> We're told that Fedora's bootloader is going to get signed – and by that,  
> that must mean "grub", right?

No. A tiny loader before grub with the Microsoft key is the plan. That's
actually technically quite smart as it means you don't have to keep going
back to Microsoft. Of course in reality because EFI is buggy and full of
work arounds you will. And since it's probably a revenue stream I can
imagine Microsoft will be keen to revoke keys and charge lots of $99
whenever it can as well.

> And, grub can boot an arbitrary Linux kernel, right?

The signed loader would load a signed grub which would load a signed
kernel which would load only signed modules (no vmware, no nvidia. no
virtualbox, no 3rd party downloaded GPL kernel modules, no security
patches applied by hand, no custom reconfigurations, no board
workarounds, no tmapi on thinkpad). In practice in many cases it will
also have to sign all the firmware that is loaded into the drivers so you
won't be able to update the firmware.

You'd also have to turn off the kernel debugger features, much of
firewire, some X features, uvesafb, lrmi, dosemu (but not dosbox),
systemtap, setserial, and a whole host of other things. You probably have
to mandate SELinux as well and prevent anyone from setting certain
attributes on packages that are not signed etc.

There are some really non-obvious ones and I'm keeping them under my
(free) hat until after Red Hat try this including a couple of gems I
think I'll sit on until a RHEL with this "feature" is released.

Also every time a hole is found Fedora will have to revoke that kernel,
force everyone to upgrade or if they have an older unsupported kernel
leave them stranded.

Out of support releases are also an interesting problem. If a hole is
found they need to revoke the key. If they do that the users machine is
crippled. It's potentially a criminal matter in many EU states as well so
whoever issues the revocation could end up in jail. Nobody is really too
sure. This is all untested waters.

> So, a virus that wants to compromise a signed, secure bootload chain, can't  
> it simply install Fedora's signed grub, configured to boot a bare-bones  
> Linux kernel, nothing will prevent that, right?

Not it would just use a kernel hole and if it was targetting windows it
would use the early bit of the kernel boot up, compromise itself at init
(very early very quiet so basically invisible), and then bootstrap
windows 8 either directly or virtualised while lying that the secure boot
was done.

> Red Hat's private key. The kernel will be configured to load only kernel  
> modules that are also signed by Red Hat's private key. OEMs that supply OEM  
> binary blobs, for stuff like RAID cards, etc, that are certified with RHEL,  
> will get Red Hat to sign their kernel modules for them, also for a token  
> certification key. That's the hood, welded shut, that's absolutely mandatory  
> for a secured bootloader to have any logical purpose, whatsoever.

Correct - and you need to lock it down way more than that. Also I can't
see Red Hat directly signing third party binary blobs. If it does that it
implicitly believes they are lawful and also acquires some liability for
them in they malfuction.

> Fedora is not going to be a part of this. In order to boot Fedora, it will  
> be necessary to disable the secure bootload, on the hardware.

It will be up to the Fedora Board to stop Red Hat corrupting the goals of
the Fedora project in this way - or if they won't for people who dislike
it to dump Fedora - particularly package maintainers.

Alan
-- 
users mailing list
users@lists.fedoraproject.org
To unsubscribe or change subscription options:
https://admin.fedoraproject.org/mailman/listinfo/users
Guidelines: http://fedoraproject.org/wiki/Mailing_list_guidelines
Have a question? Ask away: http://ask.fedoraproject.org

Reply via email to