On Saturday 02 Jun 2012 23:50:58 pk wrote: > On 2012-06-02 22:10, Michael Mol wrote: > > I expect the chief mechanism is at the manufacturer's end; blacklisted > > keys get included on shipment. > > Makes sense. > > > It's also probable that the OS kernel can tell the UEFI BIOS about new > > keys to blacklist. I expect that'll be a recurring thing in the > > Monthly batch of security updates Microsoft puts out. (Makes sense, > > really; if malware is using a key, blacklist that key.) > > Yes, would expect something like this. Secure boot supposedly prevents > "unauthorized firmware, operating systems or UEFI drivers" at boot time. > So if I interpret this correctly it would mean that if I have, say, an > old graphics card with an old firmware (vga bios) I can't use it with > "secure boot". More interestingly, how is an "operating system" defined? > Does it mean only the kernel itself or does it mean a full-blown OS with > init and other supporting software? What does that mean to a source > based "distro"? Also, I would assume a legitimate key would be able to > sign pretty much any binary so a key that Fedora uses could be used to > sign malware for Windows, which then would be blacklisted by > Microsoft... and how is malware defined? Anything that would be > detrimental to Microsoft? > > > Someone linked to some absolutely terrible stuff being built into > > Intel's Ivy Bridge...it's plausible it will be possible to deploy > > You mean: > https://en.wikipedia.org/wiki/Intel_insider#Intel_Insider_and_remote-contro > l > > ? > > > blacklist key updates over the network within a couple years. > > Well, UEFI already implements remote management: > http://www.uefi.org/news/UEFI_Overview.pdf (page 13) > ... so implementing an automatic update over the network, preferably via > SMM/SMI so that the operating system cannot intervene would be possible > already today... and you've lost control of your computer. > > I'm putting on my tinfoil hat now and I'm going to pretend it's > raining... :-/ > > Best regards > > Peter K
Can I please join you if you have a spare hat? On a 3 year old Dell laptop manufactured by the famous and well known Winbond Electronics </sarcasm> I see this under lshw: *-remoteaccess UNCLAIMED vendor: Intel physical id: 2 capabilities: outbound but have not found a way of interrogating it or in anyway accessing it to understand what it is or does ... Note, this is not a UEFI machine: capabilities: smbios-2.6 dmi-2.6 vsyscall32 -- Regards, Mick
signature.asc
Description: This is a digitally signed message part.