bzt wrote:Ethin wrote:something is categorized under "secure boot" (or any other general categorization) does not make it actually about that subject; secure boot is just used as more of a tag.
In theory could be, but how do you explain Microsoft's statement
Microsoft wrote:A security feature bypass vulnerability exists in secure boot.
then? It is quite straightforward.
As has been explained to you previously, this is a flaw in the boot loader of windows, not the firmware.
bzt wrote:Ethin wrote:It does not actually mean that the vulnerability is a problem in the firmware.
No, the vulnerability problem in the firmware is that it allows loading drivers and run-time services from disk in the first place not just from Option ROMs that rootkits cannot modify easily. Plus it is a nonsense that a machine owner has no control over which keys can be or cannot be used to verify those code... These are design flaws, which cannot be fixed by patching the loader or Windows and filling up the DBX, no matter how hard MS tries.
Oh, this argument cracked me up. Your complaining now because UEFI allows you to load binaries on disk... Oh, wait, the BIOS let you do that too! And the firmware of every other computer lets you load code from various sources that aren't internal ROMs too! Wow! What a huge security flaw! (Oh, wait... UEFI secure boot requires them to be signed, and any unsigned binary won't load, and any hash in the DBX also won't be loaded. So at least that's something.)
bzt wrote:Ethin wrote:By your logic, we shouldn't have TLS certificates because we can't prove that the implementations handling those certificates are bug-free, and therefore TLS doesn't work.
No, the correct analogy would be: TLS worth nothing if you can't control who's certificate is accepted. And the attack vector: if an attacker can freely and silently install trusted CAs without you knowing, then indeed, you should not trust TLS.
I'm sorry, but no. This is not the "correct" argument at all. Please go re-read my post.
bzt wrote:Look, I've warned you. I only promised that I'll try to explain, there's no guarantee that you'll understand. It's not your fault, security is misguided and miseducated in general (so that CIA, FBI, NSA and all the other three-letters
can use backdoors. The
reasons are obvious, but the principle is flawed in the first place, because anybody can use those backdoors, even the bad guys. It's like you keep your house's front door wide open with a note on it "Only policemen can enter". Do you seriously think that that note would stop a burglar? You can't blame me trying to close my door.)
Cheers,
bzt
So, in other words, your saying that your the god of computer security and that we should listen to you, but not to other security experts who tell us the opposite. "I only promised that I'll try to explain, there's no guarantee that you'll understand." This has to be one of the most arrogant statements I've read on this thread. You haven't explained a thing. If you had, people like myself wouldn't be showing you just how incorrect you are. As someone who has studied cryptography and UEFI extensively, I think I'm more qualified to discuss UEFI-based topics than you are. I have no security certifications but I'm not so bold as to act like I know everything about computer security and that everyone else is wrong. I have explained why your wrong in great detail. I have logically deconstructed each argument you try to use -- which really wasn't hard since none of your arguments make much sense and are only your sick way of distorting the truth of UEFI and what it's trying to do because you (somehow) magically think you can do better. The author of this topic created it to ask questions about UEFI and you converted it into this stomping ground so you could throw stones at UEFI because you've got some twisted nonsensical vendetta against it for some reason I'm pretty sure only you know. Instead of presenting the facts as-is, you deliberately and knowingly misinterpreted them and twisted them to fit your own narrative, and then, to further try to cement your argument, you included completely unrelated issues to try and make your point for you. Then, when people called you out on it, and requested proof, you deflected and complained about how we supposedly were failing to understand your point. Then, to add insult to injury, you insulted our intelligence, pointing us to articles you knew were demeaning and treating us like idiots. When I called you out on that, you then went on to act as though you were oh-so superior to the rest of us. To be honest, I'm amazed that no one has banned you for this kind of attitude yet, since I'd think that this kind of treatment from you, to anyone, is against the rules on here. This has turned from a discussion about the uses of UEFI and its runtime services to a place for you to scream your tripe to the rest of the world, as you seem to do with any other topic when UEFI is brought up.
Anyway, bzt, I'm tired of fighting with you. Take your twisted UEFI war elsewhere, please. Its not welcome nor wanted here.
@OP: I apologize that your topic was transformed into this. It seems like bzt just cannot resist going on an immature and childish rampage whenever UEFI and secure boot are mentioned in a topic, nor can they resist spreading FUD all over the place.