logoalt Hacker News

ronsoryesterday at 6:00 PM2 repliesview on HN

(2019)

The biggest weakness of secure boot was always third-party vendors shipping "insecure" bootloaders. It's a lot of work to verify signatures for every bit of data that gets loaded, especially on the PC platform.


Replies

jeroenhdyesterday at 8:20 PM

Thre original secure boot design would have had insecure bootloaders get blacklisted the moment abuse could be detected.

Microsoft then made that system entirely useless by signing code that could be used to load unsigned code, like demonstrated here.

They then also refused to blacklist their own broken bootloader to save sysadmins the time (who would need to deploy new recovery images and boot media containing the fixed bootloader). That vulnerable bootloader is particularly bad because it can be used to have the TPM unlock itself and give up the Bitlocker key, which the Linux loaders shouldn'tbe capable of even if they apply the bypass mentioned in the article.

In a world where Microsoft cared about secure boot, they would blacklist the vulnerable Linux loaders as well as their own old bootloaders. Why Microsoft? Because they signed the files in the first place, only they can rescind the signatures. In that world, Linux users would call for Bill Gates' head for securing their security feature and sysadmins would be out for Steve Ballmer's blood for breaking their complex custom recovery system that nobody dares touch.

Now we'll be stuck in the worst of both worlds.

show 3 replies
mjg59yesterday at 10:56 PM

Third party? Black Lotus was the first case we saw actually targeting individuals, and that was a vulnerability in the Windows bootloader.