EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.02.12

Guest Post: UEFI’s Effects on the User

Posted in Antitrust, Microsoft, Vista 8 at 10:08 am by Dr. Roy Schestowitz

Windows 8 book

Summary: A contributor’s take and set of thoughts about Microsoft’s latest anti-competitive tactic

Did you know, Microsoft Press (A Division of Microsoft Corporation) has published a Windows 8 book as PDF, titled “Inside Out Windows 8”. The ultimate, in-depth reference Hundreds of timesaving solutions Supremely organized, packed with expert advice Companion eBook (744 pages 34.2 MB)

However, the one and only section (page 25) on UEFI “Secure Boot” doesn’t mention how it functions, works or operates, how to access it or any interoperability. No mention on how to even disable Secure Boot at all.

Such as the undocumented steps below;

1. Boot machine while pressing F10

2. Find Secure Boot in the menu tree, ignore warnings

3. Disable Secure Boot feature

4. Enable legacy boot options

5. Enable specific legacy devices, such as USB devices

6. Save and reboot while holding down F9

Book shot

(No mention in Chapter 27!)

I want to point out there is NO such thing as “Windows Hardware” because Microsoft does NOT manufacture Lenovo, Sony, Toshiba, Acer, Asus, MSI, VIA, HP, Dell, Celvo, Sager, etc…

This is Microsoft extending its own brand (software) upon firmware, claiming it’s their platform. Why do the manufactures accept this theft of their hardware product?

Why doesn’t someone write to the European Court of Justice and file a complaint?

Regarding how UEFI Secure Boot has the side effect of preventing interoperability against competitors and open society by preventing unauthorized firmware, operating systems, or UEFI drivers from running at boot time unless they bear a cryptographic signature by Microsoft, the manufacturer or an UEFI signing key vendor ($99 for an UEFI signing key) for any software that modifies the bootloader that enforces the UEFI secure boot protocol.

Basically, the bootloader is the place where the PC hardware reads instructions to boot up an operating system or program. Windows installs those instructions in the bootloader, just as another operating system like Linux. By making the process proprietary without full documentation, competitors are at a huge disadvantage.

Microsoft has basically inserted themselves as the UEFI gatekeeper for installing not just their software, but any software that modifies the bootloader on a potentially huge number of devices globally around the world.

The main issue with the UEFI secure protocol is that it excludes out ALL other operating systems, for the right of sharing (educational), giving (philanthropy), renting, loaning, and borrowing on other W8 PC system/s hardware to run boxed copies of Windows or Linux on Windows logo hardware, and also impossible to install new versions of Windows or Linux unless your OEM provided a new UEFI digitally signed key. A system that ships with only OEM and Microsoft keys will not boot a generic copy of Linux.

Not to mention, Windows 8 PC owners won’t be able to replace their OS with another like Windows 7, unless they obtain a digitally signed Secure Boot version for their system.

One of the few shortcomings in the UEFI model (and it is a deliberate omission because of the complexity of running a certification system) is that there’s no designated root of trust in the current version 2.3.1. for a centralized vendor-neutral signing authority to provide UEFI keys.

The Windows 8 PC you buy in 2013 will be permanently locked into Windows 8 if Microsoft gets away with their plan. Windows 8 certification does not require that the user be able to disable UEFI secure boot, and hardware vendors have reported already that on some hardware will not have this option available.

Of course, Windows 8 certification does not require that the PC system come with any keys other than Microsoft’s. A system that ships with UEFI secure boot enabled and only includes Microsoft’s signing keys will only securely boot Microsoft operating systems.

Think how this gives great power to Microsoft, for every manufacturer that wants to sell hardware for the Windows 8 PC, needs a UEFI digital signed key, from Microsoft!

Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).

The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice. The PC user is not guaranteed that their system will include the signing keys that would be required for them to swap their graphics card from another vendor, or replace their network card and still be able to netboot, or install a newer SATA controller and have it recognize their hard drive in the firmware. Of course, UEFI doesn’t provide the means to generate your own UEFI keys either. Just where does that leave the PC user?

The truth is that UEFI using the Secure Boot Protocol v2.3.1 makes it more difficult to run anything other than Windows 8. UEFI secure boot is a valuable and worthwhile feature that Microsoft is misusing to gain tighter control over the market.

As it stands now Microsoft is saying OEMs don’t have to do it. They just have to do it if they want to sell PCs with Windows on them.

Links:

  • http://www.uefi.org/specs/download/UEFI_2_3_1_Errata_A.zip “UEFI Specification 2.3.1″ (2,139 pages)
  • http://download.microsoft.com/download/A/D/F/ADF5BEDE-C0FB-4CC0-A3E1-B38093F50BA1/windows8-hardware-cert-requirements-system.pdf (291 pages)

Note: you can obtain the source PDF as Microsoft PDF ebook “Windows 8 Inside Out by Tony Northrup (Nov 23, 2012)”

Library of Congress Control Number: 2012950441

ISBN: 978-0-7356-6381-7

Amazon.com: http://www.amazon.com/Windows-Inside-Out-Tony-Northrup/dp/0735663815/ref=sr_1_1?s=books&ie=UTF8&qid=1354458846&sr=1-1&keywords=9780735663817

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Tony Northrup said,

    December 14, 2012 at 4:28 pm

    Gravatar

    Hi. I’m the author of Windows 8 Inside Out.

    Regarding the book, you’re right that the coverage of Secure Boot is brief, and perhaps too brief. However, since the book is about Windows 8 and Windows 8 users shouldn’t ever need to configure Secure Boot, it seemed sufficient for my audience.

    Also note that there’s no single process for turning off Secure Boot, because it must be done within the UEFI firmware, and that can be different for every PC (or at least, every UEFI implementation). So, providing step-by-step instructions for that would have been impossible. The lack of a consistent user interface is actually one of the biggest drawbacks to Secure Boot; if users want to turn it off, they need to read the manual, and you know how that goes…

    There’s plenty of information out there about how it works, and in fact I’m in the process of writing a much longer whitepaper for IT audiences.

    People are concerned about Secure Boot because all PCs that get the Windows 8 logo certification MUST support Secure Boot and have it turned on by default. However, that same certification process also requires PCs to:
    * Allow the user to add their own keys, so they can trust any bootloader/OS they want.
    * Completely disable Secure Boot, so the PC operates will load anything (including a bootkit).

    Just wanted to clarify that the concern isn’t, “Users can’t run Linux!” it’s, “Users have to follow potentially confusing steps to change their Secure Boot settings if their favorite Linux distro doesn’t have a certified boot loader.”

    There is a certified shim that Linux distros can use, though I know none of them are especially happy about having to get a cert from Microsoft: http://mjg59.dreamwidth.org/20303.html

    My understanding is that these statements are now incorrect:

    “Windows 8 certification does not require that the user be able to disable UEFI secure boot” and “The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice.” The certification does require users to be able to disable Secure Boot, as well as trusting any bootloader they choose.

    However, this statement is true:

    “Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).”

    Of course, it’s also true of just about every mobile device (iPhones, iPads, Kindle Fires, most Android devices, etc). Personally, I wish they would just let people load their own software, but the security guy in me understands the risks and the support guy in me knows the headaches.

What Else is New


  1. Links 29/10/2014: Ubuntu Touch Tablet, Puppy Linux 6.0

    Links for the day



  2. Links 28/10/2014: SUSE Linux Enterprise 12, Canonical OpenStack Distro

    Links for the day



  3. Links 28/10/2014: PiFxOS, The Document Foundation in OSBA

    Links for the day



  4. Microsoft is Bricking Devices With Linux (Yet Again!), So a Microsoft Booster Spins/Paints Linux Devices as 'Fakes'

    Microsoft delivers rogue drivers through Windows Update and they brick Arduino microcontrollers



  5. How Bill Gates Continues to Pass Wealth From the Public to His Own Bank Account

    Having put a universal tax on many things (not just computers) and evaded tax using the classic 'charity' trick, Gates is now buying the media, the schools, politicians etc. and earns as much as 10 billion dollars per year while the public is taught that Gates is a giver, not a hoarder of the worst kind



  6. Links 27/10/2014: Lenovo Unbundling, Linux 3.18 RC2

    Links for the day



  7. IRC Proceedings: September 14th, 2014 – October 25th, 2014

    Many IRC logs



  8. Links 25/10/2014: KDE Mockups, Update on GNOME Outreach Program for Women

    Links for the day



  9. After Infecting Unity -- Successfully -- Microsoft's Partner Xamarin Wants to Infect Unreal Engine With .NET

    Xamarin continues to spread dependence on Microsoft to more gaming frameworks, not just platforms such as GNU/Linux, Android, and even permanent-state devices



  10. Taking Microsoft Windows Off the Grid for Damage to Businesses, the Internet, and Banking Systems

    Microsoft's insecure-by-design software is causing massive damages ([cref 27802 possibly trillions] of [cref 13992 dollars in damages to date]) and yet the corporate press does not ask the right questions, let alone suggest a ban on Microsoft software



  11. City of Berlin Does Not Abandon Free Software, It's Only Tax Authorities

    A Softpedia report that says the City of Berlin is moving to Microsoft Office is flawed and may be based on a poor translation



  12. Nadella a Liar in Chief at Microsoft, Pretending That His Anti-Competitive Practices Are Unfortunately Imposed on Microsoft

    The nastiness of Microsoft knows no bounds as even its assault on GNU/Linux and dirty tricks against Free software adoption are characterised as the fault of 'pirates'



  13. Reuters Writes About the Demise of Software Patents, But Focuses on 'Trolls' and Quotes Lawyers

    How the corporate media chooses to cover the invalidity of many software patents and the effect of that



  14. Links 24/10/2014: Microsoft Tax Axed in Italy, Google's Linux (ChromeOS/Android) Leader Promoted

    Links for the day



  15. Links 24/10/2014: GNU/Linux History, Fedora Delay

    Links for the day



  16. Links 23/10/2014: New *buntu, Benchmarks

    Links for the day



  17. Links 22/10/2014: Chromebooks Surge, NSA Android Endorsement

    Links for the day



  18. Links 21/10/2014: Debian Fork Debate, New GNU IceCat

    Links for the day



  19. Criminal Microsoft is Censoring the Web and Breaks Laws to Do So; the Web Should Censor (Remove) Microsoft

    Microsoft is still breaking the Internet using completely bogus takedown requests (an abuse of DMCA) and why Microsoft Windows, which contains weaponised back doors (shared with the NSA), should be banned from the Internet, not just from the Web



  20. Microsoft 'Loving' GNU/Linux and Other Corporate Media Fiction

    Microsoft has bullied or cleverly bribed enough technology-centric media sites to have them characterise Microsoft as a friend of Free/Open Source software (FOSS) that also "loves Linux"



  21. India May be Taking Bill Gates to Court for Misusing His So-called 'Charity' to Conduct Clinical Trials Without Consent on Behalf of Companies He Invests in

    Bill Gates may finally be pulled into the courtroom again, having been identified for large-scale abuses that he commits in the name of profit (not "charity")



  22. The Problems With Legal Workarounds, Patent Scope, and Expansion of Patent Trolls to the East

    Patent trolls are in the news again and it's rather important, albeit for various different reasons, more relevant than the ones covered here in the past



  23. Links 20/10/2014: Cloudera and Red Hat, Debian 7.7, and Vivid Vervet

    Links for the day



  24. Links 20/10/2014: 10 Years Since First Ubuntu Release

    Links for the day



  25. How Patent Lawyers Analyze Alice v. CLS Bank

    Breaking down a patent lawyer's analysis of a Supreme Court's decision that seemingly invalidated hundreds of thousands of software patents



  26. Is It Google's Turn to Head the USPTO Corporation?

    The industry-led USPTO continues to be coordinated by some of its biggest clients, despite issues associated with conflicting interests



  27. The EPO's Public Relations Disaster Amid Distrust From Within (and EPO Communications Chief Leaves): Part VII

    Amid unrest and suspicion of misconduct in the EPO's management (ongoing for months if not years), Transparency International steps in, but the EPO's management completely ignores Transparency International, refusing to collaborate; the PR chief of the EPO is apparently being pushed out in the mean time



  28. Links 18/10/2014: Debian Plans for Init Systems, Tails 1.2

    Links for the day



  29. Links 18/10/2014: New ELive, Android Expansion

    Links for the day



  30. Another Fresh Blow to Software Patents (and With Them Patent Trolls)

    Another new development shows that more burden of proof is to be put on the litigant, thus discouraging the most infamous serial patent aggressors and reducing the incentive to settle with a payment out of court


CoPilotCo

RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

CoPilotCo

Recent Posts