85 points by hacknslack 4 days ago | 53 comments
usr1106 17 hours ago
When does Microsoft open their source for searching vulnerabilities?
FirmwareBurner 16 hours ago
The creator of SystemD recommends systemd-boot? Seems legit and unbiased.
ahartmetz 14 hours ago
onli 15 hours ago
otterley 2 hours ago
jonathanstrange 15 hours ago
bayindirh 14 hours ago
ahartmetz 14 hours ago
bayindirh 14 hours ago
...and what systemd-boot is? A UEFI only boot menu which gets its data from UEFI only.
I mean comparing two different things and claiming the more featured one too big is mental gymnastics to put it politely.
GRUB having vulnerabilities is not surprising, esp. when the thing is written at an age where computers were completely different things, programming and requirements wise, but insinuating that systemd-boot is the ultimate replacement is, eh, a bit underhanded. Esp. when it comes from Lennart, whose systemd is too big and encompassing for an init system.
It's the pot calling the kettle black, heh.
zelon88 7 hours ago
Gee, how clever and thoughtful.
fuzzfactor 8 hours ago
With the resources they have, and these unique findings AI has helped them discover, they should now be in the ideal position to rapidly correct this deficiency in their own bootloader, so that nobody will ever need to use Grub again.
With this level of expertise, now enhanced by AI, and so much effort already behind them so far, it shouldn't take much to push this over the finish line, provided they have an effective enough organization when it comes to enhancing the security of PC users overall. After all, they don't even have to worry about addressing Macs.
I know the engineers are brilliant enough by far, and with nothing holding them back, we should be able to expect a minor revision of of the NT bootloader like this to be arriving any day now.
According to what I see in the article, this would be one of the most timely & useful security patches to show up on Windows Update, I hope they don't drop the ball on this one.
Patch Tuesday is next week but they seem so close they could probably push this critical correction out before that, so watch for it :)
mystified5016 7 hours ago
That's why we got secure boot and why windows absolutely clobbers any other bootloaders during install, updates, and random points in between. It's why we have WSL.
I'll bet good money that Microsoft never even considers what you propose. It's antithetical to the mission of "lock all possible users into ad revinue streams". Microsoft won't get their windows ad impressions if they allow you to use a different OS on the hardware you own.
heelix 1 hour ago
cmurf 6 hours ago
Are you wanting bootmgr.efi to learn how to read arbitrary Linux filesystems, bootloader configurations, and EFISTUB? Why?
Windows supports setting a one time boot using a UEFI BootNext NVRAM variable, directly boots shim.efi, doesn't involve bootmgr.efi
fuzzfactor 3 hours ago
Good example of a nonideal approach, but I would settle for that since at least it's better than how UEFI has developed so far.
I think the "default" sequence for new (naturally Windows-preinstalled) PC's is simply UEFI > NT6 bootloader > Windows.
On mainstream PC's like this, for users to include Linux if they want to (without disturbing Windows) it should be a straightforward option to install Linux to its own partition, and end up with UEFI > NT6 bootloader > Windows or Linux. Your choice by paying attention to the built-in NT6 bootmenu upon power up, whenever you don't want to boot automatically to the default OS.
With exactly the same workflow as you used to be able to with BIOS. I know there are subsurface differences, but always hold out hope that maybe someone will be advanced enough to handle this much abstraction ;)
This deficiency was not a factor before UEFI struck, since the NT6 bootloader would start Linux under BIOS with no problem. Still will, and Grub will still start Windows, working smoother than ever even in UEFI. NT5 bootloader was even good enough, and you can probably go back to NT3.
>Windows supports setting a one time boot using a UEFI BootNext NVRAM variable, directly boots shim.efi, doesn't involve bootmgr.efi
Even better than that, both Windows and Linux are complete enough as an OS, that if either of their bootloaders are properly installed & configured, then no NVRAM variables need to be depended on whatsoever. Those variables are functionally just a shortcut or fallback which can compensate for lingering defects.
Plus I never thought Grub was required, I always prefer Syslinux.
No matter what, there's not supposed to be any need for a shim.
cmurf 1 hour ago
I don't see any advantage to involving Microsoft in the boot process.
>paying attention to the built-in NT6 bootmenu
UEFI firmware vendors provide a boot manager (the UI) for choosing what installed OS to boot. Apple has offered a graphical boot manager (option key at the boot chime) since forever.
NT6 isn't free or open source software so I don't see the various Linux projects wanting NT6 involved at all, in either the single or dual boot use case.
But in effect you're proposing different boot paths, and different UI/UX depending on whether the system is Linux-only or dual boot Windows Linux.
>This deficiency was not a factor before UEFI struck
I can't tell what deficiency you think UEFI has that BIOS didn't have. But maybe you don't like specs? Or are you referring to the much latter added UEFI Secure Boot?
>No matter what, there's not supposed to be any need for a shim.
You seem to think Microsoft wants to be in the business of executing arbitrary and unsigned code, despite all efforts proving the opposite.
dismalaf 6 hours ago
I mean, I replaced Grub with systemd-boot awhile back...
greatgib 16 hours ago
And btw, not that long ago it was released by researchers than more than 200 platforms from diverse but main laptops and servers manufacturers were still using leaked keys for signing their boot loaders...
donnachangstein 14 hours ago
Is Apple a joke because they sign the root of trust for their devices? Someone has to be the root authority. Honestly I trust MS more than I do Google or VerisignDigicert. They are the least likely to intentionally break things.
The reason MS controls the root and not Red Hat etc. is because the Linux camp spent years arguing back and forth about exactly how much they hate secure boot - like an HOA arguing over paint colors - instead of presenting solutions.
> So anyone with they certificate key can do whatever they want.
this is literally how PKI works
Somehow I think MS put a little more thought into their PKI design than whatever you're trying to convey here. What were the other options? Store it on a Yubikey sewn into rms's beard?
People are quick to dismiss secure boot simply because they refuse to understand it.
rcxdude 14 hours ago
No-one has to be, and it certainly doesn't need to be anyone but the owner of the machine.
donnachangstein 14 hours ago
Technically the web should work with self-signed certificates. But that is likewise impractical.
kbolino 8 hours ago
AshamedCaptain 2 hours ago
kbolino 57 minutes ago
fuzzfactor 7 hours ago
Not like there's any question.
Overwhelmingly more so than for "security" purposes.
Any lesser understanding of Microsoft SecureBoot, well, I understand.
I've seen that kind of that kind of refusal before.
greatgib 13 hours ago
But in the case of secure boot, this is worse, because Microsoft is just a "software" editor. But its root certificate and probably a few random others are distributed in countless of devices produced by manufacturers unrelated to them, but also, a few number of software distributors will also have subkeys to be able to sign their os/software. All of that, with zero transparency.
And in the end, if I buy a Lenovo laptop, to have Linux OS running on it, there is no reason and no trust to have my OS be signed by Microsoft, that has the key to run whatever they want on my laptop. Think about it and you will see that it makes no sense at all, if you don't trust Microsoft for your OS, to have to trust them for ensuring a secure boot...
AstralStorm 13 hours ago
Then manually sign your bootloader.
This feature is available at least in my Gigabyte mainboard, but is not particularly easy to use, which is why bootloaders come pre-signed with a known root of trust. There's nothing stopping the installer from generating the root of trust on the fly, except for the default settings in many machines.
Can also preload measurements for hardware while at it so that nobody swaps a PCIe device for an evil twin.
vladvasiliu 15 hours ago
I understand some computers may not support this as well, so YMMV.
greatgib 8 hours ago