It's not like we are getting anywhere without the solutions being perfect now is it.

And it's not like the real/perfect solutions aren't known as in changing the world's economy and reduce the human population, they just cant be realistically implemented, well technically they can the former will never be allowed to happen and the latter never be socially accepted.

> I don't disagree with your sentiment that we're already basically screwed,

Biodiversity, polution in earth, water and air yup we are pretty fucked.

> but I don't think that's an excuse to just give up completely.

True we can always hope that good size meteor hits the planet.

Clouds and VPSes

Posted Apr 25, 2022 18:22 UTC (Mon) by Wol (subscriber, #4433) [Link] (4 responses)

Well, iirc the prediction (in 1980) for the millenium world population was 12Bn, and if we were unbelievably lucky it might be only 8Bn. What's the current figure?

To the best of my knowledge, we've undershot pretty much every prediction since, and the forecast for 2100 or 2150 is only 3Bn ...

Populations naturally boom and bust, and it looks like we might be hitting bust, luckily for Earth ...

Cheers,
Wol

Clouds and VPSes

Posted Apr 25, 2022 19:08 UTC (Mon) by johannbg (guest, #65743) [Link] (1 responses)

Well it's not like the human population will stop breeding tomorrow despite the genderless generation's attempt to put a dent in the population growth rate and the fact is we kinda need a meteor like right now, not 50+ years from now.

And who does not want to go out in a blaze of glory of kinetic energy = mass/2 * velocity^2

It sure beats dying of old age doesn't it...

Clouds and VPSes

Posted Apr 25, 2022 22:13 UTC (Mon) by Wol (subscriber, #4433) [Link]

Well, for a start a repeat of Tunguska over Stal (sorry, Put)'s palace might be a good idea ... let's hope the universe obliges ...

Cheers,
Wol

Clouds and VPSes

Posted Apr 26, 2022 12:50 UTC (Tue) by nix (subscriber, #2304) [Link] (1 responses)

This is not a population bust in the biological boom/bust sense. These are caused by starvation or predator pressure. What we are seeing almost worldwide is the voluntary reduction of breeding rates in order to focus more resources on fewer offspring. This is largely because this is what women want, but also because there is an economic incentive: in poverty-stricken rural areas children become a source of free labour fairly fast as they grow up, so you can use one round of children to help fund the next, and having *lots* is to a certain degree beneficial to all of them. In cities they are and remain a substantial cost to the whole family, including any older children. So it's beneficial to have fewer.

(There is probably also something related to falling death rates: if you know that most of your children will survive, you'll have fewer. But the economic incentive is substantial even in the absence of that.)

Clouds and VPSes

Posted Apr 27, 2022 1:33 UTC (Wed) by JanC_ (guest, #34940) [Link]

There is also the concept of children taking care of the elderly in poor areas, which is less needed in places where we have pensions.

Clouds and VPSes

Posted Apr 25, 2022 14:20 UTC (Mon) by wtarreau (subscriber, #51152) [Link] (1 responses)

> reduce the human population because *none* of the solution out there fix anything ( but they do produce profit ), at best they just delay it. This whole act of people pretenting to be "green" to ease their environmental guilt which has been installed by their government in conjunction with the oil companies and an trillion dollar environmental industry is just ridiculous.

This actually is the part I agree with :-)

Note that I wasn't doing some greenwashing, just explaining that I'm not seeing any reason to trash perfectly working hardware (which comes with costs and waste) just for the sake of making some developers' life easier when they claim that may hardware is dead.

Clouds and VPSes

Posted Apr 25, 2022 15:31 UTC (Mon) by Wol (subscriber, #4433) [Link]

Yup.

Running costs are only part of the equation. How much environmental damage is done and making new and disposing of obsolete hardware? Surely the extra costs of running old hardware may well be cheaper ...

Much as I dislike the waste-to-power plant just down the road (and even more so because we're a poor East London borough having all of posh West London's waste dumped on us), the fact is that is very environmentally friendly - it means a load of waste is converted efficiently to energy and CO2 rather than inefficiently converted to methane ... and it leaves a load of oil/coal unmined and in the ground.

If you're being green, you need to look at the big picture, not just minimise your costs at the expense of creating even bigger costs elsewhere (cough cough the government pricing our steel industry out of existence cough cough).

Cheers,
Wol

Clouds and VPSes

Posted Apr 25, 2022 12:15 UTC (Mon) by james (subscriber, #1325) [Link] (2 responses)

... a UEFI machine that takes more than one minute doing whatever in your back before trying to boot, and you have just 2 seconds to decide what device to boot from so you're forced to stay in front counting in your head.
Just in case you haven't heard of it, does sudo grub2-reboot work for you? You run it from the Linux command line, specifying a grub menu entry, then reboot: Grub2 uses that menu entry just that once.

Works for me on Fedora.

Clouds and VPSes

Posted Apr 25, 2022 14:23 UTC (Mon) by wtarreau (subscriber, #51152) [Link]

Yep it does and I discovered this one very recently, thank you for sharing anyway because it's possible it'll help others!

However it only works when the machine reaches grub, and that one is particularly stubborn and decides to boot again from the first disk because boot priorities are reset every second boot or so... I simply gave up doing kernel testing on that one.

Clouds and VPSes

Posted Apr 25, 2022 15:45 UTC (Mon) by Wol (subscriber, #4433) [Link]

Does it work if you can't move the default from entry 1?

Last time I read the grub documentation, it told you how to changed the default boot entry from entry one, and then had the caveat "this only works if ...". Of course, my system breaks that "if"...

Cheers,
Wol

Clouds and VPSes

Posted Apr 22, 2022 1:06 UTC (Fri) by bartoc (guest, #124262) [Link] (4 responses)

I have never, ever, experienced a UEFI system that was slower to boot in UEFI mode than legacy mode. Things are usually faster because, for example, the firmware won't initialize my SAS expander unless it's actually going to boot off it. I've had several systems where some add-in card with legacy OpRoms would hang the system for over _30 minutes_ on boot if you turned on legacy support.

This applies to laptops, desktops, and server hardware.

I haven't used a system that doesn't support EFI only mode (i.e. no oproms or anything required) for at least 10 years.

In any event I would like fedora to stop silently installing in BIOS mode, I've made that mistake several times and you need to reinstall the whole OS to fix it.

Clouds and VPSes

Posted Apr 22, 2022 9:35 UTC (Fri) by rwmj (subscriber, #5474) [Link] (3 responses)

We're talking about VMs, and UEFI is noticeably many times slower to boot.

Clouds and VPSes

Posted Apr 22, 2022 10:52 UTC (Fri) by amacater (subscriber, #790) [Link]

Everyone will have different experiences: mine is that UEFI on a VM is still quicker than BIOS - Tianocore and kvm work perfectly well.

BIOS is _dead_ in the sense that new hardware doesn't support it, it's not being developed - and when Linux eventually is forced to move to attestation by market pressure it'll be dead anyway.

Although I've a 25 year old laptop somewhere in my junkpile - I'm hardly expecting to resurrect it - and it's been some years since I've _needed_ BIOS (except for a couple of HP Microservers which are annoying in that firmware is a paid for support contract upgrade).

Clouds and VPSes

Posted Apr 22, 2022 11:30 UTC (Fri) by mjg59 (subscriber, #23239) [Link] (1 responses)

Which environments are you testing this in? It doesn't match my experience at all - we transitioned all of Google's internal cloud desktop environments to UEFI without anyone noticing.

Clouds and VPSes

Posted Apr 24, 2022 11:55 UTC (Sun) by johannbg (guest, #65743) [Link]

Google also ( almost to the date ) 2 years ago made Unified Extensible Firmware Interface (UEFI) and Shielded VM the default for everyone using Google Compute Engine and provided migration path from on premis uefi based vm images into that environment.

Clouds and VPSes

Posted Apr 21, 2022 10:30 UTC (Thu) by leoluk (guest, #97665) [Link] (10 responses)

As long as distros keep supporting legacy boot, cloud providers have little incentive to switch to EFI boot.

Clouds and VPSes

Posted Apr 21, 2022 10:41 UTC (Thu) by johannbg (guest, #65743) [Link] (6 responses)

Right because people are like water, they always take the shortest route.

Clouds and VPSes

Posted Apr 21, 2022 12:23 UTC (Thu) by dullfire (guest, #111432) [Link] (5 responses)

> Right because people are like water, they always take the shortest route.

I would suggest looking at some maps with rivers on them.

Clouds and VPSes

Posted Apr 21, 2022 13:41 UTC (Thu) by smoogen (subscriber, #97) [Link] (4 responses)

There is a common language translation where a phrase gets switched by one or two words and looks the same to the non-native speaker. If we go with 'people like water always take the easiest route', does that make the original phrase better for you?

Clouds and VPSes

Posted Apr 21, 2022 14:34 UTC (Thu) by Wol (subscriber, #4433) [Link]

Time flies like an arrow, fruit flies like a banana ...

Cheers,
Wol

Clouds and VPSes

Posted Apr 21, 2022 16:08 UTC (Thu) by rgmoore (✭ supporter ✭, #75) [Link] (2 responses)

The criticism isn't of the wording, it's of the content. Water frequently does not take the shortest route, as you can determine by looking at a map. Instead, rivers meander all over the place. A river can even erode through the soil into the underlying rock, causing its old meandering path to be literally set in stone.

There may be some truth to the idea of people behaving like water, but it has more to do with their path being heavily determined by history. Both will usually take an established route even when it is long and convoluted. It's only the occasional dramatic event that causes rivers- or people- to change their course.

Clouds and VPSes

Posted Apr 21, 2022 16:16 UTC (Thu) by sfeam (subscriber, #2841) [Link]

People are like water: both will stagnate in a local minimum rather than finding the energy to overcome a barrier that constrains them.

Clouds and VPSes

Posted Apr 21, 2022 17:38 UTC (Thu) by johannbg (guest, #65743) [Link]

I propably should have said people are like water, they always take the path of least resistance.

Those that are bothered by the inaccuracy of that can replaces "least resistant" with the "distribution of flow that will lead to the least "total" resistance" but most people should have gotten the gist of what I meant.

Clouds and VPSes

Posted Apr 21, 2022 13:42 UTC (Thu) by rwmj (subscriber, #5474) [Link] (2 responses)

If every distro switched this might be the case, but it's unlikely if only Fedora does it. However big things which might make this happen would be Windows 11 and RHEL 10, although one is not very relevant on cloud and the other is some years in the future.

Clouds and VPSes

Posted Apr 21, 2022 18:18 UTC (Thu) by johannbg (guest, #65743) [Link] (1 responses)

Well it all starts with one distribution taking the lead, usually it's Arch these days but Fedora is better positioned to take the lead for this particular change.

That said why should UEFI miracles start happening when RHEL 10 get's released?

Clouds and VPSes

Posted Apr 22, 2022 0:52 UTC (Fri) by bartoc (guest, #124262) [Link]

One could argue that arch supports neither firmware standard, since they don't have an installer. At best they just package bootloaders.

Clouds and VPSes

Posted Apr 21, 2022 14:37 UTC (Thu) by cortana (subscriber, #24596) [Link]

I think there are still issues about snapshotting VMs that were booted with UEFI (though perhaps this is a limitation in libvirt rather than QEMU?)

Clouds and VPSes

Posted Apr 21, 2022 21:10 UTC (Thu) by dmoulding (subscriber, #95171) [Link]

Yes, exactly this. I'd bet the number of Linux installations on BIOS *today* outnumbers the number of installations on UEFI ten fold. And they are even *thinking* about deprecating BIOS now?

Fedora considers deprecating legacy BIOS

Posted Apr 21, 2022 8:27 UTC (Thu) by Lionel_Debroux (subscriber, #30014) [Link] (1 responses)

In the Phoronix forum thread about the same topic, "skeevy420" mentions the Clover bootloader, which has an ability to emulate a UEFI.
I'm sharing the link to 1) spread the knowledge (it was the first time I read about that project) and 2) possibly get some interesting takes from users of that project :)

Fedora considers deprecating legacy BIOS

Posted Apr 22, 2022 16:24 UTC (Fri) by mattdm (subscriber, #18) [Link]

Yeah, we talked about that briefly in the Fedora mega-thread. It's an interesting idea, but would require some people really excited about it to adapt to our needs.

sneaky dual-boot

Posted Apr 24, 2022 20:15 UTC (Sun) by ballombe (subscriber, #9523) [Link] (5 responses)

Sometime it is useful to setup the computer so that a different OS boots depending whether UEFI or BIOS is used.
It is also possible to have two different partitions tables (GPT and legacy) on the same disk.

sneaky dual-boot

Posted Apr 25, 2022 0:46 UTC (Mon) by pabs (subscriber, #43278) [Link] (3 responses)

What about the opposite; is it possible to set up a system so that it can boot in either UEFI or BIOS mode? IIRC current install systems don't do that, but can themselves be booted in either UEFI or BIOS mode.

sneaky dual-boot

Posted Apr 25, 2022 11:44 UTC (Mon) by lsl (subscriber, #86508) [Link]

Fedora's cloud image does that, I think.

sneaky dual-boot

Posted Apr 27, 2022 11:57 UTC (Wed) by plugwash (subscriber, #29694) [Link] (1 responses)

Many distro install images nowadays support four different boot methods.

Legacy HD-media
Legacy optical media
UEFI HD-media
UEFI CD

In principle it would be possible for an installed system to support both UEFI and Legacy. I do see a few issues though.

1. Operating systems using UEFI installed on fixed drives are supposed to register themselves with the firmware(which requires the installer to berunning in UEFImode) rather than relying on a fixed entry point on the drive. In practice it's possible to boot using the "removable media path" even on a fixed drive but it's not the official way to do things.
2. While the combination of BIOS boot and GPT is technically feasible it's notexactly standard, I'm not sure if grub supports it or if a hybrid partion table (which is it's own can of worms) is needed.
3. There is no gaurantee that what works in one mode will work in the other.
4. Multiboot becomes even more of a can of worms than usual.

sneaky dual-boot

Posted Apr 27, 2022 14:55 UTC (Wed) by jem (subscriber, #24231) [Link]

While the combination of BIOS boot and GPT is technically feasible it's notexactly standard, I'm not sure if grub supports it or if a hybrid partion table (which is it's own can of worms) is needed.

GRUB supports booting from a GPT disk in BIOS mode, but you will need an extra BIOS boot partition. A disk with an MBR partition table usually contains a gap between the boot record and the first partition, which GRUB takes advantage of. GPT-partitioned disks do not (typically) have this "no man's land", so a separate partition is used instead. Using a partition is cleaner anyway, and GPT also does not have a practical limit on the number of partitions a disk can contain, so one extra partition doesn't make a big difference.

sneaky dual-boot

Posted Apr 26, 2022 12:43 UTC (Tue) by nix (subscriber, #2304) [Link]

Done that mistakenly, on several occasions. It is *incredibly* confusing! The machine hardly ever gives any sort of on-screen indication of how it's booting, so the symptom is often that you install one OS, reboot, and the OS the machine used to run leaps into action as if it was not installed over, with the new one invisible (because it's using a completely different partitioning scheme) and with the old one often misbehaving (because parts of it have just been overwritten more or less completely at random).

This fubar is becoming rarer now because few machines with existing DOS partition tables are getting GPT-reformatted, and the installers that do that are using wipefs or equivalent and thus are *actually* wiping out the old one properly. But oh good grief was it confusing for a few years.

Fedora considers deprecating legacy BIOS

Posted Apr 29, 2022 8:24 UTC (Fri) by yuhong (guest, #57183) [Link]

Personally all the papers on NVMe SSD based search engines are enough of a reason to end legacy BIOS boot for me.


Copyright © 2022, Eklektix, Inc.
This article may be redistributed under the terms of the Creative Commons CC BY-SA 4.0 license
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds