Forgot your password?
Bug DRM Linux

New Secure Boot Patches Break Hibernation 196

Posted by Unknown Lamer
from the intentional-side-effects dept.
hypnosec writes "Matthew Garrett published some patches today which break hibernate and kexec support on Linux when Secure Boot is used. The reason for disabling hibernation is that currently the Linux kernel doesn't have the capability of verifying the resume image when returning from hibernation, which compromises the Secure Boot trust model. The reason for disabling the kexec support while running in Secure Boot is that the kernel execution mechanism may be used to load a modified kernel thus bypassing the trust model of Secure Boot." Before arming your tactical nuclear flame cannon, note that mjg says "These patches break functionality that people rely on without providing any functional equivalent, so I'm not suggesting that they be merged as-is." Support for signed kexec should come eventually, but it looks like hibernation will require some clever hacking to support properly in a Restricted Boot environment.
This discussion has been archived. No new comments can be posted.

New Secure Boot Patches Break Hibernation

Comments Filter:
  • by tepples (727027) <.moc.liamg. .ta. .selppet.> on Monday January 28, 2013 @08:27PM (#42721571) Homepage Journal

    A patch that is not going to be merged into the kernel proper breaks hibernation with secure boot in Linux

    Perhaps the fear is that if the patch is not merged, Microsoft will revoke the certificates that have been used to sign mainstream GNU/Linux distributions.

  • by tepples (727027) <.moc.liamg. .ta. .selppet.> on Monday January 28, 2013 @08:41PM (#42721653) Homepage Journal

    The problem is that anyone with physical access can fuck with the memory dump in between the hibernation and the restore

    Anyone with physical access can probably reset the BIOS password and turn off secure boot. But barring that, perhaps one solution is to sign the memory dump with a key stored in the TPM.

  • Conceptually.. (Score:5, Interesting)

    by Junta (36770) on Monday January 28, 2013 @08:48PM (#42721719)
    What distinguishes hibernated memory image from, say, an initrd? Practically speaking, a distro has to allow for initrds to boot that aren't signed by the distribution. In fact, what about booting *any* filesystem? Some may suggest that the goal would be to have every binary signed, but what about end-user maintained scripts and config files? SecureBoot as currently defined only about the OS provider signing what they provide and that leaves a whole lot of area for malicious content outside that scope. It's of little comfort that you have assurance that you are running the correct sshd if, for example, you have malicious ssh_config and malicious authorized_keys.
  • by Nerdfest (867930) on Monday January 28, 2013 @10:24PM (#42722315)

    I just bought a very nice laptop from System76. Good price/performance, fantastic Linux comparability, and no Microsoft tax. I figured I might as well put my money where my mouth is on supporting vendors that have good support for Linux.

% APL is a natural extension of assembler language programming; ...and is best for educational purposes. -- A. Perlis