← Back to context

Comment by astrobe_

5 hours ago

I don't know about executable signing, but in the embedded world SecureBoot is also used to serve the customer; id est provide guarantees to the customer that the firmware of the device they receive has not been tampered with at some point in the supply chain.

Computers should abide by their owners. Any computer not doing that is broken.

  • Its a simple solution in law to enable. Force manufacturers to allow owners of computer to put any signing key in the BIOS.

    We need this law. Once we have this law, consumers csn get maximum benefit of secure boot withiut losing contorl

    • Most embedded processors sadly don't have a BIOS, and the signing key is permanently burned into the processor via eFUSEs.

    • But that's how it already works.

      If you install Windows first, Microsoft takes control (but it graciously allows Linux distros to use their key). If you install Linux first, you take control.

      It's perfectly possible for you to maintain your own fully-secure trust chain, including a TPM setup which E.G. lets you keep a 4-digit pin while keeping your system secure against brute force attacks. You can't do that with the 1990s "encryption is all you need" style of system security.

    • > Its a simple solution in law to enable. Force manufacturers to allow owners of computer to put any signing key in the BIOS.

      ...it's already allowed. The problem is that this isn't the default, but opt in that you need quite a lot of knowledge to set up

  • I make the analogy with a company, because on that front, ownership seems to matter a lot in the Western world. It's like it had to have unfaithful management appointed by another company they're a customer of, as a condition to use their products. Worse, said provider is also a provider for every other business, and their products are not interoperable. How long before courts jump in to prevent this and give back control to the business owner?

  • This gets tricky. If I click on a link intending to view a picture of a cat, but instead it installs ransomware, is that abiding by its owner or not? It did what I told it to do, but not at all what I wanted.

    • If you connect your computer to the Internet, it can get hacked. If you leave it logged in unattended or don't use authentication, someone else can use it without your permission.

      This isn't rocket science and it has nothing to do with artificially locking down a computer to serve the vendor instead of the owner.

      Edit: I'd like to add that no amount of extra warranty from the vendors are going to cover the risk of a malware infection.

    • We dont need to get philosophical here. You(the admin) can require you (the user) to input a password to signify to you(the admin) to install a ransomware when a link is clicked. That way no control is lost.

      2 replies →

And what if that customer wants to run their own firmware, ie after the manufacturer goes out of business? "Security" in this case conveniently prevente that.

  • Tradeoffs. Which is more likely here?

    1. A customer wants to run their own firmware, or

    2. Someone malicious close to the customer, an angry ex, tampers with their device, and uses the lack of Secure Boot to modify the OS to hide all trace of a tracker's existence, or

    3. A malicious piece of firmware uses the lack of Secure Boot to modify the boot partition to ensure the malware loads before the OS, thereby permanently disabling all ability for the system to repair itself from within itself

    Apple uses #2 and #3 in their own arguments. If your Mac gets hacked, that's bad. If your iPhone gets hacked, that's your life, and your precise location, at all times.

    • 1. P(someone wants to run their own firmware)

      2. P(someone wants to run their own firmware) * P(this person is malicious) * P(this person implants this firmware on someone else’s computer)

      3. The firmware doesn’t install itself

      Yeah I think 2 and 3 is vastly less likely and strictly lower than 1.

      15 replies →

    • #2 and #3 are fearmongering arguments and total horseshit, excuse the strong language.

      Should either of those things happen the bootloader puts up a big bright flashing yellow warning screen saying "Someone hacked your device!"

      I use a Pixel device and run GrapheneOS, the bootloader always pauses for ~5 seconds to warn me that the OS is not official.

      2 replies →

  • Then that customer shouldn't buy a device that doesn't allow for their use case. Exercise some personal agency. Sheesh.

    • What happens when there are no more devices that allow for that use case? This is already pretty much the case for phones, it's only a matter of time until Microsoft catches up.

      2 replies →

I don't know about executable signing, but in the embedded world SecureBoot is also used to serve the PRODUCER; id est provide guarantees to the PRODUCER that the firmware of the device they SELL has not been tampered with at some point in the PROFIT chain.

> id est provide guarantees to the customer that the firmware of the device they receive has not been tampered with

The firmware of the device being a binary blob for the most part... Not like I trust it to begin with.

Whereas my open source Linux distribution requires me to disables SecureBoot.

What a world.

  • You can set up custom SecureBoot keys on your firmware and configure Linux to boot using it.

    There's also plenty of folks combining this with TPM and boot measurements.

    The ugly part of SecureBoot is that all hardware comes with MS's keys, and lots of software assume that you'll want MS in charge of your hardware security, but SecureBoot _can_ be used to serve the user.

    Obviously there's hardware that's the exception to this, and I totally share your dislike of it.

    • > You can set up custom SecureBoot keys on your firmware and configure Linux to boot using it.

      Right, but as engineers, we should resist the temptation to equate _possible_ with _practical_.

      The mere fact that even the most business oriented Linux distributions have issues playing along SecureBoot is worrying. Essentially, SB has become a Windows only technology.

      The promise of what SB could be useful for is even muddier. I would argue that the chances of being victim of firmware tampering are pretty thin compared to other attack vectors, yet somehow we end up all having SB and its most significant achievement is training people that disabling it is totally fine.

      1 reply →

  • +1

    An unsigned hash is plenty guard to against tampering. The supply chain and any secret sauce that went into that firmware is just trust. Trust that the blob is well intentioned, trust that you downloaded from the right URL, checked the right SHA, trust that the organization running the URL is sanctioned to do so by Microsoft...

    Once all of that trust for every piece of software is concentrated in one organization, Microsoft, Apple or Google, is has become totally meaningless.

It's to serve the regulators. The Radio Equipment Directive essentially requires the use of secure boot fir new devices.

  • I happen to like knowing that my mobile device did not have a ring 0 backdoor installed before it left the factory in Asia. SecureBoot gives me that confidence.