Posted on 05/28/2013 9:20:00 AM PDT by ShadowAce
Summary: Short synopsis of a long discussion with the UEFI Forum regarding secure boot
We dont always speak to figures of authority in pursuit of reform, but when we do, it is rather productive (pardon the meme). OIN is a good example of this. Last year, UEFI criticism began as a feature of UEFI, namely secure boot, was put to use by Microsoft, which basically misused it for anticompetitive reasons, making it hard to boot GNU/Linux.
Security was not the main outcome of UEFI secure boot being put in place.The UEFI Forum got in touch with yours truly, setting up an interview for exchange of thoughts and ideas. It was productive because a consensus we reached was that secure or Restricted Boot in UEFI has no purpose (or little purpose) other than to serve or facilitate business models of corporations, at the expense of customers. It is akin to DRM and TiVoization and it is hard to defend the inclusion of this antifeature, for reasons we covered here before . It was a one-hour conversation mostly with the president of the UEFI Forum, who is a technical and humble man. I politely made suggestions for UEFI, focusing on freedom aspects, and there was no lack of subjects to discuss (including patents). After an hour had lapsed we decided to call it a day (it was Friday night and I was already late to meet some friends at a local pub), but the mutual sentiment can be described as amicable. I accepted the invitation hoping it would lead to progress, not friction. The phone conference focused on questions pertaining to UEFI, with clear focus on the negative aspects, i.e. areas of improvement. In it were UEFI spokespersons Mark Doran, UEFI President, and Michael Krau, UEFI Forums Industry Communications Working Group (ICWG) Chair. A lady called Christine was there also, but she did not participate in the technical discussion; she had helped set it all up.
To summarise some of the key points, it was agreed that secure boot only gives UEFI Forum a lot of negative publicity. Other issued were raised, but none else got the same amount of coverage, I had not prepared notes, mostly because the goal was to focus on freedom and not to deviate from that. UEFI Forums President was understanding. He said I was asking the right questions and did acknowledge that some of my concerns were legitimate (the conversation was recorded with consent from them, but it is not for publication).
Security was not the main outcome of UEFI secure boot being put in place. They agreed to some degree. Thats why it was productive as a lengthy debate.
Towards the end, emanating from the conversation were the following tips and links, prepared and sent by Christine, who had also been on the conference call. She wrote:
> Thank you for taking the time to speak with us to address your questions
> regarding the UEFI Forum. If you have any additional questions or need
> information, please dont hesitate to reach out to me.
>
>
>
> For your reference, Im including a link to an abstract of the
> presentation
> http://www.linuxtag.org/2013/de/program/freitag-24-mai-2013.html?eventid=6
> referenced today by Mark Doran, President of the UEFI Forum, and
> delivered by Matthew Garrett at the Linux Tag conference in Berlin. The
> title of Garretts presentation is Making UEFI Secure Boot Work for Linux.
>
>
>
> During the call, Mark also suggested that you might want to view the
> repository of information pertaining to UEFI at Tianocore.org
> http://sourceforge.net/apps/mediawiki/tianocore/index.php?title=Welcome,
> a community site surrounding the open source components of Intels
> implementation of UEFI.
>
>
>
> And following are links to the three Intel YouTube videos Mark
> referenced about UEFI Secure Boot configuration:
>
> · Part 1 http://www.youtube.com/watch?v=eAnlhkbMang Enabling
> & Disabling UEFI Secure Boot. Instructions for setting up a system with
> UEFI Secure Boot to dual-boot between Microsoft* Windows* 8 & Ubuntu*
> 12.10.
>
> · Part 2 http://www.youtube.com/watch?v=dwlbf1VRJ60 -UEFI
> dual-boot setup with Microsoft* Windows* 8. Instructions for setting up
> a system with UEFI Secure Boot to dual-boot between Microsoft Windows 8
> & Ubuntu 12.10.
>
> · Part 3 http://www.youtube.com/watch?v=eAnlhkbMang UEFI
> dual-boot setup with Linux* (Ubuntu* 12.10). Instructions for setting up
> a system with UEFI Secure Boot to dual-boot between Microsoft* Windows*
> 8 & Ubuntu* 12.10.
>
>
>
> Again, thank you for your time, and please let me know if I can provide
> you with additional information.
To go along with secure boot is to help endorse what sure has become a threat to booting freedom, not just to choice. The conference did not alter my mind in any way on this topic. The key point, as was made abundantly clear to them, is that secure boot does a major disservice to UEFI by giving it bad reputation an inevitability when a convicted monopolist like Microsoft perturbs UEFI for non-technical reasons. █
Thanks so much, but I don’t understand any of it.
I like to read all the techie stuff, however.
That’s great—No better way to learn than to read about subjects you don’t understand :)
What I get is that Microsoft wants to lock every computer into running the “current” version of Microsoft operating system.
No doubt they dream of everyone being required to pay annual or per-use fees for every computer.
So is it more secure or not? If it is I’m fine with it. If it doesn’t make it more secure then it is a waste and sense of false security limiting our options.
I’m having a hard time seeing how it can be more secure.
The guys who fixed this for me were as stumped as you were.
LOL!
Doesn’t this prevent rootkits and the like?
But I would think that rootkits write to the disk. <shrug>
Supposedly, there is some malware that can operate before the OS loads. I'm guessing that means the BIOS has been infected.
OK--I'm wrong in that. The MBR could also be infected.
So it would help prevent those types of root kits. Which are probably the worst ones to fix as you pretty much have to start over and even then you may end up with the malware. If UEFI fixes this then I’m happy to use it.
That's fine. I have no issue with that. But make it optional. And don't let software companies dictate to hardware companies whether or nor to allow disabling of the feature.
That is usually the issue with security. If you allow it to be disabled you also allow the malware guys to disable it as well.
But possibly a jumper setting would do it. But then if you allow a physical jumper I guarantee you someone would make a soft jumper and then the roots are back in.
If the market is sound then I’m sure venders will make Motherboards without it. If they don’t then someone else will. If no one does then the market really isn’t viable and you’re one of the few that want it.
Disclaimer: Opinions posted on Free Republic are those of the individual posters and do not necessarily represent the opinion of Free Republic or its management. All materials posted herein are protected by copyright law and the exemption for fair use of copyrighted works.