/srv/irclogs.ubuntu.com/2012/09/30/#ubuntu-desktop.txt

skylinehi i am new to linux. I am very much interested about it. where should i start00:31
skyline?00:31
=== Ursinha-afk is now known as Ursinha
=== m_conley_away is now known as m_conley
bizhanMonaHi I am trying to understand for ubuntu 12.04 secure boot, what is the relationship between the grub , Intel UEFI and ubuntu framework to support secure boot? Thx14:41
desrtbizhanMona: my understanding is (roughly) that the stage1 bootloader will be signed with the microsoft key14:46
desrtit will verify that the second stage (grub) is signed by a canonical key which will be kept in the launchpad infra14:46
desrtand there will be no kernel signing14:46
ogra_http://blog.canonical.com/2012/06/22/an-update-on-ubuntu-and-secure-boot/14:47
ogra_also see the url from the first comment14:47
desrtie: you will have to use canonical's grub (which they can rebuild as they see fit) but you will be able to use your own kernels without signature14:47
bizhanMonaThanks so much for the info: I will dive into those urls will be back with more questions :)14:48
desrtuhm14:48
desrtdon't read the email linked from that first comment14:49
desrtit's no longer the latest story14:49
desrtit was suspected that the GPLv3 may cause canonical to be forced to give up their signing keys but after a clarification from the FSF this is no longer understood to be the case14:49
desrtso grub _will_ be used (contrary to that email)14:49
desrthere is an updated post clarifying that situation: http://blog.canonical.com/2012/09/20/quetzal-is-taking-flight-update-on-ubuntu-secure-boot-plans/14:50
ogra_oh, crap that was the totally wrong url14:50
ogra_yeah, rather read what desrt posted14:51
* ogra_ shouldn't do drive by support on sundays :)14:52
bizhanMonadesrt: you mentioned the grub should be signed by canonical. So the OEM vendors can not use their own key?14:53
desrtthe trampoline loader (signed once by microsoft) will contain canonical's key14:53
desrtso it can only load a grub that has been signed by canonical14:54
desrtimho our approach leaves a lot to be desired14:55
desrtthe fact that grub will happily hand-off to any kernel is a bit troubling from a security standpoint14:55
desrtit seems like we're pretending that we've added security just for the sake of convincing microsoft to sign our trampoline code14:55
desrtmind you...14:56
desrtif they buy it, i'm totally happy14:56
desrtbecause it gives the greatest amount of freedom14:56
bizhanMonadesrt: So what is missing in chain of trust is authentication of the kernel by grub at this time?14:57
desrtya...14:57
desrtparticularly considering grub hands-off to the kernel without so much as a flash on the screen these days14:57
desrtif i was interested in attacking windows systems i'd grab a copy of canonical's trampoline, a signed copy of our grub and have it autostart my bootkit14:58
desrti suspect this will happen14:58
desrtand it will be interesting to see microsoft's response14:58
bizhanMonadesrt: we were looking for FIPS-142/3 certification secure boot is big part of that, from what you explained this will not happen, Is there any plan how to handle the grub kernel authentication, does anyone working on that?15:00
desrtred hat15:01
desrtthey've taken the approach of signing the world15:01
desrtbootloader, kernel, all15:01
desrtand installing their own key in the bios of the machine15:01
bizhanMonaDo you have any references to that please?15:02
desrtoh.  i tell a lie15:03
desrtthey decided not to use that approach15:03
desrthere's the most up to date summary: http://mjg59.dreamwidth.org/12368.html15:03
desrtbasically the same as the canonical approach15:04
desrtbut they will also modify grub to only load trusted kernels15:04
desrtwhich makes it actually secure...15:04
desrtan interesing illustration of my point, though:15:06
desrtif i'm on a fedora system15:06
desrtand i want to install a custom kernel...15:06
desrt(without disabling secureboot)15:06
desrtthe obvious choice is for me to install ubuntu's grub on my fedora system15:07
desrtbecause it'll load anything i want15:07
desrtso red hat is no more secure than ubuntu, as long as ubuntu's bootloader exists and is signed by microsoft15:07
desrtwhich is exactly why i suspect that microsoft may revoke it at some point....15:07
desrtbecause the same logic applies equally well to the security of windows machines....15:08
mdeslaureven if you sign the kernel and kernel modules, you're only secure for a couple of weeks until the next kernel security issue15:08
desrtya well15:08
desrtwhat can you do about that?15:08
desrtbugs happen, of course15:09
mdeslaurwhich means microsoft would have to revoke fedora's key every kernel security update15:09
desrtbut why bother exploiting small and quickly-closed kernel privilege escallation issues when you can just exploit the giant gaping hole in the front door15:09
desrtmdeslaur: i think that would be a bit different....15:09
desrtwill they also revoke their own keys every windows update?15:10
mdeslaurwhy bother investing time and money in getting everything signed, when the first security issue a couple of weeks later results in your key being revoked anyway?15:10
desrtright.  it's an interesting point.15:10
desrtit's a spectrum15:10
desrton one end you have **anything** that lets you gain control over the hardware15:11
desrtand on the other end you have ultra-simple 512-byte-trampoline-rootkit-injector type things15:11
mdeslaurif a fedora kernel with a known security issue can be used as a signed bootloader to circumvent windows secure boot, then microsoft has two choices: 1- they ignore it, 2- they revoke the signing key15:11
* desrt thinks that grub is closer to the trampoline than the full OS15:11
desrtmdeslaur: yes.  absolutely.15:12
desrtbut how long does it take to get the kernel to the point where you can kexec() untrusted code?15:12
desrtand how much crap flashes on the screen meanwhile?15:12
mdeslaurdesrt: that's trivial, and that's not important15:12
desrtyou forgot option 315:12
kklimondamdeslaur: wouldn't kernel be signed with a "grub signing key", and when security update is issued Fedora would just have to revoke the certificate for the previous kernel? why does MS have to do that?15:13
desrtmicrosoft asks fedora to blackball their own kernels15:13
desrthow do you expect microsoft will handle their own kernel security flaws?15:13
mdeslaurkklimonda: because malware authors will just use the grub that contains the key that boots the insecure kernel15:13
mdeslaurdesrt: fedora can't blackball their own kernels, it's technically not possible15:13
desrtmdeslaur: it's just as possible as any revocation system15:14
desrtthere are shortcomings, of course15:14
kklimondamdeslaur: why isn't it possible?15:14
desrtbut if microsoft can blackball the fedora bootloader then redhat can blackball individual kernels15:14
mdeslaurdesrt: no, it's not. malware authors will just use the previous version of grub that contains the key that boots the insecure kernel15:14
kklimondaah15:14
mdeslauronce it's out there, the only way to prevent it from being used is to have the firmware itself blacklist the signing key15:15
desrtmdeslaur: the revocation list is stored in the system's firmware...15:15
mdeslaurdesrt: the revocation list for the grub signing key, not the revocation list for the kernel signing key15:15
mdeslaurdesrt: in rh,s design, the kernel signing key is stored in grub itself15:15
desrtmdeslaur: so revoke your grub and push a new one out with the kernel15:16
mdeslaurdesrt: yes, which means microsoft will have to revoke grub's signing key once a month when a new kernel vulnerability comes out15:16
desrtmdeslaur: and i suspect they will do the same thing to themselves?15:16
desrtmdeslaur: one thing i can tell you with absolute certainty:15:16
mdeslaurdesrt: of course not, it's all smoke and mirrors15:16
desrtif microsoft plans to revoke redhat keys when kernel exploits are discovered then canonical's key will be revoked on day 115:17
mdeslaurdesrt: definitely15:17
desrtyet somehow we are pushing forward with this plan15:17
desrtafter discussion with microsoft, no less15:17
mdeslaurdesrt: so back to my initial statement: why bother with it all if all you're doing is gaining a two week advantage?15:18
desrtmdeslaur: WE GOTTA DO SOMETHING!!!15:18
desrtgood enough reason? :)15:18
mdeslaurdesrt: fedora and ubuntu are both relying on the fact that microsoft won't revoke the keys15:18
mdeslaurdesrt: so cross your fingers :P15:18
desrtmdeslaur: revocations in the evil-security world are actually quite rare...15:18
mdeslaurbut, if they don't revoke, then secure boot is worthless at protecting windows machines against malware15:19
* desrt has never heard of the trigger actually being pulled on a dvd/bluray/hdcp revocation 15:19
desrtso here's an interesting question: how is the revocation list managed?15:19
mdeslaurso it's either 1- secure boot is defeated all over using a modified fedora/ubuntu grub/kernel, or 2- microsoft revokes the initial fedora/ubuntu keys and then stops signing new versions15:19
desrtOS contacts microsoft's servers and uploads the new list into the firmware?15:20
mdeslaurdesrt: microsoft has control of the revocation list15:20
mdeslaurdesrt: yes15:20
desrtwe could just conveniently fail to do this....15:20
desrtproblem solved!15:20
mdeslaurdesrt: sure, that works for two weeks, until updated hardware starts shipping15:20
desrtsure15:20
desrtthen you have to sign again :)15:20
mdeslaurdesrt: you assume microsoft is going to actually sign fedora/ubuntu stuff a second time :)15:21
* kklimonda finds it funny that an arbitrary company should have this kind.. oh, who am I kidding15:21
mdeslaurkklimonda: yeah, right? :)15:22
desrtanyway15:22
desrtit's obviously insecure, in the end15:22
mdeslauryep15:22
desrtbut it's clear that they're trying to raise the bar, at least15:23
desrtby what amount, who knows?15:23
mdeslaurthey're trying to prevent the windows activation cracks that insert themselves at the boot loader level15:23
* desrt suspects raising it high enough to securely load an unprompted-arbitrary-code-execution-platform (aka GRUB) may not be high enough15:23
kklimondamdeslaur: nice, haven't thought of this one before but it's a good point15:24
mdeslaurkklimonda: that's the sole reason for secure boot's existence15:24
kklimondaalthough I'm pretty sure current windows 7 cracks don't have to do that15:24
mdeslaurkklimonda: yes, that's exactly what they do15:24
desrtmdeslaur: too much tinfoil hat going around15:24
desrtmicrosoft has some real legitimate reasons for cleaning this problem up15:25
mdeslaurkklimonda: they insert themselves at the bootloader level, and emulate the bios calls to get the OEM indentification info out of the firmware15:25
mdeslaurattention lurkers: I have no inside knowledge of any of this stuff, and is all pulled out of my ass. kthx.15:26
kklimondamdeslaur: ah, I know that's how it used to work but have always assumed that the newer cracks just replace some libraries in Windows itself..15:27
mdeslaurkklimonda: ah, maybe. I'm not exactly an expert on what the latest stuff does.15:28
kklimondanah, you may as well be right - I haven't had to read about it in years as I still have a valid key15:29
kklimondait's just that hacking bootloader have always struck me as a very... volatile solution15:30
=== m_conley is now known as m_conley_away
=== jbicha is now known as Guest28143
=== Guest28143 is now known as jbicha_
bizhanMonah16:49
jbicha_oh lovely, changing the theme to HighContrast or Adwaita makes the messaging menu and sync menu disappear :(17:33
jbicha_and it makes the session menu ugly17:34
jbicha_why can't they use the hicolor fallback icons like they're supposed to?17:35
=== jbicha__ is now known as jbicha
jbicharobert_ancell: hey could you sync libcroco for bug 1053169?22:46
ubot2Launchpad bug 1053169 in libcroco "New upstream version 0.6.6" [Undecided,Fix committed] https://launchpad.net/bugs/105316922:46
robert_ancelljbicha, ok22:46
=== Amaranthus is now known as Amaranth
robert_ancelljbicha, synces23:03
robert_ancelljbicha, synced23:03
mlankhorstjust curious, does anyone here ever leave apport enabled? I would but every time i leave it on it pops up that something has gone wrong right after first use23:22

Generated by irclog2html.py 2.7 by Marius Gedminas - find it at mg.pov.lt!