![[personal profile]](https://www.dreamwidth.org/img/silk/identity/user.png)
(Edit: It's been suggested that the title of this could give the wrong impression. "Don't like Secure Boot? That's not a reason to buy a Chromebook" may have been better)
People are, unsurprisingly, upset that Microsoft have imposed UEFI Secure Boot on the x86 market. A situation in which one company gets to determine which software will boot on systems by default is obviously open to abuse. What's more surprising is that many of the people who are upset about this are completely fine with encouraging people to buy Chromebooks.
Out of the box, Chromebooks are even more locked down than Windows 8 machines. The Chromebook firmware validates the kernel, and the kernel verifies the filesystem. Want to run a version of Chrome you've built yourself? Denied. Thankfully, Google have provided a way around this - you can (depending on the machine) either flip a physical switch or perform a special keystroke in the firmware to disable the validation. Doing so deletes all your data in the process, in order to avoid the situation where a physically present attacker wants to steal your data or backdoor your system unnoticed, but after that it'll boot any OS you want. The downside is that you've lost the security that you previously had. If a remote attacker manages to replace your kernel with a backdoored one, the firmware will boot it anyway. Want the same level of security as the stock firmware? You can't. There's no way for you to install your own signing keys, and Google won't sign third party binaries. Chromebooks are either secure and running Google's software, or insecure and running your software.
Much like Chromebooks, Windows 8 certified systems are required to permit the user to disable Secure Boot. In contrast to Chromebooks, Windows 8 certified systems are required to permit the user to install their own keys. And, unlike Google, Microsoft will sign alternative operating systems. Windows 8 certified systems provide greater user freedom than Chromebooks.
Some people don't like Secure Boot because they don't trust Microsoft. If you trust Google more, then a Chromebook is a reasonable choice. But some people don't like Secure Boot because they see it as an attack on user freedom, and those people should be willing to criticise Google's stance. Unlike Microsoft, Chromebooks force the user to choose between security and freedom. Nobody should be forced to make that choice.
(Updated to add that some Chromebooks have a software interface for disabling validation)
People are, unsurprisingly, upset that Microsoft have imposed UEFI Secure Boot on the x86 market. A situation in which one company gets to determine which software will boot on systems by default is obviously open to abuse. What's more surprising is that many of the people who are upset about this are completely fine with encouraging people to buy Chromebooks.
Out of the box, Chromebooks are even more locked down than Windows 8 machines. The Chromebook firmware validates the kernel, and the kernel verifies the filesystem. Want to run a version of Chrome you've built yourself? Denied. Thankfully, Google have provided a way around this - you can (depending on the machine) either flip a physical switch or perform a special keystroke in the firmware to disable the validation. Doing so deletes all your data in the process, in order to avoid the situation where a physically present attacker wants to steal your data or backdoor your system unnoticed, but after that it'll boot any OS you want. The downside is that you've lost the security that you previously had. If a remote attacker manages to replace your kernel with a backdoored one, the firmware will boot it anyway. Want the same level of security as the stock firmware? You can't. There's no way for you to install your own signing keys, and Google won't sign third party binaries. Chromebooks are either secure and running Google's software, or insecure and running your software.
Much like Chromebooks, Windows 8 certified systems are required to permit the user to disable Secure Boot. In contrast to Chromebooks, Windows 8 certified systems are required to permit the user to install their own keys. And, unlike Google, Microsoft will sign alternative operating systems. Windows 8 certified systems provide greater user freedom than Chromebooks.
Some people don't like Secure Boot because they don't trust Microsoft. If you trust Google more, then a Chromebook is a reasonable choice. But some people don't like Secure Boot because they see it as an attack on user freedom, and those people should be willing to criticise Google's stance. Unlike Microsoft, Chromebooks force the user to choose between security and freedom. Nobody should be forced to make that choice.
(Updated to add that some Chromebooks have a software interface for disabling validation)
Red herring?
Date: 2013-02-05 12:22 am (UTC)Tell me one thing: in your history of using Linux, how many cases have you come across of a compromised kernel being used to boot a box?
Why are people suddenly all barking about secure boot? Has there been some massive security incident that nobody on earth knows about - except Microsoft and Google?
Sam Varghese
Re: Red herring?
Date: 2013-02-05 12:36 am (UTC)No? It's an attempt to dissuade people from blindly recommending Chromebooks as an alternative to Microsoft's imposed Secure Boot setup.
More than once. The use of kernel modules as persistent rootkits is hardly uncommon.
Secure Boot would be impractical to implement on BIOS systems, so the timing's largely down to the availability of alternative firmware implementations for x86. Embedded devices have implemented equivalent technology for years.
Re: Red herring?
Date: 2013-02-05 01:03 am (UTC)Re: Red herring?
Date: 2013-02-05 01:08 am (UTC)Re: Red herring?
Date: 2013-02-05 01:45 am (UTC)Re: Red herring?
Date: 2013-02-05 01:52 am (UTC)Re: Red herring?
Date: 2013-02-05 11:53 am (UTC)did you or did you not get hold of a chromebook before you wrote this post?
Re: Red herring?
Date: 2013-02-05 04:11 pm (UTC)Re: Red herring?
Date: 2013-02-06 01:32 am (UTC)Re: Red herring?
Date: 2013-02-06 02:58 am (UTC)Re: Red herring?
Date: 2013-02-06 04:02 am (UTC)Incidentally - did you have an OLPC (or Peruvian child) when you wrote this article: http://www.itwire.com/opinion-and-analysis/open-sauce/55572-olpc-failure-in-peru-its-own-fault ? Did you own Red Hat shares when you wrote http://www.itwire.com/business-it-news/open-source/58011-red-hat-profit-down-stock-up ? If not, why not?
Re: Red herring?
Date: 2013-02-05 07:54 am (UTC)Re: Red herring?
Date: 2013-02-05 11:54 am (UTC)Re: Red herring?
Date: 2013-02-05 06:53 pm (UTC)Re: Red herring?
Date: 2013-03-25 01:26 am (UTC)If Matthew answered yes, then I'm more inclined to take his opinion at face value. If he said no, what he has written may be factually accurate, but it might suggest that it was written with a bias.
I have a Chromebook and I see nothing wrong with the facts in this post. But I must admit, Matthew's credibility is tarnished because he wouldn't say if he was using a Chromebook or not. It doesn't change the facts, but it makes me question the intent.
Simply answering no would have disarmed this argument for me, but now it comes across as deceptive by dodging the question.
Everything that glitters isn't Secure Boot
Date: 2013-02-05 08:34 pm (UTC)I think that is counter-productive, Matthew.
Just like I have a coreboot bias, you likely have an ever so slight UEFI Secure Boot bias, having worked with it for so long. You understand how Secure Boot works while most of our community - that is, the community of people desiring general purpose computers - may not.
You understand what Secure Boot could do for us, and you have spent an enormous amount of time trying to solve the problem of how Linux can fit into that structure. Your effort is phenomenal!
As you may know, I have been participating in the coreboot project since some 12 years. My experience there and in the security field tells me that it is absolutely critical for our community NOT to depend on any single boot verification structure, and certainly not one which is being deployed to let Microsoft decide what a computer says is secure and insecure.
Microsoft clearly isn't acting in our best interest.
Google is also acting in their own interest, but at the moment I feel that our community's interest in having control over our machine's firmware aligns well with Google's interest.
That's the reason to act fast against UEFI Secure Boot.
Unfortunately for you, your job is to act fast toward UEFI Secure Boot, to make it "just work" for Red Hat and friends. I have the utmost sympathy for you, in having to deal with that problem every day. It doesn't take reading your musings on how broken everything is, to realize that it is not too joyous work.
Google has developed their own x86 firmware based on well-known components such as coreboot and U-boot, and not only do they provide their customers freedom to root their hardware, they have also chosen to (use components such that they must) publish their entire firmware source code.
Google is clearly being vastly more progressive than the UEFI Forum and Microsoft.
But them doing something that is much better isn't why the Chromebook really does deserve to be recommended as an alternative to Microsoft's Secure Boot.
The Chromebook deserves to be recommended because it is doing something different.
The ideal solution for our community hasn't been productized yet - maybe not even developed yet. As you know, the majority of our community doesn't have experience with security with or without involving hardware, and even fewer have x86 firmware experience. I believe (I'm just naïve like that) this may change thanks to your work, coreboot's work, and Google's work. I think it must change.
the timing's largely down to the availability of alternative firmware implementations for x86. Embedded devices have implemented equivalent technology for years.
coreboot has facilitated implementation of equivalent technology for years, 15 years to be precise. For some reason, the UEFI Forum and Microsoft have chosen a different route. The UEFI Forum's and Microsoft's route is not helping our community, while Google's route is.
That's why it makes sense to recommend a Chromebook, to anyone who is concerned about their machine's firmware, and the future of general purpose computing.
Re: Everything that glitters isn't Secure Boot
Date: 2013-02-05 08:57 pm (UTC)Re: Everything that glitters isn't Secure Boot
Date: 2013-02-05 10:15 pm (UTC)You actually have much more choice with the Chromebook, because not only does it come with the developer mode which allows you to replace all of the system including the firmware - it also runs a firmware whose source code Google contributed to coreboot nearly a year ago.
Re: Everything that glitters isn't Secure Boot
Date: 2013-02-05 10:21 pm (UTC)Re: Everything that glitters isn't Secure Boot
Date: 2013-02-06 12:31 am (UTC)Re: Everything that glitters isn't Secure Boot
Date: 2013-02-06 01:04 am (UTC)You're perfectly right about that! Sorry for my mistake. :(
which is a very warranty-voiding exercise.
That is not at all clear. The machine does need to be opened (how many screws are there?) but removing the write-protect seems to involve simply moving a jumper or a screw. How will Samsung react to a warranty claim? I guess they will just fix it for you.
My point still stands however; the Chromebook deserves recommendation for the simple reason that it is not going the UEFI Secure Boot route.
Re: Everything that glitters isn't Secure Boot
Date: 2013-02-06 04:35 am (UTC)Re: Everything that glitters isn't Secure Boot
Date: 2013-02-06 04:48 am (UTC)Re: Everything that glitters isn't Secure Boot
Date: 2013-02-06 05:02 pm (UTC)Re: Everything that glitters isn't Secure Boot
Date: 2013-02-06 05:07 pm (UTC)Re: Everything that glitters isn't Secure Boot
From: (Anonymous) - Date: 2013-02-06 07:02 pm (UTC) - ExpandRe: Everything that glitters isn't Secure Boot
From:Re: Everything that glitters isn't Secure Boot
From: (Anonymous) - Date: 2013-02-06 07:13 pm (UTC) - ExpandRe: Everything that glitters isn't Secure Boot
From:Re: Everything that glitters isn't Secure Boot
From: (Anonymous) - Date: 2013-02-06 07:23 pm (UTC) - Expand