ATTENTION: You are viewing a page formatted for mobile devices; to view the full web page, click HERE.

Main Area and Open Discussion > Living Room

FSF Spells out its concerns and recommendations regarding UEFI

(1/2) > >>

40hz:
In the wake of Redhat/Fedora and Canonical/Ubuntu's recent attempt at reaching what some have politely called an "accommodation" with Microsoft's restricted boot initiative, the FSF has released a combination position paper/opinion piece on exactly what their issues are with what has been decided so far.

Especially interesting is the excerpt below where they address Canonical's decision to abandon the GRUB bootloader due to a misinterpretation of how GPL impacts (or more correctly - doesn't impact) Canonical's right keep their 'private key' private.

One telling point made is how Canonical made this interpretation and decision without seeking any input or guidance from the FSF. Which might be considered strange, unless you have noticed how Canonical seems bent on creating its own "separate peace" and distancing itself from the larger Linux community. Canonical has recently (in a grand display of poor manners) begun referring to itself as "the Ubuntu Operating System" with zero mention of it's underlying GNU/Linux base. Pretty ballsy and jive on Mark Shuttleworth's part IMHO. But that's Mr. Shuttleworth for you. That faux-humble laid-back arrogance has been his trademark from day one.

Anyway, here's what FSF had to say about that (emphasis added):

As with Fedora, on a system with Secure Boot properly implemented, Ubuntu users will be able to add their own keys, or Ubuntu's key.

Our main concern with the Ubuntu plan is that because they are afraid of falling out of compliance with GPLv3, they plan to drop GRUB 2 on Secure Boot systems, in favor of another bootloader with a different license that lacks GPLv3's protections for user freedom. Their stated concern is that someone might ship an Ubuntu Certified machine with Restricted Boot (where the user cannot disable it). In order to comply with GPLv3, Ubuntu thinks it would then have to divulge its private key so that users could sign and install modified software on the restricted system.

This fear is unfounded and based on a misunderstanding of GPLv3. We have not been able to come up with any scenario where Ubuntu would be forced to divulge a private signing key because a third-party computer manufacturer or distributor shipped Ubuntu on a Restricted Boot machine. In such situations, the computer distributor -- not Canonical or Ubuntu -- would be the one responsible for providing the information necessary for users to run modified versions of the software.

Furthermore, addressing the threat of Restricted Boot by weakening the license of the bootloader is backwards. With a weaker license, companies will now have a form of advance permission to obstruct the user's ability to run modified software. Rather than work to make sure this situation does not happen -- for example by enforcing the proper Secure Boot implementation they say they "strongly support in [their] own firmware guidelines" -- Ubuntu has chosen a path which explicitly allows Restricted Boot.

No representative from Canonical contacted the FSF about these issues prior to announcing the policy. This is unfortunate because the FSF, in addition to being the primary interpreter of the license in question, is the copyright holder of GRUB 2, the main piece of GPLv3-covered software at issue.

It is not too late to change. We urge Ubuntu and Canonical to reverse this decision, and we offer our help in working through any licensing concerns. We also hope that Ubuntu, like Fedora, will actively support users generating and using their own signing keys to run and share any versions of the software, and not require users to install a key from Canonical to get the full benefit of their operating system.
--- End quote ---

Take a moment to read the paper. Available online here or for PDF download here. It goes a long way towards dispelling some of the misinformed words and reporting thats swirling around this issue.

The better informed we all are, and the better we understand all sides of the argument, the less chance something will get slipped past us.

 8)



ewemoa:
Thanks for sharing this  :Thmbsup:

zridling:


I simply hate the idea of a hardware vendor assuming control of my machine beyond the point of sale. Although I've built my own rigs since '92 and doesn't affect me as much, the consumer shouldn't be punished with restrictions by the fact that Microsoft can't keep its software reasonably safe from malware and viruses. Still, if I ever did buy an off-the-shelf system, I not only have to pay Microsoft for their unwanted software, but they've made sure "it's too much trouble" to bother working around this crude attempt at boot security.

ewemoa:
Here's a relevant-seeming quote from the document 40hz posted a link to:

Distributors of restricted systems usually appeal to security concerns. They claim that if unapproved software can be used on the machines they sell, malware will run amok. By only allowing software they approve to run, they can protect us.

This claim ignores the fact that we need protection from them. We don't want a machine that only runs software approved by them -- our computers should always run only software approved by us. We may choose to trust someone else to help us make those approval decisions, but we should never be locked into that relationship by force of technological restriction or law. Software that enforces such restrictions is malware. Companies like Microsoft that push these restrictions also have a terrible track record when it comes to security, which makes their platitudes about restricting us for our own good both hollow and deceitful.

--- End quote ---

40hz:
One more reason I have such high hopes for things like non-sellout Linux distros and the Rasberry Pi.



                   Have Pi - Will Travel

Navigation

[0] Message Index

[#] Next page

Go to full version