EditorsAbout the SiteComes vs. MicrosoftUsing This Web SiteSite ArchivesCredibility IndexOOXMLOpenDocumentPatentsNovellNews DigestSite NewsRSS

12.02.12

Guest Post: UEFI’s Effects on the User

Posted in Antitrust, Microsoft, Vista 8 at 10:08 am by Dr. Roy Schestowitz

Windows 8 book

Summary: A contributor’s take and set of thoughts about Microsoft’s latest anti-competitive tactic

Did you know, Microsoft Press (A Division of Microsoft Corporation) has published a Windows 8 book as PDF, titled “Inside Out Windows 8”. The ultimate, in-depth reference Hundreds of timesaving solutions Supremely organized, packed with expert advice Companion eBook (744 pages 34.2 MB)

However, the one and only section (page 25) on UEFI “Secure Boot” doesn’t mention how it functions, works or operates, how to access it or any interoperability. No mention on how to even disable Secure Boot at all.

Such as the undocumented steps below;

1. Boot machine while pressing F10

2. Find Secure Boot in the menu tree, ignore warnings

3. Disable Secure Boot feature

4. Enable legacy boot options

5. Enable specific legacy devices, such as USB devices

6. Save and reboot while holding down F9

Book shot

(No mention in Chapter 27!)

I want to point out there is NO such thing as “Windows Hardware” because Microsoft does NOT manufacture Lenovo, Sony, Toshiba, Acer, Asus, MSI, VIA, HP, Dell, Celvo, Sager, etc…

This is Microsoft extending its own brand (software) upon firmware, claiming it’s their platform. Why do the manufactures accept this theft of their hardware product?

Why doesn’t someone write to the European Court of Justice and file a complaint?

Regarding how UEFI Secure Boot has the side effect of preventing interoperability against competitors and open society by preventing unauthorized firmware, operating systems, or UEFI drivers from running at boot time unless they bear a cryptographic signature by Microsoft, the manufacturer or an UEFI signing key vendor ($99 for an UEFI signing key) for any software that modifies the bootloader that enforces the UEFI secure boot protocol.

Basically, the bootloader is the place where the PC hardware reads instructions to boot up an operating system or program. Windows installs those instructions in the bootloader, just as another operating system like Linux. By making the process proprietary without full documentation, competitors are at a huge disadvantage.

Microsoft has basically inserted themselves as the UEFI gatekeeper for installing not just their software, but any software that modifies the bootloader on a potentially huge number of devices globally around the world.

The main issue with the UEFI secure protocol is that it excludes out ALL other operating systems, for the right of sharing (educational), giving (philanthropy), renting, loaning, and borrowing on other W8 PC system/s hardware to run boxed copies of Windows or Linux on Windows logo hardware, and also impossible to install new versions of Windows or Linux unless your OEM provided a new UEFI digitally signed key. A system that ships with only OEM and Microsoft keys will not boot a generic copy of Linux.

Not to mention, Windows 8 PC owners won’t be able to replace their OS with another like Windows 7, unless they obtain a digitally signed Secure Boot version for their system.

One of the few shortcomings in the UEFI model (and it is a deliberate omission because of the complexity of running a certification system) is that there’s no designated root of trust in the current version 2.3.1. for a centralized vendor-neutral signing authority to provide UEFI keys.

The Windows 8 PC you buy in 2013 will be permanently locked into Windows 8 if Microsoft gets away with their plan. Windows 8 certification does not require that the user be able to disable UEFI secure boot, and hardware vendors have reported already that on some hardware will not have this option available.

Of course, Windows 8 certification does not require that the PC system come with any keys other than Microsoft’s. A system that ships with UEFI secure boot enabled and only includes Microsoft’s signing keys will only securely boot Microsoft operating systems.

Think how this gives great power to Microsoft, for every manufacturer that wants to sell hardware for the Windows 8 PC, needs a UEFI digital signed key, from Microsoft!

Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).

The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice. The PC user is not guaranteed that their system will include the signing keys that would be required for them to swap their graphics card from another vendor, or replace their network card and still be able to netboot, or install a newer SATA controller and have it recognize their hard drive in the firmware. Of course, UEFI doesn’t provide the means to generate your own UEFI keys either. Just where does that leave the PC user?

The truth is that UEFI using the Secure Boot Protocol v2.3.1 makes it more difficult to run anything other than Windows 8. UEFI secure boot is a valuable and worthwhile feature that Microsoft is misusing to gain tighter control over the market.

As it stands now Microsoft is saying OEMs don’t have to do it. They just have to do it if they want to sell PCs with Windows on them.

Links:

  • http://www.uefi.org/specs/download/UEFI_2_3_1_Errata_A.zip “UEFI Specification 2.3.1″ (2,139 pages)
  • http://download.microsoft.com/download/A/D/F/ADF5BEDE-C0FB-4CC0-A3E1-B38093F50BA1/windows8-hardware-cert-requirements-system.pdf (291 pages)

Note: you can obtain the source PDF as Microsoft PDF ebook “Windows 8 Inside Out by Tony Northrup (Nov 23, 2012)”

Library of Congress Control Number: 2012950441

ISBN: 978-0-7356-6381-7

Amazon.com: http://www.amazon.com/Windows-Inside-Out-Tony-Northrup/dp/0735663815/ref=sr_1_1?s=books&ie=UTF8&qid=1354458846&sr=1-1&keywords=9780735663817

Share this post: These icons link to social bookmarking sites where readers can share and discover new web pages.
  • Digg
  • del.icio.us
  • Reddit
  • co.mments
  • DZone
  • email
  • Google Bookmarks
  • LinkedIn
  • NewsVine
  • Print
  • Technorati
  • TwitThis
  • Facebook

If you liked this post, consider subscribing to the RSS feed or join us now at the IRC channels.

Pages that cross-reference this one

A Single Comment

  1. Tony Northrup said,

    December 14, 2012 at 4:28 pm

    Gravatar

    Hi. I’m the author of Windows 8 Inside Out.

    Regarding the book, you’re right that the coverage of Secure Boot is brief, and perhaps too brief. However, since the book is about Windows 8 and Windows 8 users shouldn’t ever need to configure Secure Boot, it seemed sufficient for my audience.

    Also note that there’s no single process for turning off Secure Boot, because it must be done within the UEFI firmware, and that can be different for every PC (or at least, every UEFI implementation). So, providing step-by-step instructions for that would have been impossible. The lack of a consistent user interface is actually one of the biggest drawbacks to Secure Boot; if users want to turn it off, they need to read the manual, and you know how that goes…

    There’s plenty of information out there about how it works, and in fact I’m in the process of writing a much longer whitepaper for IT audiences.

    People are concerned about Secure Boot because all PCs that get the Windows 8 logo certification MUST support Secure Boot and have it turned on by default. However, that same certification process also requires PCs to:
    * Allow the user to add their own keys, so they can trust any bootloader/OS they want.
    * Completely disable Secure Boot, so the PC operates will load anything (including a bootkit).

    Just wanted to clarify that the concern isn’t, “Users can’t run Linux!” it’s, “Users have to follow potentially confusing steps to change their Secure Boot settings if their favorite Linux distro doesn’t have a certified boot loader.”

    There is a certified shim that Linux distros can use, though I know none of them are especially happy about having to get a cert from Microsoft: http://mjg59.dreamwidth.org/20303.html

    My understanding is that these statements are now incorrect:

    “Windows 8 certification does not require that the user be able to disable UEFI secure boot” and “The PC user using x64 or x86 systems is not guaranteed the ability to install extra signing keys in order to securely boot the operating system of their choice.” The certification does require users to be able to disable Secure Boot, as well as trusting any bootloader they choose.

    However, this statement is true:

    “Disabling UEFI Secure Boot is NOT offered on ARM systems like Windows 8 RT (Tablets).”

    Of course, it’s also true of just about every mobile device (iPhones, iPads, Kindle Fires, most Android devices, etc). Personally, I wish they would just let people load their own software, but the security guy in me understands the risks and the support guy in me knows the headaches.

What Else is New


  1. IRC Proceedings: Monday, January 27, 2020

    IRC logs for Monday, January 27, 2020



  2. Links 27/1/2020: Linux 5.5 is Out, Work on Linux 5.6 Commences, New Solus and Award for Andrew Tridgell

    Links for the day



  3. EPO: Goodbye to the Rule of Law and Hey Hi, AI!

    The EPO’s embrace of buzzwords — no longer a unique EPO strategy (it has already spread elsewhere) — puts examiners in a very bad position and they’re grappling with nerve- and mind-racking dilemmas (risk of unemployment for truly upholding the EPC)



  4. IRC Proceedings: Sunday, January 26, 2020

    IRC logs for Sunday, January 26, 2020



  5. Links 26/1/2020: MuseScore 3.4 Released, New Kate Icon and Solus 4.1 Fortitude Available

    Links for the day



  6. MIT and Microsoft Have Done Nothing to Actually Tackle Pedophilia and Ephebophilia

    MIT never actually resolved the issue that caused Joi Ito, Richard Stallman and others to be ejected; Microsoft meanwhile continues to profit from life-changing abuse (while seeding puff pieces in friendly media, just to pretend otherwise)



  7. Opinion: If You Advocate Population Control and You Are Yourself Doubling in One Single Generation, Then You Might be Hypocritical

    People with 3-5 children (each) tell us that the world has an overpopulation problem; while the growth of the population certainly poses a risk, these people lack the moral authority to lecture us about that (unless they adopt a eugenicist worldview, wherein only particular people are permitted to reproduce)



  8. IRC Proceedings: Saturday, January 25, 2020

    IRC logs for Saturday, January 25, 2020



  9. Nothing Has Truly Changed Since Netscape and Antitrust

    The same old crimes persist, as well as the blatantly anticompetitive behaviour



  10. When the Monopolists and the Patent Litigation Industry Hijack the News They Control the Narrative

    Money buys perception and litigation firms have certainly 'bought' the media coverage, which fails to convey the issue at stake and instead paints a rational court decision as tragedy for "innovation" (by "innovation" they mean monopolies on nature and on life)



  11. Links 25/1/2020: OPNsense 20.1 RC1 and DXVK 1.5.2

    Links for the day



  12. The Linux Kernel is No Longer Free Software?

    Gardiner Bryant, the creator of The Linux Gamer as well as The Off Topical Podcast, reacts to our articles about DRM in Linux (he even pronounced my name correctly)



  13. Sometimes Proprietary Software is Proprietary (Secret) Simply Because It is Not Good and Obfuscation Helps Hide Just How Ugly It Is

    Why nonfree (or proprietary) software generally fails to catch up with Free/libre software — at least on technical grounds — and then makes up for it with marketing and FUD offensives (discrediting perfectly-functioning things, based on their perceived cost)



  14. IRC Proceedings: Friday, January 24, 2020

    IRC logs for Friday, January 24, 2020



  15. Links 24/1/2020: GNU/Linux in Russia and More New Openings

    Links for the day



  16. When EPO Press Coverage Boils Down to Lobbying, Press Releases, EPO Lies, and Bribery

    Any attempts to properly assess and explain what happens in Europe's patent landscape are being drowned out by EPO-bribed and law firms-connected media; to make matters worse, the EPO's bribes have expanded to academia, so even scholarly work in this domain is corrupted by money of special interest groups



  17. IRC Proceedings: Thursday, January 23, 2020

    IRC logs for Thursday, January 23, 2020



  18. Links 23/1/2020: Qubes OS 4.0.3, EasyOS 2.2.5, GhostBSD 20.01

    Links for the day



  19. Passion of the Microsoft

    A rough timeline of Microsoft’s interactions with Linux and the Linux Foundation since 2015



  20. The Patent Microcosm is Really Panicking as European Patents on Life and Other Spurious Junk (Invalid Patents) Are Successfully Rejected

    European Patents (EPs) may be revoked en masse if what we're seeing is the gradual emergence of 'European Mayo' (and maybe soon 'European Alice')



  21. Distractions From Microsoft's Gigantic Tax Evasion and Contribution to Denial of Climate Science

    Microsoft (connected to oil companies) wants us to think of it as a "green" company; not only does it contribute to climate denial but it also evades tax, which is a serious crime that costs tens of billions of dollars (the public pays this money instead)



  22. Confirmation: System1/Startpage Offered Pay to People Who Pushed for (Re)Listing in Privacy Directories

    The debate is now settled; those arguing in favour of listing Startpage as privacy-respecting are in fact secretly 'compensated' by Startpage (in other words, they're Startpage 'shills')



  23. Vandana Shiva: “Bill Gates is Continuing the Work of Monsanto”

    A recent interview on what Bill Gates is really up to in that sham ‘charity’ of his



  24. IRC Proceedings: Wednesday, January 22, 2020

    IRC logs for Wednesday, January 22, 2020



  25. Extending Linux With DRM, Azure and exFAT

    An insufficiently 'conservative' Linux ceases to be freedom-respecting



  26. Linux Foundation (LF) Now Dominated by Lots of Microsoft People and LF Chiefs Join Microsoft in Smearing GPL/Copyleft

    We continue to see additional evidence which serves towards reinforcing our view that the so-called 'Linux' Foundation is actually hostile towards many things that are associated with Linux (unlike those looking to exploit/hijack Linux for proprietary ends)



  27. Links 22/1/2020: Wayland 1.18 Alpha, ODF 1.3 Approved

    Links for the day



  28. IRC Proceedings: Tuesday, January 21, 2020

    IRC logs for Tuesday, January 21, 2020



  29. Poor Excuses for Granting Poor (and Often Illegal/Invalid) Patents

    A quick look at some of the latest examples of software patents advocacy (not by actual software professionals, obviously) and why it's deeply misguided (or guided solely by greedy law firms)



  30. A Simple Plan For a Universal Free Software Community

    "For software to be free as in freedom, we need more people to care personally about software freedom."


RSS 64x64RSS Feed: subscribe to the RSS feed for regular updates

Home iconSite Wiki: You can improve this site by helping the extension of the site's content

Home iconSite Home: Background about the site and some key features in the front page

Chat iconIRC Channel: Come and chat with us in real time

Recent Posts