• Welcome to Mugwump's Fish World.
 

News:

I increased the "User online time threshold" today (11/29/2023) so maybe you won't lose so many posts.   Everything is up-to-date and running smoothly. Shoot me a message if you have any comments - Dennis

Main Menu
Welcome to Mugwump's Fish World. Please login.

May 13, 2024, 01:47:31 AM

Login with username, password and session length

Stats
  • Total Posts: 127,341
  • Total Topics: 18,539
  • Online today: 547
  • Online ever: 915
  • (May 10, 2024, 12:47:31 PM)
Users Online
Users: 0
Guests: 529
Total: 529

MS secure boot compromised

Started by Mugwump, August 14, 2016, 11:17:57 AM

Previous topic - Next topic

Mugwump

Oops! Microsoft Accidentally Leaks Backdoor Keys to Bypass UEFI Secure Boot
Wednesday, August 10, 2016 Swati

Microsoft has accidentally leaked the Secret keys that allow hackers to unlock devices protected by UEFI (Unified Extensible Firmware Interface) Secure Boot feature.
What's even worse?
It will be impossible for Microsoft to undo its leak.


Secure Boot is a security feature that protects your device from certain types of malware, such as a rootkit, which can hijack your system bootloader, as well as, Secure Boot restricts you from running any non-Microsoft operating system on your device.
In other words, when Secure Boot is enabled, you will only be able to boot Microsoft approved (cryptographically signature checking) operating systems.
However, the Golden Keys disclosed by two security researchers, using alias MY123 and Slipstream, can be used to install non-Windows operating systems, say GNU/Linux or Android, on the devices protected by Secure Boot.
Moreover, according to the blog post published by researchers, it is impossible for Microsoft to fully revoke the leaked keys, potentially giving law enforcement (such as FBI and NSA) special backdoor that can be used to unlock Windows-powered devices in criminal cases.


The issue actually resides in the Secure Boot policy loading system, where a specially signed policy loads early and disables the operating system signature checks, the reg reports.
This specific Secure Boot policy was created and signed by Microsoft for developers, testers, and programmers for debugging purposes.
"During the development of Windows 10 v1607 'Redstone,' MS added a new type of secure boot policy. Namely, "supplemental" policies that are located in the EFIESP partition?" researcher said.
"...a backdoor, which MS put into secure boot because they decided to not let the user turn it off in certain devices, allows for secure boot to be disabled everywhere!"
Yesterday, Microsoft released August Patch Tuesday that includes a security patch for designing flaw in Secure Boot for the second time in two months, but unfortunately, the patch is not complete.
Jon

?Life should not be a journey to the grave with the intention of arriving safely in a pretty and well preserved body, but rather to skid in broadside in a cloud of smoke, thoroughly used up, totally worn out, and loudly proclaiming ?Wow! What a Ride!? ~ Hunter S. Thompson

BallAquatics

Quote from: Mugwump on August 14, 2016, 11:17:57 AM
Secure Boot restricts you from running any non-Microsoft operating system on your device.

That's it in a nutshell.....  secure boot my a$$

Dennis

Mugwump

Quote from: BallAquatics on August 14, 2016, 02:20:30 PM
Quote from: Mugwump on August 14, 2016, 11:17:57 AM
Secure Boot restricts you from running any non-Microsoft operating system on your device.

That's it in a nutshell.....  secure boot my a$$

Dennis

LOL........ w!w wfwf w!w
Jon

?Life should not be a journey to the grave with the intention of arriving safely in a pretty and well preserved body, but rather to skid in broadside in a cloud of smoke, thoroughly used up, totally worn out, and loudly proclaiming ?Wow! What a Ride!? ~ Hunter S. Thompson

wsantia1

So far all of my non- MS software is working on the #1 machine. The # number 2 machine is in the fish room so I'll check it out tomorrow.
Willie

Too Many Fish. Not Enough Tanks.