Lockdown: free/open OS maker pays Microsoft ransom for the right to boot on users' co

ck1402

Member
Reaction score
1
Location
Ohio
A friend of mine sent this to me. I am curious if this will just in the end being a annoying addition, or will it actually effect your business and how?

Lockdown: free/open OS maker pays Microsoft ransom for the right to boot on users' computers

for those who don't want to go to the site here it is, but the comments are interesting as well:

A quiet announcement from the Fedora Linux community signals a titanic shift in the way that the computer market will work from now on, and a major threat to free/open operating systems. Microsoft and several PC vendors have teamed up to ensure that only operating systems bearing Microsoft's cryptographic signature will be able to boot on their hardware, meaning that unless Microsoft has blessed your favorite flavor of GNU/Linux or BSD, you won't be able to just install it on your machine, or boot to it from a USB stick or CD to try it out. There is a work-around for some systems involving a finicky and highly technical override process, but all that means is that installing proprietary software is easy and installing free/open software is hard.

This is a major reversal. For many years now, free/open OSes have been by far the easiest to install on most hardware. For example, I have installed Ubuntu on a variety of machines by just sticking in a USB stick and turning them on. Because the OS and its apps are free, and because there are no finicky vendor relationships to manage, it Just Works. On some of those machines, installing a Windows OS fresh from a shrinkwrapped box was literally impossible -- you had to order a special manufacturer's version with all the right drivers to handle external CD drives or docking stations or what-have-you. And the free/open drivers also handled things like 3G USB adapters better than the official drivers (not least because they didn't insist on drawing a huge "WELCOME TO $SOME_STUPID_PHONE_COMPANY" box on the screen every time you connected to the Internet.)

At issue is a new facility called UEFI, which allows a computer's bootloader to distinguish between different operating systems by examining their cryptographic signatures. In theory, this can be used to alert you if malicious software has modified your OS, putting you at risk of having your passwords harvested, your video and sound secretly captured, and your files plundered. But rather than simply alerting users to unsigned ("I have found an unknown operating system and I can't tell if it has dangerous software in it, continue? [Y/N]") or changed OSes ("Your computer has been modified since the last time it was turned on, and now has a version of Windows that can't be verified") Microsoft and its partners have elected to require a very complex and intimidating process that -- by design or accident -- is certain to scare off most unsophisticated users.

Fedora has opted to solve this problem by paying to receive Microsoft's blessing, so that UEFI-locked computers will boot Fedora without requiring any special steps. The payment is comparatively small ($99). When you multiply $99 by all the different versions and flavors of free/open operating systems, it adds up to a substantial revenue stream for Microsoft cost to, and drag upon the free/open software world.

What's more, free/open OSes that don't pay the $99 Microsoft tax will not boot at all on Microsoft-certified ARM-based computers, because Microsoft has forbidden it partners from booting an OS that hasn't been signed by Microsoft, even if the user takes some affirmative step to install a competing system.

This is a tremor before an earthquake: the hardware vendors and the flagging proprietary software vendors of yesteryear are teaming up to limit competition from robust, elegant and free alternatives.

Here's Fedora's Matthew Garrett explaining their decision:

We've been working on this for months. This isn't an attractive solution, but it is a workable one. We came to the conclusion that every other approach was unworkable. The cause of free software isn't furthered by making it difficult or impossible for unskilled users to run Linux, and while this approach does have its downsides it does also avoid us ending up where we were in the 90s. Users will retain the freedom to run modified software and we wouldn't have accepted any solution that made that impossible.

But is this a compromise? Of course. There's already inequalities between Fedora and users - trademarks prevent the distribution of the Fedora artwork with modified distributions, and much of the Fedora infrastructure is licensed such that some people have more power than others. This adds to that inequality. It's not the ideal outcome for anyone, and I'm genuinely sorry that we weren't able to come up with a solution that was better. This isn't as bad as I feared it would be, but nor is it as good as I hoped it would be.

What about ARM

Microsoft's certification requirements for ARM machines forbid vendors from offering the ability to disable secure boot or enrol user keys. While we could support secure boot in the same way as we plan to on x86, it would prevent users from running modified software unless they paid money for a signing key. We don't find that acceptable and so have no plans to support it.

Thankfully this shouldn't be anywhere near as much of a problem as it would be in the x86 world. Microsoft have far less influence over the ARM market, and the only machines affected by this will be the ones explicitly designed to support Windows. If you want to run Linux on ARM then there'll be no shortage of hardware available to you.

Implementing UEFI Secure Boot in Fedora (Thanks, Deborah!)
 
last i heard the trusted boot initiative which i think is what this is called.

by default the bios or firmware will only boot using a cryptographically signed operating system.


however all you have to do is change one setting in bios to make it boot a unsigned operating system.

which is probably the right way to go. as i bet 99.9% of PCs out there have never booted to something other than windows.
 
I wouldnt sweat it too much. In about 5 mins flat there will be a hack to bypass it, the Linux community having the not-too-occasional smart cookie therein, and all..
 
I wouldnt sweat it too much. In about 5 mins flat there will be a hack to bypass it, the Linux community having the not-too-occasional smart cookie therein, and all..

me thinks that the anti-trust people in Washington need to start looking at Microsoft really close again. This scheme from MS is more of an anti-trust issue than Internet Explorer ever was
 
If you read the Arstechnica article posted by altrenda then it is obvious that for standard PCs this will not be an issue. Not only can you bypass the thing entirely through the "BIOS" (it isn't that anymore, but I'll use that term for simplification), but other OSes can have their own certificates installed. If anything, it should be better protection against malware.

While their is a difference in the implementation on ARM devices, that situation is no different than the iPad. It would make sense that Microsoft would want to lock down those devices much more. Thankfully, standard PCs will still operate, and it looks like it will take a little more technical knowledge (certificate installs in the UEFI) to install a different OS, so that should mean more business for us.
 
There already is a hack for this. You go into the firmware and click Disable secure boot. Sounds technical and finicky to me.

Rather than Cory Doctorow's sky is falling article, read Ars Technica's, which more accurately describes the pros and cons.

http://arstechnica.com/information-...othing-or-the-end-of-the-world-as-we-know-it/

The only way I can really justify the "the sky is falling" mentality is he knows the users that can't figure out how to install a printer and somehow thinks these are the same people that are going to give linux a try only to find out they can't.

Somehow I don't think that is the way it's going to be.
 
me thinks that the anti-trust people in Washington need to start looking at Microsoft really close again. This scheme from MS is more of an anti-trust issue than Internet Explorer ever was

Really i mean really? wow is all i can say. This is a good move security wise, it closes one of the biggest vulnerabilities in the current security model which is code being Malicious injected during the hand off from the Bios to the operating system during boot.

Sure you could make changes to it, you could use the Public Certificate authorities but there security is looking more rickety everyday. (see Diginotar (Spelling?)) rather than microsoft dolling out signing keys.

99.99% of consumers will never know what this is beyond a bullet point on the feature list and the salesmen's sales fluff about it helps keep them more secure. so sure you could make the default setting to be off. but then it would do no good.

There already is a hack for this. You go into the firmware and click Disable secure boot. Sounds technical and finicky to me.

Rather than Cory Doctorow's sky is falling article, read Ars Technica's, which more accurately describes the pros and cons.

http://arstechnica.com/information-...othing-or-the-end-of-the-world-as-we-know-it/

i really dont call flipping a bios setting from on to off to be a hack.
 
Back
Top