/srv/irclogs.ubuntu.com/2012/06/22/#ubuntu-us-or.txt

blkperlbkerensa: well ill go talk to Prof Massey about it00:06
bkerensablkperl: hooray00:07
bkerensaLD00:07
bkerensa!backtrack00:25
lubotu1There are some Ubuntu derivatives that we cannot provide support for due to repository and software changes. Please consult their websites for more information. Examples: gNewSense (support in #gnewsense), Linux Mint (see !mint), LinuxMCE (support in #linuxmce), CrunchBang (support in #crunchbang), BackTrack (support in #backtrack-linux), Ultimate Edition00:25
bkerensaslangasek: do you know why the kernel does not need to be signed in the case of UEFI? someone asked in a comment17:27
slangasekbkerensa: in a comment on what?17:32
bkerensaslangasek: my blog17:34
slangasekoh, you reblogged this?17:34
bkerensaslangasek: http://benjaminkerensa.com/2012/06/20/uefi-secureboot-situation#comment-56294647217:35
orebuntubkerensa's tiny URL is http://tinyurl.com/85v5fka17:35
slangasekoh, rather you blogged before the announcement went out ;)17:35
bkerensaslangasek: yes17:35
bkerensaand the always fun jef had a question17:35
slangasekso the answer is that the kernel doesn't have to be signed because that's not what the UEFI SecureBoot spec requires17:36
bkerensayeah huh I figured as much17:38
slangasekSecure Boot says you have to verify signatures on all code up until you call ExitBootServices.  But the bootloader calls ExitBootServices after reading the kernel into memory and before jumping to it17:40
slangasekthere are additional benefits if you *do* have a path for verifying the integrity of the kernel, but it doesn't make sense to do that by default in Ubuntu17:41
bkerensaslangasek: The counter response - "Canonical's proposal is the only proposal I've seen that suggest that signature verification up into the hardware driver layer is not required to meet the goals of the secureboot feature. Canonical's approach creates a signed bootloader which can be used to maliciously attack a dual boot Windows system. I fully expect that Microsoft will lean on OEMs to blacklist Canonical's signed boot loader signature19:37
bkerensabecause of this particular failing...out of the gate. "19:37
bkerensa=/19:38
slangasek<shrug>19:38
slangasekwe're not going to base our Secure Boot strategy on what $random_person_on_Internet expects :)19:44
bkerensaslangasek: but Steve... Its Jef Spaleta :P20:01

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!