Home Business IT Open Source FSF slams Microsoft imposition of secure boot

The approach taken by Canonical was viewed with concern by the FSF as the company had chosen to avoid using GRUB2 thus leaving the user vulnerable as the protections available under the GPLv licence were not available to the user.

Canonical has three ways of getting round secure boot: on machines with Ubuntu installed, there will be an Ubuntu-specific key in the firmware; Ubuntu CDs will have a key that depends on Microsoft's key to boot; and bootloader images distributed by the company will have its own key in the images.

"Our main concern with the Ubuntu plan is that because they are afraid of falling out of compliance with GPLv3, they plan to drop GRUB 2 on Secure Boot systems, in favor (sic) of another bootloader with a different license that lacks GPLv3's protections for user freedom," Sullivan said.

"Their stated concern is that someone might ship an Ubuntu Certified machine with Restricted Boot (where the user cannot disable it). In order to comply with GPLv3, Ubuntu thinks it would then have to divulge its private key so that users could sign and install modified software on the restricted system."

Sullivan said this was unfounded and based on a misunderstanding of GPLv3. "We have not been able to come up with any scenario where Ubuntu would be forced to divulge a private signing key because a third-party computer manufacturer or distributor shipped Ubuntu on a Restricted Boot machine.

"In such situations, the computer distributor - not Canonical or Ubuntu - would be the one responsible for providing the information necessary for users to run modified versions of the software," he said.

The FSF said it would continue its political campaign to make users aware of the problems associated with secure boot and also make available as much documentation as possible to enable users to understand how to run their own software on their own machines.

FREE REPORT - IT MONITORING TOOLS COMPARISON

Are you looking to find the most efficient IT Monitoring tool available?

IT Monitoring is an essential part of the operations of any organisation with a significant network architecture.

Multiple IT monitoring platforms are available on the market today, supporting the various needs of small, medium-sized, and large enterprises, as well as managed service providers (MSPs).

This new report studies and compares eight different IT monitoring products in terms of functionality, operations, and usability on the same server platform with 100 end devices.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

Download your free report to find out.

DOWNLOAD!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

Connect