Linux - SecurityThis forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.
Notices
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Get a virtual cloud desktop with the Linux distro that you want in less than five minutes with Shells! With over 10 pre-installed distros to choose from, the worry-free installation life is here! Whether you are a digital nomad or just looking for flexibility, Shells can put your Linux machine on the device that you want to use.
Exclusive for LQ members, get up to 45% off per month. Click here for more info.
There are ongoing debates on how one needs to protect his/her computer from malicious code which modifies pre-boot process(es). There are also articles and blogs talking about what we (alternative OS users) can do to tackle the troubles secure boot will bring us. However, as long as I understand it, the whole mess is forced down our throat only to cover a single company's a**, who is not doing a good job protecting its crappy flagship product. We don't really have that kind of malware in the *nix land so far which is feasible in a technical perspective, do we?
Also, I'm thinking of replacing my old machine (desktop) and I'm going to build from parts. Are there any new motherboards available out there without the mentioned trouble (i.e. secure boot)?
"Secure Boot" prevents the boot loader on a motherboard from loading non-signed boot code. No more, no less. If the only malicious software in existence were programs modifying the boot loader then yes, that would protect users from malware.
However, if malicious software can exploit security flaws in the OS or device drivers, then "Secure Boot" offers absolutely no protection. And of course, that's exactly how most malware works.
The idea behind "Secure Boot" is to establish a trust chain from pre-boot to a user session. Users can be prevented from loading software and drivers by OS enforced signing mechanisms, and the OS itself cannot be modified without compromising the boot signature. Result: The user has very little control over the environment in which his/her software runs, and that is the entire point. No way to circumvent DRM.
Result: The user has very little control over the environment in which his/her software runs, and that is the entire point. No way to circumvent DRM.
And no way to circumvent corporate policies. In corporate environments Secure Boot actually makes sense. Most home users forget that not every machine is standing in a private environment.
And no way to circumvent corporate policies. In corporate environments Secure Boot actually makes sense. Most home users forget that not every machine is standing in a private environment.
Corporate policies are enforced by the OS. I don't see how Secure Boot improves security in that scenario.
A user who intentionally tries to circumvent corporate policy will probably be able to do so, Secure Boot nonwithstanding, provided he/she has access to the right tools or the knowledge to create them. After all, if malware can exploit security vulnerabilities in the OS (or in drivers or applications) so can a user, especially one with physical access to the hardware.
In corporate environments Secure Boot actually makes sense. Most home users forget that not every machine is standing in a private environment.
That does not justify requiring all machines, even those purchased for home use, to have Secure Boot implemented.
That only justification for that is to conclude that the forces behind Secure Boot are attempting to implement their own walled orchard, a la Apple. Whatever the theoretical dangers of root kits may be, the impulse behind requiring Secure Boot as a condition of sale ("Windows Certified") is clearly anticompetitive.
Corporate policies are enforced by the OS. I don't see how Secure Boot improves security in that scenario.
A user who intentionally tries to circumvent corporate policy will probably be able to do so, Secure Boot nonwithstanding, provided he/she has access to the right tools or the knowledge to create them. After all, if malware can exploit security vulnerabilities in the OS (or in drivers or applications) so can a user, especially one with physical access to the hardware.
Corporate policies enforced in the OS are worth nothing if a part-time admin is able to boot the machine with a Knoppix CD. This approach does not work, not even after resetting the BIOS with the usual tricks, when Secure Boot is enabled without leaving traces.
Quote:
That does not justify requiring all machines, even those purchased for home use, to have Secure Boot implemented.
That only justification for that is to conclude that the forces behind Secure Boot are attempting to implement their own walled orchard, a la Apple. Whatever the theoretical dangers of root kits may be, the impulse behind requiring Secure Boot as a condition of sale ("Windows Certified") is clearly anticompetitive.
If Secure Boot must be implemented is more or less meaningless when the same standard that enforces the implementation enforces that there must be a possibility to disable it and a possibility to add custom keys.
If Secure Boot must be implemented is more or less meaningless when the same standard that enforces the implementation enforces that there must be a possibility to disable it and a possibility to add custom keys.
The key word there is "must."
The "must" is a marketing requirement of a software company whose marketing practices have long been less than sterling, not the recommendations of a neutral security taskforce or certification organization.
Keywords: marketing requirement.
Whatever the pros of Secure Boot may be, the motives for it are--er--unlikely to result from the disinterested concern of Microsoft in the sterling computer habits of its users.
There are two simple reasons why there must be an option to disable Secure Boot that have nothing to do with marketing:
1. Many of their customers will do the same as always, they will buy Windows 8 licenses with options to downgrade to Windows 7 or Vista (whichever they deploy in their corporate environment). This will not be possible if Secure Boot can't be disabled.
2. The EU would sue the hell out of them for abusing their monopoly, may be even with a prohibition to sell boards that don't have the option. But they have made the option to disable Secure Boot mandatory for their certification program to prevent that.
There are also simple reasons why they have made it mandatory to provide options to implement custom keys: So that larger customers can use their own keys if wanted, may be deploying a Linux or BSD system, may be ordering Windows versions with a different key than the standard key, so that the users aren't able to boot a standard Windows install DVD.
Corporate policies enforced in the OS are worth nothing if a part-time admin is able to boot the machine with a Knoppix CD. This approach does not work, not even after resetting the BIOS with the usual tricks, when Secure Boot is enabled without leaving traces.
With Secure Boot, you can still boot the system with a Knoppix CD using the Linux Foundation bootloader. And that same, signed bootloader can most likely be installed on the hard drive and used to inject a rootkit into the boot process.
The rule "physical access equals full access" is still valid, and the best solution is still terminal (or possibly web-based) environments and/or physically locked-down clients.
Quote:
Originally Posted by TobiSGD
If Secure Boot must be implemented is more or less meaningless when the same standard that enforces the implementation enforces that there must be a possibility to disable it and a possibility to add custom keys.
Exactly. I believe Secure Boot is really all about DRM, and that all talk about "malware protection", "security" and "hacker proofing" are just attempts to obfuscate the issue. Because, as you point out, there's just no way it can possibly work as advertised.
With Secure Boot, you can still boot the system with a Knoppix CD using the Linux Foundation bootloader. And that same, signed bootloader can most likely be installed on the hard drive and used to inject a rootkit into the boot process.
The rule "physical access equals full access" is still valid, and the best solution is still terminal (or possibly web-based) environments and/or physically locked-down clients.
The signed bootloader from the Linux Foundation is not to make it easier for corporate environments. Corporate admins should be able to learn easily how to handle Secure Boot keys and can easily remove the Linux Foundation key (and any other unwanted keys). In that case, "physical access equals full access" is not longer valid.
Quote:
Exactly. I believe Secure Boot is really all about DRM, and that all talk about "malware protection", "security" and "hacker proofing" are just attempts to obfuscate the issue. Because, as you point out, there's just no way it can possibly work as advertised.
The Windows 8 logo certification requires that it must not be possible to change any Secure Boot key or even disable Secure Boot from Software. So malware or hackers that attack the boot process don't have a chance to get their rootkits into that process.
The Windows 8 logo certification requires that it must not be possible to change any Secure Boot key or even disable Secure Boot from Software. So malware or hackers that attack the boot process don't have a chance to get their rootkits into that process.
This leaves OS and driver security vulnerabilities, which are by far the most common attack vectors for serious malware (corporate espionage and major fraud rather than annoying "your system is infected by viruses and you must purchase the full version of this bogus tool" trojans). For that reason, I believe Secure Boot is only marginally useful in a corporate security setting.
However, if ones primary concern is not to improve system security or stability, but rather to create a walled garden, restricting users ability to install non-signed low-level drivers (including DRM circumvention tools), Secure Boot may be the answer. (If one chooses to ignore empirical evidence regarding the effectiveness of such measures, that is; the jailbreak community has been quite successful in circumventing similar mechanisms on various smartphones.)
And the jailbreak community are home-users, not corporate users. As I said, at corporate level Secure Boot makes sense. If you want to use it at home is a different thing, but thanks to the Linux Foundation (if you want dual boot with Windows 8) and thanks to Microsoft (if you want to run Linux only or dual boot using your own keys) it shouldn't be such a problem as most people cry it out.
And the jailbreak community are home-users, not corporate users.
These are actually the same people in different contexts.
My comment about jailbreaking was just meant to illustrate that signed binaries are only as effective as the OS they load, and history teaches us that security vulnerabilities are quite common. One of the first (if not THE first) driver signing circumventions on the Vista x64 platform was related to a buggy (and signed) video driver from AMD.
Quote:
Originally Posted by TobiSGD
As I said, at corporate level Secure Boot makes sense.
If circumvention/jailbreaking tools become readily available, which is quite likely, and Secure Boot offers no significant malware protection anyway due to the inevitable discovery of security vulnerabilities in the OS and in applications, how does Secure Boot improve security in a corporate environment?
LinuxQuestions.org is looking for people interested in writing
Editorials, Articles, Reviews, and more. If you'd like to contribute
content, let us know.