Am Montag, 13. Juni 2016 schrieb Adam Borowski:
> On Mon, Jun 13, 2016 at 09:14:00PM +0200, Edward Bartolo wrote:
> > But I still am convinced with a signed kernel one can still use it to
> > boot any installed OS. My reasoning goes like this: once the signed
> > kernel boots, it would be in control of the machine. A running kernel
> > can be used to run any executable provided the latter is coded for the
> > same machine architecture. So, the boot procedure would first consist
> > of UEFI loading the signed kernel, the kernel then loads a bootloader
> > like GRUB*.
> 
> Not anymore.  Any syscalls and devices that can be used to subvert the
> system by its owner, even as root, are disabled when Secure Boot is in
> use.  So sorry, no kexec or loading a bootloader module unless the kernel
> being kexeced is itself signed.
> 

Broken computers for a broken world.


-- 
Please do not email me anything that you are not comfortable also sharing with 
the NSA.
_______________________________________________
Dng mailing list
Dng@lists.dyne.org
https://mailinglists.dyne.org/cgi-bin/mailman/listinfo/dng

Reply via email to