EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.02.12

Guest Post: UEFI’s Effects on the User

Posted in Antitrust, Microsoft, Vista 8 at 10:08 am by Dr. Roy Schestowitz

Windows 8 book

Summary: A contributor’s take and set of thoughts about Microsoft’s latest anti-competitive tactic

Did you know, Microsoft Press (A Division of Microsoft Corporation) has published a Windows 8 book as PDF, titled “Inside Out Windows 8”. The ultimate, in-depth reference Hundreds of timesaving solutions Supremely organized, packed with expert advice Companion eBook (744 pages 34.2 MB)

However, the one and only section (page 25) on UEFI “Secure Boot” doesn’t mention how it functions, works or operates, how to access it or any interoperability. No mention on how to even disable Secure Boot at all.

Such as the undocumented steps below;

1. Boot machine while pressing F10

2. Find Secure Boot in the menu tree, ignore warnings

3. Disable Secure Boot feature

4. Enable legacy boot options

5. Enable specific legacy devices, such as USB devices

6. Save and reboot while holding down F9

Book shot

(No mention in Chapter 27!)

I want to point out there is NO such thing as “Windows Hardware” because Microsoft does NOT manufacture Lenovo, Sony, Toshiba, Acer, Asus, MSI, VIA, HP, Dell, Celvo, Sager, etc…

This is Microsoft extending its own brand (software) upon firmware, claiming it’s their platform. Why do the manufactures accept this theft of their hardware product?

Why doesn’t someone write to the European Court of Justice and file a complaint?

Regarding how UEFI Secure Boot has the side effect of preventing interoperability against competitors and open society by preventing unauthorized firmware, operating systems, or UEFI drivers from running at boot time unless they bear a cryptographic signature by Microsoft, the manufacturer or an UEFI signing key vendor ($99 for an UEFI signing key) for any software that modifies the bootloader that enforces the UEFI secure boot protocol.

Basically, the bootloader is the place where the PC hardware reads instructions to boot up an operating system or program. Windows installs those instructions in the bootloader, just as another operating system like Linux. By making the process proprietary without full documentation, competitors are at a huge disadvantage.

Microsoft has basically inserted themselves as the UEFI gatekeeper for installing not just their software, but any software that modifies the bootloader on a potentially huge number of devices globally around the world.

The main issue with the UEFI secure protocol is that it excludes out ALL other operating systems, for the right of sharing (educational), giving (philanthropy), renting, loaning, and borrowing on other W8 PC system/s hardware to run boxed copies of Windows or Linux on Windows logo hardware, and also impossible to install new versions of Windows or Linux unless your OEM provided a new UEFI digitally signed key. A system that ships with only OEM and Microsoft keys will not boot a generic copy of Linux.

Not to mention, Windows 8 PC owners won’t be able to replace their OS with another like Windows 7, unless they obtain a digitally signed Secure Boot version for their system.

One of the few shortcomings in the UEFI model (and it is a deliberate omission because of the complexity of running a certification system) is that there’s no designated root of trust in the current version 2.3.1. for a centralized vendor-neutral signing authority to provide UEFI keys.

The Windows 8 PC you buy in 2013 will be permanently locked into Windows 8 if Microsoft gets away with their plan. Windows 8 certification does not require that the user be able to disable UEFI secure boot, and hardware vendors have reported already that on some hardware will not have this option available.

Of course, Windows 8 certification does not require that the PC system come with any keys other than Microsoft’s. A system that ships with UEFI secure boot enabled and only includes Microsoft’s signing keys will only securely boot Microsoft operating systems.

Think how this gives great power to Microsoft, for every manufacturer that wants to sell hardware for the Windows 8 PC, needs a UEFI digital signed key, from Microsoft!

Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).

The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice. The PC user is not guaranteed that their system will include the signing keys that would be required for them to swap their graphics card from another vendor, or replace their network card and still be able to netboot, or install a newer SATA controller and have it recognize their hard drive in the firmware. Of course, UEFI doesn’t provide the means to generate your own UEFI keys either. Just where does that leave the PC user?

The truth is that UEFI using the Secure Boot Protocol v2.3.1 makes it more difficult to run anything other than Windows 8. UEFI secure boot is a valuable and worthwhile feature that Microsoft is misusing to gain tighter control over the market.

As it stands now Microsoft is saying OEMs don’t have to do it. They just have to do it if they want to sell PCs with Windows on them.

Links:

  • http://www.uefi.org/specs/download/UEFI_2_3_1_Errata_A.zip “UEFI Specification 2.3.1″ (2,139 pages)
  • http://download.microsoft.com/download/A/D/F/ADF5BEDE-C0FB-4CC0-A3E1-B38093F50BA1/windows8-hardware-cert-requirements-system.pdf (291 pages)

Note: you can obtain the source PDF as Microsoft PDF ebook “Windows 8 Inside Out by Tony Northrup (Nov 23, 2012)”

Library of Congress Control Number: 2012950441

ISBN: 978-0-7356-6381-7

Amazon.com: http://www.amazon.com/Windows-Inside-Out-Tony-Northrup/dp/0735663815/ref=sr_1_1?s=books&ie=UTF8&qid=1354458846&sr=1-1&keywords=9780735663817

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Tony Northrup said,

    December 14, 2012 at 4:28 pm

    Gravatar

    Hi. I’m the author of Windows 8 Inside Out.

    Regarding the book, you’re right that the coverage of Secure Boot is brief, and perhaps too brief. However, since the book is about Windows 8 and Windows 8 users shouldn’t ever need to configure Secure Boot, it seemed sufficient for my audience.

    Also note that there’s no single process for turning off Secure Boot, because it must be done within the UEFI firmware, and that can be different for every PC (or at least, every UEFI implementation). So, providing step-by-step instructions for that would have been impossible. The lack of a consistent user interface is actually one of the biggest drawbacks to Secure Boot; if users want to turn it off, they need to read the manual, and you know how that goes…

    There’s plenty of information out there about how it works, and in fact I’m in the process of writing a much longer whitepaper for IT audiences.

    People are concerned about Secure Boot because all PCs that get the Windows 8 logo certification MUST support Secure Boot and have it turned on by default. However, that same certification process also requires PCs to:
    * Allow the user to add their own keys, so they can trust any bootloader/OS they want.
    * Completely disable Secure Boot, so the PC operates will load anything (including a bootkit).

    Just wanted to clarify that the concern isn’t, “Users can’t run Linux!” it’s, “Users have to follow potentially confusing steps to change their Secure Boot settings if their favorite Linux distro doesn’t have a certified boot loader.”

    There is a certified shim that Linux distros can use, though I know none of them are especially happy about having to get a cert from Microsoft: http://mjg59.dreamwidth.org/20303.html

    My understanding is that these statements are now incorrect:

    “Windows 8 certification does not require that the user be able to disable UEFI secure boot” and “The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice.” The certification does require users to be able to disable Secure Boot, as well as trusting any bootloader they choose.

    However, this statement is true:

    “Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).”

    Of course, it’s also true of just about every mobile device (iPhones, iPads, Kindle Fires, most Android devices, etc). Personally, I wish they would just let people load their own software, but the security guy in me understands the risks and the support guy in me knows the headaches.

What Else is New


  1. Microsoft's Vista 10 Still a Failure, So Focus Shifts to Attacks on GNU/Linux, Android

    Vista 10 adoption is already plateauing (at very low levels considering the zero-cost 'upgrade') and Microsoft is trying to assert or exploit (patent) monopolies where adoption and market growth are extremely high (Free software)



  2. Links 3/9/2015: Xiaomi's Linux Push, Calligra/Krita 2.9.7

    Links for the day



  3. TechBytes Episode 89: Chromebooks, Privacy, and Vista 10

    An episode which focuses on the rise of Chromebooks, serious issues pertaining to privacy, media bias, and the demise of Windows



  4. Links 2/9/2015: Chromebooks and Red Hat Enterprise Linux 7.2 Beta

    Links for the day



  5. Software Patent From Troll Called 'Rothschild Connected Devices Innovations' a Symptom of a Rotten Patent System

    Another example of patent trolls and software patents as gatekeepers and parasites, denying access to very trivial ideas or implementations



  6. When Even Patent Lawyers' Blogs Acknowledge the Rapid Demise of Software Patents

    Voices for patents are accepting the new order wherein software patents are hardly potent at all (and increasingly difficult to acquire)



  7. Calling Proprietary Software, Software Patents, Lock-in (Like OOXML) and DRM 'Open'

    What Microsoft et al. call 'Next-Generation Open Media Formats' are basically neither open nor acceptable (it's DRM) and what Microsoft apologists dub 'Open Source Tools' are just another example of a Microsoft Office openwashing Trojan horse



  8. Recycled Old News About Vista 10, Stressing That Not Only '10' is Spyware But All of Windows is

    How Microsoft propagandists are spinning Microsoft's gross and potentially illegal privacy violations as a reason to 'upgrade' to Vista 10



  9. Links 1/9/2015: Manjaro Linux 0.8.13, Netrunner 14.2 LTS

    Links for the day



  10. Patents Roundup: IAM's Claims About India, Lawyers' Patent Bias, ITC for Microsoft, and PTAB Against Kyle Bass

    Another weekly summary, focusing on issues that pertain to or affect Free software in particular



  11. Microsoft Crowd Rocks the Media With Misleading Claims and Deliberate Lies About GNU/Linux, Vista 10, and Free/Open Source Software

    A roundup of rigged press coverage, intended purely to serve Microsoft's agenda



  12. Links 31/8/2015: Linux 4.2, LXLE 14.04.3

    Links for the day



  13. IRC Proceedings: August 9th, 2015 – August 29th, 2015

    Many IRC logs



  14. “Conservative” Site Responds (Yet Again) to Misguided “Conservative” Efforts to Derail Patent Reform in the US

    Patent trolls throw stones in glass houses, contributing to their own unpopularity, but some influential “Conservatives” continue to defend (conserve) them



  15. Increase in Lobbying for Software Patents in Europe and Its Trojan Horse, the Unitary Patent (UPC)

    The relentless campaigns to bring software patents into Europe have not stopped and so-called 'unification' -- much like so-called 'trade' deals -- serves to support them



  16. Microsoft Technology Crashes Financial Markets, Again

    SunGard, which is a Microsoft shop, is clearly failing to provide what it calls mission-ciriticaal [sic] solutions



  17. Alice v. CLS Bank (Alice/§101) Comes to Squash Software Patents Even in Eastern District of Texas

    The crackdown on software patents is coming along nicely and the Alice case is now being utilised even in the capital of patent trolls



  18. Apple's Patent Cases Against Android Are Falling Apart, as Acknowledged Even by the Anti-Android Lobby





  19. Links 29/8/2015: NetworkManager 1.0.6, Systemd Merges “su” Command Replacement

    Links for the day



  20. Microsoft Loves Linux to Death and Still Tries to Kill GNU/Linux

    Microsoft's relentless attacks on GNU/Linux and Free software in general (even if it runs on Windows) are so evident that claims of 'love' remain laughable at best (if not infuriating)



  21. Censorship, Self-Censorship and Intimidation Now the Modus Operandi at EPO

    The European Patent Office has ceased even trying to pretend that it respects human rights, including the right to free speech



  22. Patent Practitioners: "The Unitary Patent Might be Able to Open the Floodgates for Software Patents in Europe"

    The EPO-backed Unitary Patent scheme threatens to bring software patents to Europe and along with them a lot of patent trolls from all around the world (especially the United States)



  23. Microsoft Lies About Vista 10 and Increases Microsoft Surveillance (Even Beyond Vista 10 and Into Android, Vista 7/8)

    Windows surveillance expands retroactively, making its way into platforms other than Windows and also expanding to predecessors of Vista 10



  24. Another Suicide at the EPO, Fifth by Our Count

    Yet another EPO member of staff has just committed suicide, leading to the inevitable question: how many people need to die before Battistelli and his minions are out of the Office for good?



  25. Links 27/8/2015: ownCloud Desktop Client 2.0, Red Hat Downgraded

    Links for the day



  26. Microsoft-connected Mesosphere Threatens to Eliminate Free Software in the Datacentre

    Hiding behind a misleading 'open' label while actually backed by Microsoft (and based on new rumours may join Microsoft), Mesosphere wishes to eradicate Free and back doors-free software in large datacentres hosting a lot of physical and virtual servers



  27. Microsoft Aggression Against GNU/Linux Amid Vista 10's Failure

    A look at the recent assault on GNU/Linux in Munich and the likely cause for this assault (in such a timely fashion, too)



  28. Message to LinuxCon Regarding Microsoft: “It is Necessary to Get Behind Someone in Order to Stab Them in the Back.” -Sir Humphrey Appleby

    Jim Zemlin, executive director of the Linux Foundation, helps Microsoft gain influence in the Foundation after payments are received



  29. Market Share Estimates Confirm That Vista 10 Failed in a Major Way

    Confirmatory evidence that Vista 10 is failing in the market about a month after its much-hyped (paid coverage) release



  30. When Microsoft, the Master of Patent Trolls, Complains About Trolls

    Possibly the world's biggest patent abuser and monopolist, which also creates many patent trolls (including by far the biggest one), takes on a far smaller abuser in Court


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts