Open Source Market Segment LS
Open Source Market Segment RS
Sunday, 01 July 2012 09:55

FSF slams Microsoft imposition of secure boot

By

The Free Software Foundation says it strongly rejects any approach to computer security that involves placing trust in Microsoft or any other proprietary software company.

Instead, the organisation, in a white paper on Microsoft's secure boot proposal and the fallout thereof, said users should be able to both easily disable secure boot and to use their own security keys in order that they could be the ultimate decision-maker on which software should run on their computers.

FSF executive director John Sullivan said: "We will do what we can to help all free software operating system distributions follow this path, and we will work on a political level to reduce the practical difficulties that adhering to these principles might pose for expedient installation of free software.

"The FSF does want everyone to be able to easily install a free operating system - our ultimate goal is for everyone to do so, and the experience of trying out free software is a powerful way to communicate the importance of free software ideals to new people.

"But we cannot, in the name of expediency or simplicity, accept systems that direct users to put their trust in entities whose goal it is to extinguish free software. If that's the tradeoff, we better just turn Secure Boot off."

The white paper pointed out that its GPLv3 licence, the updated version of the GPLv2 under which the Linux kernel is issued, protected users against onerous requirements such as those being made in the name of secure boot; when one bought or rented a computer running GPLv3 software the licence protected one's right to run modified versions of that software on that computer.

"GPLv2 always required that users be able to do this, but one of the improvements in GPLv3 ensures that the freedoms all GPL versions are meant to provide can't be taken away by hardware that refuses to run modified software," Sullivan said.

Under the GPLv3 one was required to provide clear instructions and functionality for users to fully modify or disable boot restrictions so that they could run their own software on such a system.


The FSF said that secure boot, if done right, embodied its own views on software security; it would give users the ability to remove any key from the boot firmware and add keys belonging to a software developer of their choice.

But given the way Microsoft was implementing secure boot, anyone who wanted to install an operating system other than Windows, which came pre-installed, would have to disable secure boot. Proprietary software companies could scare customers into thinking that this was disabling security on one's computer, and also lead to the wrong assumption that free software was insecure.

Evaluating the methods to overcome secure boot advanced by Red Hat and Canonical (the maker of Ubuntu), the FSF came down on the side of Red Hat's method as being better since it depended on using GRUB2 in the bootloader chain; GRUB2 is issued under the GPLv3 licence.

Red Hat has joined a Microsoft and Verisign developer programme that enables purchase of a key that will enable the loading of a "shim" bootloader; this then chains to GRUB2 which boots the operating system kernel. As Fedora's key is from Microsoft, it can be recognised by the firmware on the majority of motherboards.

"There is much to like about Fedora's thinking, as explained by Matthew Garrett," Sullivan said. "Their process of deliberation evinced concern for user freedom; it's clear that the Fedora team sought a solution that would work not just for their own GNU/Linux distribution, but for as many free software users and distributions as possible.

"Their discussion was also mindful of the desirability of empowering users to sign and run their own modified software without being treated as second-class citizens. Unsurprisingly, with those concerns guiding their thinking, they have ended on a proposal which as described is compliant with GPLv3."

But the FSF said depending on a Microsoft key was a weakness of this method as was the recommendation that others join the developer programme to obtain their own keys.

The approach taken by Canonical was viewed with concern by the FSF as the company had chosen to avoid using GRUB2 thus leaving the user vulnerable as the protections available under the GPLv licence were not available to the user.

Canonical has three ways of getting round secure boot: on machines with Ubuntu installed, there will be an Ubuntu-specific key in the firmware; Ubuntu CDs will have a key that depends on Microsoft's key to boot; and bootloader images distributed by the company will have its own key in the images.

"Our main concern with the Ubuntu plan is that because they are afraid of falling out of compliance with GPLv3, they plan to drop GRUB 2 on Secure Boot systems, in favor (sic) of another bootloader with a different license that lacks GPLv3's protections for user freedom," Sullivan said.

"Their stated concern is that someone might ship an Ubuntu Certified machine with Restricted Boot (where the user cannot disable it). In order to comply with GPLv3, Ubuntu thinks it would then have to divulge its private key so that users could sign and install modified software on the restricted system."

Sullivan said this was unfounded and based on a misunderstanding of GPLv3. "We have not been able to come up with any scenario where Ubuntu would be forced to divulge a private signing key because a third-party computer manufacturer or distributor shipped Ubuntu on a Restricted Boot machine.

"In such situations, the computer distributor - not Canonical or Ubuntu - would be the one responsible for providing the information necessary for users to run modified versions of the software," he said.

The FSF said it would continue its political campaign to make users aware of the problems associated with secure boot and also make available as much documentation as possible to enable users to understand how to run their own software on their own machines.


Please join our community here and become a VIP.

Subscribe to ITWIRE UPDATE Newsletter here
JOIN our iTWireTV our YouTube Community here
BACK TO LATEST NEWS here

PROMOTE YOUR WEBINAR ON ITWIRE

It's all about Webinars.

Marketing budgets are now focused on Webinars combined with Lead Generation.

If you wish to promote a Webinar we recommend at least a 3 to 4 week campaign prior to your event.

The iTWire campaign will include extensive adverts on our News Site itwire.com and prominent Newsletter promotion https://itwire.com/itwire-update.html and Promotional News & Editorial. Plus a video interview of the key speaker on iTWire TV https://www.youtube.com/c/iTWireTV/videos which will be used in Promotional Posts on the iTWire Home Page.

Now we are coming out of Lockdown iTWire will be focussed to assisting with your webinatrs and campaigns and assassistance via part payments and extended terms, a Webinar Business Booster Pack and other supportive programs. We can also create your adverts and written content plus coordinate your video interview.

We look forward to discussing your campaign goals with you. Please click the button below.

MORE INFO HERE!

INTRODUCING ITWIRE TV

iTWire TV offers a unique value to the Tech Sector by providing a range of video interviews, news, views and reviews, and also provides the opportunity for vendors to promote your company and your marketing messages.

We work with you to develop the message and conduct the interview or product review in a safe and collaborative way. Unlike other Tech YouTube channels, we create a story around your message and post that on the homepage of ITWire, linking to your message.

In addition, your interview post message can be displayed in up to 7 different post displays on our the iTWire.com site to drive traffic and readers to your video content and downloads. This can be a significant Lead Generation opportunity for your business.

We also provide 3 videos in one recording/sitting if you require so that you have a series of videos to promote to your customers. Your sales team can add your emails to sales collateral and to the footer of their sales and marketing emails.

See the latest in Tech News, Views, Interviews, Reviews, Product Promos and Events. Plus funny videos from our readers and customers.

SEE WHAT'S ON ITWIRE TV NOW!

BACK TO HOME PAGE
Sam Varghese

Sam Varghese has been writing for iTWire since 2006, a year after the site came into existence. For nearly a decade thereafter, he wrote mostly about free and open source software, based on his own use of this genre of software. Since May 2016, he has been writing across many areas of technology. He has been a journalist for nearly 40 years in India (Indian Express and Deccan Herald), the UAE (Khaleej Times) and Australia (Daily Commercial News (now defunct) and The Age). His personal blog is titled Irregular Expression.

Share News tips for the iTWire Journalists? Your tip will be anonymous

WEBINARS ONLINE & ON-DEMAND

GUEST ARTICLES

VENDOR NEWS

Guest Opinion

Guest Reviews

Guest Research

Guest Research & Case Studies

Channel News

Comments