LWN: Comments on "Garrett: Secure Boot and Restricted Boot" https://lwn.net/Articles/544611/ This is a special feed containing comments posted to the individual LWN article titled "Garrett: Secure Boot and Restricted Boot". en-us Sat, 06 Sep 2025 07:10:20 +0000 Sat, 06 Sep 2025 07:10:20 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/547031/ https://lwn.net/Articles/547031/ hummassa <div class="FormattedComment"> I will complement my last comment, above, trying to clarify my position. English is not my native language, so I apologize if not everything I think about the subject came across.<br> <p> 1. I believe the difference between what is called "secure" and "restricted" boot modes is a single bit in policy.<br> <p> 2. I do believe "secure" boot adds to security -- like locking your door, it does not add a lot, but you only has to run faster than your campmate when the bear comes. Mixing metaphors rules!<br> <p> 3. It is my impression that, just like locking your door, "secure" boot is not a deterrent to a determined, targeted attack... and those are the ones that worry me more.<br> <p> 4. In my firm opinion, "secure" boot plays into the commercial interests of the same people that are pushing, and will continue pursuing, "restricted" boot.<br> <p> 5. In conclusion, it is my opinion that doing any more work WRT "secure" boot once the loading shim is already signed and working is a disservice to the free and open source software community.<br> <p> 6. Even so, it is also my believe that I don't have the right tell you (or anyone else) what free software you should or should not work on (unless I pay you to work in whatever I want only).<br> <p> 7. But I have the right to think that people are being silly and pointing it out.<br> </div> Thu, 11 Apr 2013 17:43:45 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/547033/ https://lwn.net/Articles/547033/ mjg59 <div class="FormattedComment"> The rest of it says nothing about security, so I'm not sure how it's relevant to the case in hand.<br> </div> Thu, 11 Apr 2013 17:36:40 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/547028/ https://lwn.net/Articles/547028/ hummassa <div class="FormattedComment"> you redacted the important part of the sentence... ;-)<br> </div> Thu, 11 Apr 2013 17:29:27 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546968/ https://lwn.net/Articles/546968/ mjg59 <div class="FormattedComment"> You said <br> <p> <font class="QuotedText">&gt;"secure" boot does not help securing the boot process</font><br> <p> in <a href="http://lwn.net/Articles/546340/">http://lwn.net/Articles/546340/</a> .<br> </div> Thu, 11 Apr 2013 14:05:56 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546955/ https://lwn.net/Articles/546955/ hummassa <div class="FormattedComment"> Actually, if you open this whole thread and search for my comments, you'll see that it's exactly what I have been saying all along.<br> </div> Thu, 11 Apr 2013 13:39:53 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546884/ https://lwn.net/Articles/546884/ PaXTeam <div class="FormattedComment"> <font class="QuotedText">&gt; How do you know that you didn't just install to some malicious hypervisor?</font><br> <p> hypervisors are trivial to detect, no need for SB.<br> </div> Wed, 10 Apr 2013 21:36:27 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546871/ https://lwn.net/Articles/546871/ paulj <div class="FormattedComment"> Oh, the Linux foundation shim loader should make blue pill attacks viable, even with "Secure Boot". So we'll see how long it stays signed and useable...<br> </div> Wed, 10 Apr 2013 20:33:52 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546867/ https://lwn.net/Articles/546867/ paulj <div class="FormattedComment"> Yes, "Secure Boot" would make "blue pill" harder, and provide a window during which to be able to detect OS subversion. However, you don't need "Secure Boot" to wipe &amp; re-install - firmware usually provides a way to do this independent of any existing media. <br> <p> If you say the firmware could be exploited then "Secure Boot" might not help either, if there is any unsigned, modifiable data that is parsed by the firmware. The firmware then may be as open to re-exploitation as the base OS. <br> </div> Wed, 10 Apr 2013 20:30:57 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546769/ https://lwn.net/Articles/546769/ mathstuf <div class="FormattedComment"> <font class="QuotedText">&gt; When the device is returned, the owner can wipe and re-install.</font><br> <p> How do you know that you didn't just install to some malicious hypervisor? That's what Secure Boot helps with. With a blue pill virus, you have to wipe BIOS to be sure you are running what you installed. And if the user had full access, that's certainly a possibility.<br> </div> Wed, 10 Apr 2013 14:08:09 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546750/ https://lwn.net/Articles/546750/ paulj <div class="FormattedComment"> And yeah, I'm bunching together a number of issues here under "inaccessible" computing. :)<br> </div> Wed, 10 Apr 2013 12:03:41 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546736/ https://lwn.net/Articles/546736/ paulj <div class="FormattedComment"> Oh, and yes, it has been a good debate. Thanks :). Hope some of my more terse posts didn't come over as too abrasive!<br> <p> Re the risks and our outlook. I do understand that some phones aren't locked down, and this is a selling point in some segments. I can understand why you see this as progressive and hopeful. However, I think that's a short-term view of things.<br> <p> Look at the long-term of computing. Over my lifetime, computers have become ever more closed and user-hostile. When I was very young, all computers had full programming information publically available, from peripheral hardware, to the CPU, to the software environment. Often these were supplied with the computer by default. Some computers even came with full schematics for the board and/or CPU, even the entire system. As time progressed, the programming information available became more limited. Vendors tried to restrict the information even more. Most systems today, even ostensibly "open" ones, tend to have many components that are not documented. Sometimes even CPU software programming interfaces are kept hidden. Further, vendors have even tried to control what software can be run at all, using a variety of schemes.<br> <p> The phones you speak of that are not locked are still, from my perspective, extraordinarily closed systems. They often contain non-publically-documented CPUs and DSPs. We're in the position where a computer that is touted as being the BBC micro for this era, the "open" hackable computer for today's youth, the raspberry Pi, runs the "open" software only under the control of another, undocumented CPU that requires a proprietary blob to boot it.<br> <p> From my perspective, "Secure Boot" - which we're agreed is "Restricted Boot" minus 1 bit of information (or policy as someone else put it), with that bit under control of the vendor - is another step down this path of ever more locked-down and inaccessible computing.<br> <p> Your perspective clearly is more optimistic than mine though. ;)<br> </div> Wed, 10 Apr 2013 10:16:42 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546725/ https://lwn.net/Articles/546725/ paulj <div class="FormattedComment"> That's one legitimate use-case, agreed. With that in mind is why I wrote "user-owner" in some previous comments. :)<br> <p> Personally, I'm happy to forego this use-case. I don't think the non-owner-user should necessarily be limited from using the device either. Further, generally it'd be better to keep restrict sensitive software to stay on owner-controlled servers as much as possible, rather than rely on "Restricted Boot", from a security perspective. When the device is returned, the owner can wipe and re-install.<br> </div> Wed, 10 Apr 2013 06:43:49 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546724/ https://lwn.net/Articles/546724/ paulj <div class="FormattedComment"> Still though, you're putting your faith in a security technology whose effectiveness depends on an arms race where the "bad" guys are routinely way ahead. We simply do not know how to make software secure, and so there's no way we can make a large base OS secure. You're *will* regularly lose, if/when you're attacked.<br> <p> To have any hope of winning the arms race, your faith must go into software that both a) is minimal in size b) is minimal in the services it presents to software that uses it c) and limits the scope of software using it. Userspace sand-boxing and VMs basically. The Android user-space is the state-of-the-art in the real-world, widely-deployed system space when it comes to security and isolation of code, I think. And note that that security model does NOT rely on "Secure Boot".<br> <p> That's not OS hypervisors, note, because if you're simply running the same OS in the hypervisor you still have the same problem in your virtualised OS. You have a more secure OS underneath to do integrity checks from, I'd agree, but it does not give you any means to have any additional trust in the software you're using at runtime. You still are just as prone to runtime subversion because you still have no isolation/sandboxing between the code &amp; data you don't trust and the rest of the software. Also, things like the Qemu hardware emulation (which seem to be used a lot elsewhere) can have relatively complex interfaces, and they weren't necessarily written in a "security first" way. There have been a number of exploits in this code over the years.<br> <p> </div> Wed, 10 Apr 2013 06:29:56 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546691/ https://lwn.net/Articles/546691/ mathstuf <div class="FormattedComment"> <font class="QuotedText">&gt; Probably there would be a magic key (escape or F1 or something) to make the pretty boot screen go away. In fact, I think this is the case now.</font><br> <p> Escape will toggle Plymouth. Since it's on a TTY, pretty much any arrow or function key will generate '^[', so they all work :P .<br> </div> Tue, 09 Apr 2013 21:25:04 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546689/ https://lwn.net/Articles/546689/ raven667 <div class="FormattedComment"> <font class="QuotedText">&gt; You still have a *massive* assumption: that the new kernel isn't subvertable.</font><br> <p> I don't think that is assumed, I'd have had to make the claim that any and all kernel images are perfect and totally secure for you to make that claim, I didn't and that's not a reasonable claim.<br> <p> <font class="QuotedText">&gt; Of those, how many would notice a discrepancy between the remotely logged version numbers and the local uname -a? Hell, how many would notice if the exploit didn't bother faking the version? :)</font><br> <p> Damn few, but once exploits in the wild start using that technique it becomes burned, some people will start putting automated checks in their logging systems and the technique will stop working. You see that happen with exploits, once they start circulating in the wild the vendor patches the vulnerability and it becomes less and less effective so that the cycle starts anew.<br> </div> Tue, 09 Apr 2013 21:15:33 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546687/ https://lwn.net/Articles/546687/ paulj <div class="FormattedComment"> You're assuming syslog gets to run before the system is re-subverted, alternatively, you're assuming syslog isn't subvertable through anything it reads. I'll grant those assumptions, while not rock-solid, aren't terribly far-fetched. <br> <p> You still have a *massive* assumption: that the new kernel isn't subvertable.<br> <p> While, perhaps, the subversion that compromised your box on the previous boot may be fixed, that doesn't mean there aren't still a number of other extant holes still unpatched, that only the exploit writers know about. <br> <p> You're assuming the exploit has only laid 1 trap to ensnare the next boot.<br> <p> Back to syslog: How many remotely syslog? Of those, how many would notice a discrepancy between the remotely logged version numbers and the local uname -a? Hell, how many would notice if the exploit didn't bother faking the version? :)<br> </div> Tue, 09 Apr 2013 20:52:52 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546684/ https://lwn.net/Articles/546684/ paulj <div class="FormattedComment"> The uname -a version info the user might query would, by then, be with the kernel subverted again during (early?) boot.<br> <p> Kernel info pre-boot, or kernel init might be harder to change with Secure Boot, but that doesn't get shown anymore by default. Fedora doesn't even mention version info in the default bootloader UI anymore.<br> </div> Tue, 09 Apr 2013 20:40:21 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546679/ https://lwn.net/Articles/546679/ raven667 <div class="FormattedComment"> Yes, the messages are generally hidden behind splash screens but are still accessible (the display office is in a filing cabinet in a disused lavatory in the basement with a sign on the door "Beware of Leopard" 8-) Aside from the possibility of an exploit of the firmware or kernel from stored config or filesystem metadata the kernel can't be subverted at the time those messages are printed. A syslog which sends the logs remotely or which signs them so the can't be removed/modified on disk, like rsyslog or the systemd journal, could also prevent the malware from being hidden even if it tries to retroactively edit the dmesg buffer after the malware starts, presuming that the system software is started before the malware is allowed to.<br> <p> The world is not a perfect place but it seems you still have more and better options with boot time validation than without any. Heck, the threat of failing a validation check should keep most malware away of the difficult to exploit protected parts and focused on the easier unprotected parts later in the boot process where it is simpler to deal with.<br> </div> Tue, 09 Apr 2013 20:34:49 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546681/ https://lwn.net/Articles/546681/ apoelstra <blockquote> The messages which modern distros have hidden away behind user friendly splash screens?</blockquote> Right now, without secure boot, it wouldn't help anything to display version information on boot because running 'uname -a' on the booted system would have the same effect. In a secure boot world if you've got a way to display a version and <i>cryptographically prove</i> that it is not a lie, it would be used.<br /><br /> Probably there would be a magic key (escape or F1 or something) to make the pretty boot screen go away. In fact, I think this is the case now. Tue, 09 Apr 2013 20:22:54 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546677/ https://lwn.net/Articles/546677/ paulj <div class="FormattedComment"> Oh, and under the control of the subverted software :)<br> </div> Tue, 09 Apr 2013 20:03:30 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546675/ https://lwn.net/Articles/546675/ paulj <div class="FormattedComment"> The messages which modern distros have hidden away behind user friendly splash screens?<br> </div> Tue, 09 Apr 2013 20:00:56 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546672/ https://lwn.net/Articles/546672/ mathstuf <div class="FormattedComment"> <font class="QuotedText">&gt; At that point, you no longer have a general purpose system.</font><br> <p> Some places might want to supply devices to others and ensure that it is indeed *not* a general purpose system for a legitimate reason. The user is not necessarily the owner in all cases (e.g., schools lending students laptops, employers, etc.). I can imagine schools wanting to make sure that no student can overwrite required software on the machine (possible excuses) and for IT support savings. This is "Restricted Boot" as far as the physical user of the machine is concerned, but "Secure Boot" from the actual owner's point of view. As far as vendors doing "Restricted Boot", yes, that's not good. However, *owners* being able to enforce "Restricted Boot" is not necessarily a bad thing.<br> </div> Tue, 09 Apr 2013 19:56:59 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546665/ https://lwn.net/Articles/546665/ raven667 <div class="FormattedComment"> I was thinking more about the message which are printed as the kernel boots up, the first of which is the version information.<br> </div> Tue, 09 Apr 2013 19:08:19 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546660/ https://lwn.net/Articles/546660/ dlang <div class="FormattedComment"> <font class="QuotedText">&gt; It can fail to install the update but not hide that fact, it can't modify the boot procedure so you'd still be visibly booting the old kernel. </font><br> <p> Sure it could<br> <p> the label that is shown to the user has no connection with the binary blob that gets loaded, it's only convention that keeps them matching.<br> <p> Once the system boots the old kernel and loads the exploit, it can then lie about what version it is.<br> </div> Tue, 09 Apr 2013 18:55:13 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546657/ https://lwn.net/Articles/546657/ raven667 <div class="FormattedComment"> <font class="QuotedText">&gt; You can't patch a compromised system back to non-compromised status. The rootkit can just lie to you that it has installed the update. It can lie to you about the kernel version in boots there-after.</font><br> <p> It can fail to install the update but not hide that fact, it can't modify the boot procedure so you'd still be visibly booting the old kernel. If you can push update code into the verified part of the boot process, from the systemd recovery console maybe, then you might be able to update before the malware could even block it. You can certainly do that for the UEFI firmware itself which has a network stack and drivers that are available before your system could be re-exploited by malware.<br> <p> Of course, as I mentioned in the other thread, an exploit through unvalidated data reads such as configs, variables or filesystem mounts could subvert your checking before it gets off the ground but that's true regardless of the security precautions, your SELinux or file permissions aren't much good after malicious code is running around in the kernel.<br> <p> <font class="QuotedText">&gt; What you /really/ want is a "Secure Layer" between the software you don't trust (i.e. pretty much all software), and the software you have no choice but to trust (i.e. the base OS, which is on your side, but is too large and has to do too much low-level, fiddly work to be securable). Secure Boot doesn't give you that layer. The claimed security benefits are illusory.</font><br> <p> I think that's called a hypervisor 8-) Virtualizing x86 and using the extra layer of memory protection built into modern CPU/IOMMUs has a much lower vulnerability surface area than the userspace/kernelspace and has shown to be strong in practice given the low number of VM exploits compared to the number of kernel exploits. The fact that Secure Boot isn't a hypervisor doesn't detract or affect what it does try to do.<br> </div> Tue, 09 Apr 2013 18:44:54 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546628/ https://lwn.net/Articles/546628/ paulj <div class="FormattedComment"> You can't patch a compromised system back to non-compromised status. The rootkit can just lie to you that it has installed the update. It can lie to you about the kernel version in boots there-after.<br> <p> Once your box is compromised, you're hosed.<br> <p> You're deluding yourself that Secure Boot gives you the equivalent of "read-only media, except to the software I trust", because the base OS is simply *way* too large to trust to be secure against exploits. At least, for a general purpose, generally programmable OS.<br> <p> What you /really/ want is a "Secure Layer" between the software you don't trust (i.e. pretty much all software), and the software you have no choice but to trust (i.e. the base OS, which is on your side, but is too large and has to do too much low-level, fiddly work to be securable). Secure Boot doesn't give you that layer. The claimed security benefits are illusory.<br> </div> Tue, 09 Apr 2013 16:57:38 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546590/ https://lwn.net/Articles/546590/ raven667 <div class="FormattedComment"> <font class="QuotedText">&gt; I don't understand the read-only media / update benefit?</font><br> <p> I was just trying to say that the security properties it is trying to achieve are analogous to the properties of booting from read-only media, but with the ability to install updates even when running on Satan's Machine.<br> <p> <font class="QuotedText">&gt; You would need to heavily restrict the ability of the "Secure" software to load or read any external data, as well as restrict the ability of any user to modify any of the existing data. At that point, you no longer have a general purpose system.</font><br> <p> There is definitely the possibility of implementation bugs that trigger on the data which is loaded from early boot or by the OS. Filesystem bugs have been demonstrated in practice on USB sticks and are very nasty indeed. The difference is that you still have the ability to reliably patch the system, the fix can't be modified in transit. I should also point out that there is a limited attack surface that can be modified remotely affecting early boot so a greater benefit from auditing the critical code paths that touch untrusted data.<br> <p> <font class="QuotedText">&gt; What is your view on how the benefits to user-owners of "Secure Boot" weigh up against the risks that others use this technology to "Secure" the machine against the user-owner?</font><br> <p> I think it has a small but clearly tangible benefit while the risk is nebulous and in-tangible. There is a large installed base of systems such as Win7, Linux, *BSD which don't support a boot-locked, Tivoized system so I don't see the existing hardware getting firmware updates which change this behavior and break those installed systems. All of this is happening out in the open so it is no mystery if, in the future, a vendor tries to ship a boot-locked system or if MS tries to boot lock the next generation of hardware, there will be plenty of warning. That is something we all agree can and should be fought. <br> <p> <font class="QuotedText">&gt; Why will this not happen?</font><br> <p> Even in the phone market where boot locking is very common many vendors don't boot lock their devices and some (Google Nexus) explicitly call out the openness as a feature. I don't think it a likely outcome that the general purpose PC market becomes _more_ restrictive and locked down than the smart phone market. If MS and the hardware vendors wanted the machines to be boot locked then there would probably just be different SKUs for Win8 bootlocked machines and general purpose machines, like you see in the smart phone industry, but that's not what happened.<br> <p> <font class="QuotedText">&gt; Can you at least acknowledge this is a risk? </font><br> <p> Is there a reasonable risk that some vendor at some time will try an sell a boot locked x86 PC, sure that's possible, don't buy those machines and expect to run Linux on them, but is there a large risk that the vast majority of the market in the future, or the machines already shipped, become boot locked, I don't think that's a foreseeable outcome. I think it would be expensive and difficult to get hardware vendors and customers on that bandwagon for very little benefit as MS already gets a cut of most machine sales. Secure Boot can't even tell if you paid for the bits, only that they are signed, so it's useless against piracy.<br> <p> Thanks for the lively and civil debate, I think we both understand each other's ideas now and we agree on the core argument that boot locking is bad but I don't see the value in rejecting any boot verification, even an open, user-controlled one, just because it works like boot locking. <br> </div> Tue, 09 Apr 2013 16:31:10 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546592/ https://lwn.net/Articles/546592/ paulj <div class="FormattedComment"> The Secure Boot code, and the signing infrastructure brought in for Secure Boot can become Restricted Boot, if some platform flips the equivalent of a bit of information (see, e.g., the MS Surface ARM "Secure Boot", or future platforms), do you agree on that?<br> <p> If that abstract bit is flipped, it will be the "Secure Boot" code that stops you booting your own software, and restricts you to approved software. (Unless you have the expertise handy to the exploit the software - I don't).<br> <p> And still I havn't seen any convincing explaination for how this code helps protect me against those who /do/ exploit software regularly, for fun &amp; profit.<br> </div> Tue, 09 Apr 2013 15:51:43 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546589/ https://lwn.net/Articles/546589/ Cyberax <div class="FormattedComment"> And that's why antiviruses are a practical compromise. Yes, they are an ugly kludge but reality is also quite ugly.<br> <p> If Linux were as popular as Windows then it would have needed antivirus-like applications as well.<br> <p> And yes, Android actually already has an antivirus app that runs on Google's servers.<br> </div> Tue, 09 Apr 2013 15:27:29 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546588/ https://lwn.net/Articles/546588/ raven667 <div class="FormattedComment"> I'm not sure I'd use the words restriction, limitation or sand-box, as it can't prevent you from using the machine in any way you want, it just defines a signature checking and validation like Tripwire but with a way to update the database securely and a policy to not load files that haven't come through the owner's defined process.<br> </div> Tue, 09 Apr 2013 15:24:57 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546573/ https://lwn.net/Articles/546573/ hummassa <div class="FormattedComment"> I seriously doubt this goal is even possible.<br> </div> Tue, 09 Apr 2013 11:32:49 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546563/ https://lwn.net/Articles/546563/ paulj <div class="FormattedComment"> Oh, on sand-boxing. Fully agreed with such technologies. These seem to be the best way we have to secure our software - by limiting and controlling the environment it is run on. <br> <p> However, clearly, this does NOT require that the main OS environment be the one that is restricted, limited, sand-boxed, etc.. through things like Secure Boot.<br> </div> Tue, 09 Apr 2013 05:26:02 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546562/ https://lwn.net/Articles/546562/ paulj <div class="FormattedComment"> I don't understand the read-only media / update benefit? Secure Boot doesn't give you read-only media (see previous discussions about using existing data to exploit the "Secure Boot"ed software). You would need to heavily restrict the ability of the "Secure" software to load or read any external data, as well as restrict the ability of any user to modify any of the existing data. At that point, you no longer have a general purpose system.<br> <p> The attackers that are controlled will be the unsophisticated ones, the ones who can't write an exploit to begin with, and who don't have access to the ones already written. I.e. users who aren't generally in the habit of subverting boxes anyway, aren't aware of / in the security/cracking scene. I.e. normal users.<br> <p> What is your view on how the benefits to user-owners of "Secure Boot" weigh up against the risks that others use this technology to "Secure" the machine against the user-owner? E.g. those who control the software/machine before it is given to the user-owner, such as the vendor? Clearly you believe this system can be used to secure a machine to at least some extent (and I agree). So why not against the user-owner? All it takes is for the vendor to /remove/ one feature. That is 1 bit of information's difference to go from "Secure Boot" to "Restricted Boot". Why will this not happen?<br> <p> Can you at least acknowledge this is a risk? <br> <p> </div> Tue, 09 Apr 2013 05:23:48 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546547/ https://lwn.net/Articles/546547/ Cyberax <div class="FormattedComment"> So when is Linux going to be completely exploit-free with rigidly defined security sandboxes isolating applications' data?<br> <p> What? You say "never"?<br> </div> Mon, 08 Apr 2013 22:37:13 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546541/ https://lwn.net/Articles/546541/ raven667 <div class="FormattedComment"> <font class="QuotedText">&gt; What exactly will "Secure Boot" achieve, in the context of a full system? What threats will it guard against?</font><br> <p> It gives you the benefits of booting off read-only media but with the ability to update software without changing physical media. It provides a small limit on the ways an attacker can hide their activity by modifying your system and gives you some control over the software that you run, how much control you have is up to how much control you implement.<br> <p> <font class="QuotedText">&gt;At worst, it is deploying a system that will only secure systems against normal users, but not capable crackers (or those with access to the tools of such).</font><br> <font class="QuotedText">&gt; If nothing, then it is (at best) labour wasted.</font><br> <p> Agreed there is no point in wasting a lot of time on fancy control schemes when malware writers have clearly demonstrated the ability to just bury their malware in deeper layers of the systems if they have to. That's one reason why there hasn't been a lot of work on anti-malware tools on Linux although there has been a lot of work on sandboxing and containment technologies.<br> <p> </div> Mon, 08 Apr 2013 21:15:58 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546535/ https://lwn.net/Articles/546535/ viro <div class="FormattedComment"> In which respect? That Scamantec and their ilk get money from more suckers? I had a front-seat view of some of their games and I'd trust a politician sooner than those shits. If you rely on their products, you deserve everything you get - stupidity must be punished, after all...<br> </div> Mon, 08 Apr 2013 20:26:19 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546536/ https://lwn.net/Articles/546536/ paulj <div class="FormattedComment"> On the labour point: this only makes sense if:<br> <p> a) The overall goal is achievable<br> <p> OR<br> <p> b) The sub-task delivers some benefit of its own, regardless of whether or not the overall goal is achievable.<br> <p> It is highly doubtful that the overall goal is achievable, at least not with the way the software that compromises a Linux system is developed today. Indeed, it's highly uncertain the overall goal is achievable at all.<br> <p> So then the question is about b, what does "Secure Boot" achieve, if it is booting software that is swiss cheese to any half-decent exploit writer (but not to ordinary users, necessarily)? If nothing, then it is (at best) labour wasted. At worst, it is deploying a system that will only secure systems against normal users, but not capable crackers (or those with access to the tools of such).<br> <p> What exactly will "Secure Boot" achieve, in the context of a full system? What threats will it guard against?<br> </div> Mon, 08 Apr 2013 20:19:47 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546528/ https://lwn.net/Articles/546528/ raven667 <div class="FormattedComment"> <font class="QuotedText">&gt; However, fitting a lock to my front door would *not* be the best prioritisation of my resources if the windows and other external entrances still hadn't had window frames &amp; glass, &amp; doors fitted</font><br> <p> I have two points here, 1) The development labor happens in parallel and independently so there is no prioritization implied, work on Secure Boot doesn't take away work from other security technologies, multiple things can be worked on at once. 2) There is already quite a depth of available security technologies from permissions to SELinux to various sandboxing and namespace technologies to whole VMs so it is not fair to say that other avenues of attack aren't covered in some way. Secure Boot is a fall back position to help recover a system when those other technologies have failed but those other technologies are on the front line of defense and are being worked on all the time.<br> <p> <font class="QuotedText">&gt; Because it is equally possible to write an exploit for early, privileged userspace, and use a general runtime exploit to install it. "Secure Boot" buys you *nothing* in this context.</font><br> <p> This really depends on how far you can extend your prevention of unauthorized remote modification. At some point you have to allow arbitrary code to run but the farther you can push that out the more base OS tools you can fall back on to reliably clean out the later layers, including anti-malware software.<br> <p> <font class="QuotedText">&gt; However, "Secure Boot" CAN prevent the average *OWNER* of the machine from using the machine - once the "restricted boot" bit is set by some other party (e.g. the hardware vendor). In this context, the "Secure Boot" technology does indeed generally work. It makes "Restricted Boot" work.</font><br> <p> Secure Boot _can't_ be used to prevent the owner of the machine from doing what they like because that's not how the policy works, so that's not how the technology works. Fighting against a policy change to enable boot locking, which is what the article is about and where you share common ground, doesn't require one to be against boot time signature verification in any form just because it uses the same technology. <br> <p> You can join on the common ground of being generally against boot locking if you are willing to accept that some people do actually like the idea of user-controlled boot time signature verification.<br> <p> I see this whole debate, of being generally anti-SecureBoot, as being the same arguments as being anti-encryption. The anti-encryption stance is that "bad guys" might use unbreakable encryption to "bad things" so therefore no one should be allowed to have encryption without allowing that the "good guys" use of encryption outweighs the potential for bad use.<br> </div> Mon, 08 Apr 2013 18:50:01 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546516/ https://lwn.net/Articles/546516/ kleptog <div class="FormattedComment"> Actually, I'd like clarification how Restricted Boot helps a DRM system. AFAICS it will merely lull media companies into a false sense of security because they might think it actually secures the system while it only secures the boot process.<br> <p> Take any software that implements DRM, run it in a VM and you can bypass anything. You will need to arrange to run the exploit every boot though.<br> <p> I find most interesting the contrast:<br> <p> Securing a PC against malware - good<br> Securing an platform against hacks on the DRM - bad<br> <p> While these two situations are technically indistinguishable.<br> </div> Mon, 08 Apr 2013 18:21:54 +0000 Garrett: Secure Boot and Restricted Boot https://lwn.net/Articles/546505/ https://lwn.net/Articles/546505/ kleptog <blockquote> Sure, it'll wait until the luser logs in. BFD.</blockquote> Actually, I find this a BFD. It means the virus scanner started at boot has a chance to download new signatures and scan for the malware before it has a chance to run. That's a significant improvement over the current situation. Mon, 08 Apr 2013 18:09:16 +0000