Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×

Comment Re:Restricted Boot by definition insecure (Score 1) 210

If you were a serious virus writer you'd already want to use the Microsoft CA to sign your rootkit so you can install it as a signed driver in Windows. Secure Boot moves the vulnerability down the stack, but even now a compromised Microsoft signing key is still massively desirable to virus authors.

Comment Re:So then they're fine with Windows 8 (Score 1) 210

Microsoft have told me that they'll revoke certification for any vendor who doesn't provide the appropriate options. If you have examples of machines that have certification and which don't allow any modification of the key database, let me know so we can find out if they were telling the truth.

Comment Re:What problem does it solve? (Score 2, Informative) 210

BIOS boot sector protection has never prevented writes to the MBR unless you're running DOS - any actual OS uses direct hardware access instead of using the BIOS, and so it can't be blocked. It'd be possible for the BIOS to complain that the MBR's been modified, but it has no way of verifying that the partition boot code or the actual bootloader are still secure. Unsurprisingly, malware authors take advantage of this - https://support.kaspersky.com/viruses/solutions?qid=208280748 has a list of modern bootkits.

Comment Re:How does this work? (Score 2) 274

It'll only boot grub if grub is signed with a key that a physically present user has manually enrolled. If you choose to enrol a key that's been used to sign a grub that'll then boot anything (including viruses) then you're vulnerable, but such a virus would only be able to infect systems with that key installed - anyone who hasn't installed that key still gets the protection.

Comment Re:Doesn't work (Score 4, Informative) 274

If your system currently has Windows 8 installed, then do this:

1) Insert the install media
2) Mouse to the bottom right
3) Select "Settings"
4) Click "Power"
5) While holding down shift, click "Restart"
6) Click "Use a device"
7) Click your install media

This is a little more involved than ideal, but it's got the huge benefit that it's consistent between systems rather than requiring you to use different hotkeys for different platforms.

Linux

Submission + - Secure Bootloader for Distributions Now Available (dreamwidth.org)

TrueSatan writes: Matthew Garrett, formerly of Red Hat, is providing a shim bootloader that will allow installation/booting of secure boot enabled computers. The shim is designed to chain boot GRUB (Grand Universal Bootloader) without the need for a distribution to obtain a key from Microsoft.

Garrett asks that further contacts regarding the shim be made to him and not to Red Hat as he no longer works there and they may not have knowledge of the product.

Microsoft

Submission + - Microsoft's Controvercial Magic Constant For HyperV (muktware.com)

sfcrazy writes: Who said Microsoft developers don't have a sense of humor. Even if that humor is sexist. Our own Matthew Garrett, UEFI secure boot fame, has posted a blog about the magic constant Microsoft used in its HyperV code.

Matthew writes: Paolo Bonzini noticed something a little awkward in the Linux kernel support code for Microsoft's HyperV virtualisation environment — specifically, that the magic constant passed through to the hypervisor was "0xB16B00B5", or, in English, "BIG B**BS". It turns out that this isn't an exception — when the code was originally submitted it also contained "0x0B00B135". That one got removed when the Xen support code was ripped out.

Slashdot Top Deals

Trap full -- please empty.

Working...