Home opinion-and-analysis Open Sauce Will Windows 8 succeed in locking out GNU/Linux?

Author's Opinion

The views in this column are those of the author and do not necessarily reflect the views of iTWire.

Have your say and comment below.

Is Microsoft finally resigned to the fact that Windows can never again be the dominant operating system on our planet? Or is the behemoth planning to make one final attempt to control what you use?


Linux kernel developer Matthew Garrett has highlighted a rather alarming feature in Windows 8, the process of a secure boot, using which, theoretically, Microsoft could lock out other operating systems from running on hardware which comes with Windows 8 preloaded.

Windows 8 uses some of the specifications for the Unified Extensible Firmware Interface - that defines a software interface between an operating system and platform firmware - namely the secure boot protocol, to ensure exclusive booting rights on harbdware.

The system firmware can contain one or more signed keys and any executable that is not signed by these keys cannot boot on said system. Another set of keys - called Pkek - allows for communication between the operating system and the firmware.

According to Garrett, an operating system with matching Pkek keys can add more keys to a whitelist - or a blacklist. In the latter case, any executable which has a key on the blacklist will not boot.

All these years millions of people have been buying hardware which comes preloaded with Windows - no grey-box vendor will sell a naked PC - and then loading GNU/Linux on it.

Of course, the hardier ones build their own machines from scratch.

As Garrett points out, there is no centralised authority to issue the UEFI keys. If an OEM vendor does it, then unless one can get the same vendor to sign one's code, the chances of booting it on that machine are precisely zero.

This will have an impact on both hardware and software - hardware that does not have the right key to communicate with the firmware cannot be added to the machine in question. The same goes for software.

The Windows 8 logo will only be allowed to be put on machines that offer a secure boot. This means that one cannot even install another version of Windows on that box.

If vendors decide to do so, the process of key-signing could be offered as an option that can be turned off, either by a jumper on the motherboard or else through an option in the BIOS.

But Garrett notes that firmware makers are generally not interested in offering anything other than the barebones features which they need for the market segment to which they cater. He adds that while it is not time for GNU/Linux users to panic, people should be concerned.

The Linux Weekly News website has linked to a video from Microsoft that explains the secure boot process in Windows 8 in detail.

FREE WHITEPAPER - REMOTE SUPPORT TRENDS FOR 2015

Does your remote support strategy keep you and your CEO awake at night?

Today’s remote support solutions offer much more than just remote control for PCs. Their functional footprint is expanding to include support for more devices and richer analytics for trend analysis and supervisor dashboards.

It is imperative that service executives acquaint themselves with the new features and capabilities being introduced by leading remote support platforms and find ways to leverage the capabilities beyond technical support.

Field services, education services, professional services, and managed services are all increasing adoption of these tools to boost productivity and avoid on-site visits.

Which product is easiest to deploy, has the best maintenance mode capabilities, the best mobile access and custom reporting, dynamic thresholds setting, and enhanced discovery capabilities?

To find out all you need to know about using remote support to improve your bottom line, download this FREE Whitepaper.

DOWNLOAD!

Sam Varghese

website statistics

A professional journalist with decades of experience, Sam for nine years used DOS and then Windows, which led him to start experimenting with GNU/Linux in 1998. Since then he has written widely about the use of both free and open source software, and the people behind the code. His personal blog is titled Irregular Expression.

Connect