Slashdot is powered by your submissions, so send in your scoop

 



Forgot your password?
typodupeerror
×
SuSE

Secure Boot Coming To SuSE Linux Servers 135

darthcamaro writes "UEFI Secure Boot is a problem that only desktop users need to worry about right? Well kinda/sorta/maybe not. SeSE today is releasing SUSE Linux Enterprise 11 SP3 which will include for the first time — support for UEFI Secure Boot. Apparently SUSE sees market demand for Secure Boot on servers too. Quoting Matthias Eckermann, Senior Product Manager at SUSE: 'Our market analysis shows that UEFI Secure Boot is a UEFI extension that does not only cover desktops, but might very well also be deployed and even required on server systems going forward.'"
This discussion has been archived. No new comments can be posted.

Secure Boot Coming To SuSE Linux Servers

Comments Filter:
  • by Junta ( 36770 ) on Monday July 08, 2013 @08:23PM (#44220969)

    SecureBoot is an incomplete strategy. It only allows for attestation of software vendor provided content. It does nothing for:
    -custom executables
    -configuration data and so on

    Servers in particular need to be looking for a mechanism for the customer to measure and secure their own boot stuff. Constructing a good enough root kit out of valid signed secureboot content is going to be feasible unless you render the system overly limited.

    It's theoretically possible to completely break SecureBoot but still advertise SecureBoot as intact. System will merrily load up a signed hypervisor and that signed hypervisor may in turn do whatever the hell it wants including boot the 'normal' OS as a guest with firmware that will tell the OS whatever the attacker feels like. If secureboot is disabled, you can have a rootkit that advertises it as enabled without issue.

    Ultimately, it's a mitigation strategy with huge gaping holes that people presume are no longer a problem because they don't take the time to understand the nuances of such a strategy. I'm not accusing the designers of this misconception, but the general population's understanding of the benefits of SecureBoot has been very misguided (I have heard some claim that PXE being wide open is ok because secureboot would protect it, in one example of how badly misunderstood Secureboot is)

  • by bws111 ( 1216812 ) on Monday July 08, 2013 @08:48PM (#44221109)

    Secure boot does nothing to prevent the end user from being in control, and it does not require anything from Microsoft. If your vendor does not allow you to install your own keys, get a better vendor.

  • by 0123456 ( 636235 ) on Monday July 08, 2013 @08:55PM (#44221139)

    Secure boot does nothing to prevent the end user from being in control, and it does not require anything from Microsoft. If your vendor does not allow you to install your own keys, get a better vendor.

    So first you say that Windows Boot doesn't prevent the end user from being in control, then you admit that it puts the vendor in control. Vendor lock-in is the whole point of Windows Boot.

  • Secure Boot ISN'T! (Score:2, Insightful)

    by kawabago ( 551139 ) on Monday July 08, 2013 @09:00PM (#44221179)
    Secure Boot isn't secure nor is it a security feature. It's sole purpose is to keep Linux off of x86 computers. It's already easy to get around 'Secure Boot so I think it's broken as a concept. Security has to constantly evolve to meet evolving problems. Hardware can't do that.
  • by Junta ( 36770 ) on Monday July 08, 2013 @09:02PM (#44221187)

    My issue is that I'm having a hard time seeing what SecureBoot adds that cannot be acheived in a better fashion (e.g. more comprehensive use of a TPM). SecureBoot doesn't ensure that your are booting is signed by someone you trust. It assures that one efi executable was signed by someone (who you may or may not 'trust'), but most would conceive of 'what you are booting' to be the universe of everything that happens prior to the system being usable, boot loader, kernel, configuration, third party executables, etc etc, which SecureBoot does nothing to really facilitate meaningful measurement. SecureBoot is ill equipped to facilitate most of that.

    It complicates use of non-microsoft OSes and I think the value of the mitigation provided is greatly overestimated due to a name that suggests more assurance than one should reasonably assume.

  • by Rockoon ( 1252108 ) on Monday July 08, 2013 @09:09PM (#44221225)

    Unless the hardware manufacturer won't let you.

    Isn't this argument essentially fear, doubt, and uncertainty?

  • by mystikkman ( 1487801 ) on Monday July 08, 2013 @09:11PM (#44221239)

    Most folks with half a brain cell have left because of the constant slanted summaries, biased moderation by people with an axe to grind and the constant FUD and lies being spread on here.

    http://mobile.slashdot.org/story/13/03/17/1914209/microsoft-to-abandon-windows-phone [slashdot.org]

    Don't think that the constant karma whoring and circlejerking by the likes of symbolset, bmo, etc. and the moderation does not have any ill effects. There's no place for rational discourse here, whoever posts the most anti-MS screed gets voted up regardless of facts.

  • by Nerdfest ( 867930 ) on Monday July 08, 2013 @09:38PM (#44221371)

    what you are booting is signed by someone you trust

    Or Microsoft.

  • by Anonymous Coward on Monday July 08, 2013 @09:59PM (#44221485)

    I like how "Secure" Boot articles bring the Microsoft shills out of the woodwork.

  • by KiloByte ( 825081 ) on Monday July 08, 2013 @10:19PM (#44221587)

    It complicates use of non-microsoft OSes

    And that's the whole reason SecureBoot is getting pushed onto manufacturers.

You knew the job was dangerous when you took it, Fred. -- Superchicken

Working...