TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Secure Boot is broken on 200 models from 5 big device makers

177 pointsby verifex10 months ago

19 comments

snailmailman10 months ago
I’ve had so many issues with secure boot on my machines causing issues that if I ever saw a secure boot error message I would <i>never</i> think “oh I must have a rootkit”<p>Instead I would assume, in order<p>- my config broke it<p>- OS update broke it<p>- the bios doesn’t properly handle any case that isn’t “preinstalled OEM windows”<p>I had a laptop that as far as I could tell, could <i>only</i> boot into windows’ default bootmgr.efi. I could turn off secure boot, and tamper with that efi to boot Linux, but it <i>refused</i> to acknowledge other boot loaders from within the bios. It wouldn’t surprise me <i>in the slightest</i> if secure boot isn’t properly handled. I’ve had too many issues with cheap computers having janky bioses.
评论 #41080265 未加载
评论 #41098127 未加载
drhagen10 months ago
&gt; To this day, key players in security—among them Microsoft and the US National Security Agency—regard Secure Boot as an important, if not essential, foundation of trust in securing devices in some of the most critical environments, including in industrial control and enterprise networks.<p>Am I correct that Secure Boot purely exists to prevent this attack vector: malware gets root on the OS, hardware allows updating firmware via OS now owned by malware, but Secure Boot means you have to wipe only the hard drive instead of the firmware to eliminate the malware.<p>It seems like it would be a lot simpler and more reliable to add a button to motherboards that resets the firmware to the factory version (on memory that can&#x27;t be written by a malicious OS).
评论 #41072444 未加载
评论 #41072697 未加载
评论 #41073470 未加载
评论 #41072192 未加载
评论 #41072351 未加载
评论 #41072240 未加载
评论 #41077763 未加载
评论 #41097979 未加载
评论 #41072546 未加载
Terr_10 months ago
It sounds like the biggest contributory problems here are:<p>1. Allowing unattended&#x2F;automatic BIOS updates from a running OS at all<p>2. Being so paranoid about attacks by a spy with physical access to the computer that the keys cannot be replaced or revoked<p>I&#x27;m not a security researcher, but to just shoot the breeze a bit, imagine:<p>1. The OS can only <i>enqueue</i> data for a proposed BIOS update, actually applying it requires probable-human intervention. For example, reboot into the currently-trusted BIOS, and wait for the user to type some random text shown on the screen to confirm. That loop prevents auto-typing by a malicious USB stick pretending to be a keyboard, etc.<p>2. Allow physical access to change crypto keys etc, but instead focus on making it easy to <i>audit and detect</i> when it has happened. For example, if you are worried Russian agents will intercept a laptop being repaired and deep-rootkit it, press a motherboard button and record a values from a little LED display, values that are guaranteed to change if someone alters the key set and&#x2F;or puts on a new signed BIOS. If you&#x27;re worried, they&#x27;ll simply replace the chipwork itself, then you&#x27;d need a way to issue a challenge and see a signed verifiable response.
评论 #41072425 未加载
评论 #41073379 未加载
评论 #41073406 未加载
StillBored10 months ago
This big mistake though was back when all this was being enabled on PC&#x27;s, the linux vendors out of fear that the rest of the industry would lock them out, standardized on shim and the MS certificates in the firmware. Thus requiring MS to sign the first stage of every linux install&#x2F;boot rather than both doing that, as well as defaulting to an environment where the distros would boot in UEFI &#x27;setup mode&#x27; enroll their own cert&#x2F;key chains during the first provision&#x2F;boot, and then permanently switch to user mode. Had they done that, this entire article would have been just about meaningless as all those test keys would have been replaced the moment the machine was installed.<p>So today a decade+ later there still isn&#x27;t a standard way to automatically enroll a linux distribution&#x27;s keys during initial install in any of the distributions (AFAIK).
评论 #41074547 未加载
评论 #41098109 未加载
jauntywundrkind10 months ago
It feels utterly absurd that devices typically have certain keys are baked in, cannot be removed. I believe there are still Microsoft keys on nearly every device?<p>It&#x27;s unconscionable to tell users this is here to keep you safe, but that you have no control over it &amp; if something goes wrong well then too bad, at best we might provide an update.<p>(Also that governments can probably force these root-of-trust companies to sign payloads to circumvent security is also pretty icky to me.)
评论 #41073052 未加载
评论 #41073204 未加载
rurban10 months ago
Previously in 2023 Intel lost it&#x27;s private UEFI key on the MSI hack. <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35843566">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=35843566</a><p>This time it&#x27;s AMI. Cannot get bigger.
评论 #41073306 未加载
renegat0x010 months ago
UEFI comes with SB, Microsoft introduces TPM, Google introduces WEI. They will will say it is for your benefit, and in part it is correct, but security can be achieved through many measures, and corporations will choose such solutions that will grant them more ability to control your device.<p>This leads to accumulation of &quot;power&quot;, and monopolization of it in systems leads to vulnerability. One point of failure is enough to compromise entire ecosystem.<p>Just reminds me that apple checked every application you run, for &quot;safety reasons&quot; (rather checks app certificates, but that is nearly the same).
tedunangst10 months ago
&quot;It&#x27;s EOL so no fix&quot; is pretty shitty. It was defective for its entire unsupported life as well.
rebolek10 months ago
It&#x27;s a bit of surprise that most of the things work most of the time, given on how shaky basis are they build.
评论 #41072487 未加载
PennRobotics10 months ago
&gt; ... key players in security—among them Microsoft and the US National Security Agency ...<p>This phrase does not sit well with me.
评论 #41098011 未加载
评论 #41081558 未加载
评论 #41080090 未加载
jokoon10 months ago
Isn&#x27;t that a vulnerability that still requires physical access to hardware?<p>Or is that just a protection against rootkits?<p>I still fail to understand what secure boot is protecting against: if a machine is compromised remotely, does secure boot prevents installing a rootkit that&#x27;s invisible from virus scanners?
评论 #41072373 未加载
tithe10 months ago
Binarly&#x27;s research report here: <a href="https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20240726085758if_&#x2F;https:&#x2F;&#x2F;22222483.fs1.hubspotusercontent-na1.net&#x2F;hubfs&#x2F;22222483&#x2F;Reports&#x2F;PKfail%20-%20Binarly%20Research%20Report%20July%2025%202024.pdf" rel="nofollow">https:&#x2F;&#x2F;web.archive.org&#x2F;web&#x2F;20240726085758if_&#x2F;https:&#x2F;&#x2F;222224...</a>
nightowl_games10 months ago
Seems apparent we need a Professional Engineering Certification process and our own disciplinary board similar to other engineering disciplines.<p>High time.
评论 #41072674 未加载
评论 #41098358 未加载
jandrese10 months ago
I know never to trust software written by hardware folks, but seriously, how do you ship a key where the CN is literally &quot;DO NOT TRUST -- AMI Test PK&quot; as the root security. That is outright malicious incompetence.
评论 #41072364 未加载
_trampeltier10 months ago
A bit oftopic but when last week came out, Cellebrite could open the Trump shooters phone, there was a PDF, they can brute force all android phones since from Android 7 or newer. What changed there? Why can they brute force all newer versions?<p><a href="https:&#x2F;&#x2F;www.documentcloud.org&#x2F;documents&#x2F;24833831-cellebrite-android-document-april-2024" rel="nofollow">https:&#x2F;&#x2F;www.documentcloud.org&#x2F;documents&#x2F;24833831-cellebrite-...</a>
评论 #41072978 未加载
EVa5I7bHFq9mnYK10 months ago
How do I check if my laptop is affected? Tried<p>[System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFIPK).bytes) -match &quot;DO NOT TRUST|DO NOT SHIP&quot;<p>, gives me cryptic errors and gpt of no help.
评论 #41098006 未加载
dathinab10 months ago
I just wanted to check if I&#x27;m affected.<p>...<p>then remembered I&#x27;m using custom platform keys<p>tbh. I don&#x27;t understand why secure boot is build around global root of trusts instead of ad-hoc per device trust (i.e. like custom platform keys but with better support), at most supported by some global PKI to make bootstraping on initial setup easier<p>this would not eliminate but massively reduce how much &quot;private key&quot; got leaked vulnerabilities can affect secure boot chains (also move most complexity from efi into a user changeable chain loaders, including e.g. net boot, etc.)<p>PS:<p>To be clear &quot; I don&#x27;t understand why&quot; is rhetorical, I do understand why and find it a terrible bad idea.
manofmanysmiles10 months ago
Unless I&#x27;m missing something, Secure Boot as designed is fundamentally broken.<p>Its root of trust is the BIOS&#x2F;Firmware, which can be updated from a running OS. There is no hardware root of trust.<p>How Secure Boot Works<p>Secure Boot ensures that a device boots using only software trusted by the Original Equipment Manufacturer (OEM). Here&#x27;s a high-level overview:<p>1. <i>Power On and Initialization</i>: The CPU initializes and runs the BIOS&#x2F;UEFI firmware, which prepares the system for booting.<p>2. <i>Platform Key (PK) Verification</i>: The firmware verifies the Platform Key (PK), which is used to validate Key Exchange Keys (KEKs).<p>3. <i>Key Exchange Keys (KEK) Verification</i>: The KEKs validate the allowed (whitelist) and disallowed (blacklist) signature databases.<p>4. <i>Signature Database Verification</i>: The firmware checks the allowed (db) and disallowed (dbx) signature databases for trusted software signatures.<p>5. <i>Bootloader Verification</i>: The firmware verifies the bootloader’s signature against the db. If trusted, the process continues.<p>6. <i>Kernel and Driver Verification</i>: The bootloader verifies the OS kernel and critical drivers’ signatures.<p>7. <i>Operating System Boot</i>: Once all components are verified, the OS loads.<p><i>Apple Secure Boot Process</i><p>Apple adds hardware-based security with the Secure Enclave:<p>1. <i>Secure Enclave Initialization</i>: Separate initialization handles cryptographic operations securely.<p>2. <i>Root of Trust Establishment</i>: Starts with Apple&#x27;s immutable hardware Root CA.<p>3. <i>Immutable Boot ROM Verification</i>: The boot ROM verifies the Low-Level Bootloader (LLB).<p>4. <i>LLB Verification</i>: The LLB verifies iBoot, Apple&#x27;s bootloader.<p>5. <i>iBoot Verification</i>: iBoot verifies the kernel and its extensions. The Secure Enclave ensures cryptographic operations remain protected even if the main processor is compromised.<p>For more details, check out:<p>- &lt;<a href="https:&#x2F;&#x2F;uefi.org&#x2F;sites&#x2F;default&#x2F;files&#x2F;resources&#x2F;UEFI_Spec_2_8_final.pdf" rel="nofollow">https:&#x2F;&#x2F;uefi.org&#x2F;sites&#x2F;default&#x2F;files&#x2F;resources&#x2F;UEFI_Spec_2_8...</a>&gt;<p>- &lt;<a href="https:&#x2F;&#x2F;www.apple.com&#x2F;business&#x2F;docs&#x2F;site&#x2F;Security_Overview.pdf" rel="nofollow">https:&#x2F;&#x2F;www.apple.com&#x2F;business&#x2F;docs&#x2F;site&#x2F;Security_Overview.p...</a>&gt;<p>I would really love to have a hardware root of trust on a Linux or other open system, with a hardware security module of sorts that is programmable, so I decide what the root keys are, and is able to measure the firmware boot process, establishing a proper audit trail or chain of trust.<p>I can&#x27;t remember the HN formatting rules, so expect an edit shortly to make this look better.<p>Edit: I did a little more poking. It&#x27;s not quite as bad as I thought, because at least in theory, the BIOS will verify a digital signature of a BIOS update before flashing it.
评论 #41073141 未加载
评论 #41073383 未加载
jmclnx10 months ago
&gt;In 2012, an industry-wide coalition of hardware and software makers adopted Secure Boot to protect against a long-looming security threat<p>This joke never gets stale, wait it is not a joke ?<p>I still believe the only reason for this to exist is to eventually turn general computing devices into a locked down Cell Phone Spying Device.
评论 #41072315 未加载
评论 #41074532 未加载
评论 #41072511 未加载
评论 #41072533 未加载