frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

Open in hackernews

Linux and Secure Boot certificate expiration

https://lwn.net/SubscriberLink/1029767/08f1d17c020e8292/
78•pabs3•6h ago

Comments

crinkly•3h ago
So is it a possibility that a grub update breaks an existing bootable node? That worries me as I have a couple of Linux desktops in the field which I can’t remember if secure boot is enabled on.
jeroenhd•15m ago
If users don't update their keyrings or firmware (through fwupdmgr for instance), Grub will probably stop booting with secure boot on when the certificate expires.

If users update Grub once the old certificate is no longer used to sign the bootloader without updating their keyrings or firmware, Grub will probably stop booting with secure boot on when the certificate expires.

If users do update their systems and software, Grub will keep working.

Not updating is not a solution, unless the motherboard manufacturer really fucked up and doesn't validate the expiration date.

Luckily, fwupdmgr is integrated in the GUI updater tool on just about any Linux distro I know. As long as users don't ignore the "there are system updates available" popup and as long as the desktop vendor put out bare basic software support, things will probably go down fine.

greatgib•3h ago
It's totally crazy that we have to go through Microsoft to sign things to be able to have our OS run on third parties computers, and that Microsoft manage to win about this so easily as it was never seriously challenged.
whatagreatboy•2h ago
Only legal requirements can change it. Nowadays, the mokutil is good enough that linux users can build a good tool around it to automate registration at boot that should ease some pain. But otherwise, it is a big mess and still needs legal requirement.
nine_k•2h ago
Basically every x64 computer is intended to be able to run Windows. Hence MS had to be involved, and I suppose nobody else with serious money wanted the burden.

AFAICT you can still disable Secure Boot in most UEFI firmware, and boot anything you like (or not like, if an attacker tampers with your system).

oakwhiz•2h ago
We don't even reap the benefits of autocratic decisions from Microsoft in this area. Boards always come out with things like messed up ACPI, etc.
p_l•1h ago
Boards' ACPI etc. is still better than what it would be without "certified for Windows" (whatever name of the hour is) programs
blkhawk•1h ago
Secure boot belongs to a class of security that while clearly giving a theoretical benefit in practice it falls far short of providing any benefit whatsoever at least to the user of a system. Its introduction was mostly part of a wider (probably partially defunct and failed regarding mobile x86) strategy to lock down the PC so the Microsoft store and purchased apps through it would be more secure from the end-user. Secondary was in my opinion better security for handheld phones and tablets running x86 but there the "App store" aspect is even more clear.

"attacker tampers with your system" does not happen at least in the way you think it does or it does not protect you against meaningful attack at all.

pdimitar•42m ago
What kinds of attacks was Secure Boot designed to mitigate? Is it the evil maid attack? Or an accidentally ran with `sudo` program can indeed screw your entire boot process and inject rootkits etc.? Or is it something else?
jeroenhd•27m ago
Evil maid and rootkits, mostly. It's also part of the trust chain that unlocks an encrypted disk without having to enter a password.

On Windows, secure boot has worked pretty well when it comes to rootkits. MBR rootkits were trivial to write, but UEFI rootkits require UEFI firmware changes or exploiting the bootloader process itself, both of which are much more complex. If malware uses the Linux shim, the TPM will notice and refuse to provide the Bitlocker key, so your computer won't boot without going to the IT office and asking for the recovery key (which should prompt more investigation).

sugarpimpdorsey•2h ago
It makes more sense if you view it for what it is: Honest Satya's Certificate Authority.

Microsoft showed they can semi-competently run a PKI. The end.

Now had the Linux folks stepped up to the plate early on, instead of childishly acting like Secure Boot was the computing antichrist, the story might be different. But they didn't. We only have shim because some people at Red Hat had the common sense to play ball.

flomo•1h ago
Maybe this isn't a great take, but RedHat/LKF/etc could obviously run a 'semi-competent' PKI, and probably should be. But doing so would allow PC vendors to cleanly segment machines between Windows and Linux (+$$), so perhaps it made the best sense to lay-low and use MS infrastructure for this.
littlestymaar•1h ago
> Now had the Linux folks stepped up to the plate early on, instead of childishly acting

This kind of victim blaming gets annoying very quick, as if the Linux ecosystem had any leverage at all on PC manufacturers…

robin_reala•1h ago
Reference: https://bugzilla.mozilla.org/show_bug.cgi?id=647959
ACCount36•1h ago
Secure Boot is the computing antichrist, and Linux folk were 100% right to rally against it. As well as a whole bunch of other "Trusted Computing" garbage.
froh•44m ago
mind to elaborate?

I'd love to know if my machine has been compromised with early boot stage "meta-hypervisor" or not.

the promise of secure boot and trusted computing is backdoor-free boot.

what is in your eyes evil and garbage about that?

ACCount36•37m ago
Who controls the fucking certs?

"My computer was compromised with an early boot stage hypervisor backdoor" happens basically never. It's an attack vector that exists almost entirely in the minds of infosec fucktards.

"My brand new device ships with vendor-selected boot certificates that can't be changed, can't be overridden, and control what software I can install onto my own device" happens with every other smartphone, gaming console, car, and even some PCs.

"Trusted Computing" is, and always was, about making sure that the user doesn't actually own his device. This is the real, tangible attack vector - and the target of this attack is user freedom and choice.

flexagoon•8m ago
> Who controls the fucking certs?

Cert authorities, just like in case of SSL. Is SSL also an evil technology designed to take away freedom from the internet?

> vendor-selected boot certificates that can't be changed

That's a lie. Certain drivers are signed with a specific key, and they can only be used when this key is installed, which makes sense. The same thing happens with SSL - if you remove pre-installed CA certs from your device, HTTPS sites will stop working. However, nothing is stopping you from adding your own keys to the system and signing your own software with it.

> happens with every other smartphone, gaming console, car, and even some PCs

How often are you trying to install custom drivers on a smartphone, console or car? Why would you have secure boot issues on those?

> the target of this attack is user freedom and choice.

Which is exactly why users have the freedom and choice to just disable Secure Boot?

fsflover•37m ago
Consider using Heads with TPM and Librem Key to detect possible compromise of your boot stage. It doesn't obey MS but you.
flexagoon•18m ago
With Heads, the firmware measures itself and sends the results to the TPM. If an attacker flashes a modified firmware that simply lies about the measurement results, the entire security system will be bypassed.
deknos•24m ago
orrr we just have official institutions which do this and enforce vendors to add certificates from other trusted parties. not only microsoft is able to do this. also microsoft already also had fallout regarding signing.

and secure boot is still the antichrist, but we have to live with them.

ChocolateGod•1h ago
But you can turn it off or en-roll your own keys.
EnPissant•45m ago
It's just a default. You can override it with your own platform key.
saidinesh5•3h ago
Just out of curiosity, how good is the secure boot experience these days?

I've had to disable it on all my installations because of either nvidia drivers or virtual box modules. In general Arch based distros didn't seem too friendly for secure boot set up.

bravetraveler•2h ago
Signature maintenance for modules can be fully automated. Enrollment requires navigating a mildly-intimidating interface a single time to accept the new PKI.

Fine for systems you physically manage, anything remote in a datacenter I wouldn't bother (without external motivation)

mormegil•1h ago
Which is strange because secure boot should be useful in _exactly_ the situation you don't have physical control of the HW, shouldn't it? I guess the threat model for a common not-that-important company does not include evil data center (and it's dubious if SecureBoot would protect you in reality), but wasn't that one of the motivations?
bravetraveler•1h ago
Aye, though an evil maid has higher barriers and more paperwork in a DC.

I hesitate based on that mitigation and the untold operational pain. Sometimes it's worth it, other times it isn't.

ChocolateGod•1h ago
Well you can tie it to TPM to store your encryption key which should only produce the key when the boot parameters match the key. This is what Windows already does but its not fully supported under Linux and somewhat insecure as you can't encrypt the initramfs (so someone can infect boot process there instead).
michaelt•57m ago
> Which is strange because secure boot should be useful in _exactly_ the situation you don't have physical control of the HW, shouldn't it?

One of the ways you can introduce your own signing key is as a Machine Owner Key, using the "MOK Manager"

But a design goal of this software was: We don't want malware with root to be able to introduce a MOK without the user's consent, as then the malware could sign itself. So "MOK Manager" was deliberately designed to require keyboard-and-mouse interaction, early in boot before the network has been brought up.

Of course if your server has a KVM attached, you can still do this remotely, I guess.

paulv•2h ago
My experience as a long time Linux user (since 1997, so admittedly stuck with some bad habits from when things were actually hard to get working) has been that things are kind of confusing if you deviate from the golden path, but if you are on the golden path you won't ever notice that it is turned on.

The laptops I have gotten from eg Dell with Linux pre installed have just worked. Machines I have upgraded through many versions of Ubuntu (lts versions of 16-24) were weirdly broken for a while when I first turned secure boot on while I figured it out, but that seemed reasonable for such a pathological case. Machines I have installed Debian on in the last few years have been fine, except for some problems when I was booting from a software raid array, but that is because I was using 2 identical drives and I kept getting them confused in the UEFI boot configuration.

I have not used them on machines with nvidia, vbox, or other out-of kernel-tree modules though.

pbhjpbhj•2h ago
Every couple of years MS do an update that messes up multi-boot/dual boot. I'm sure it's on purpose at this point, and relatively sure "Secure Boot" is how they achieve it.

Still on Windows only for kids games. Linux user since last millennium.

blkhawk•1h ago
As a Linux-only gamer since 2019 I wonder what kids games you are talking about?
repstosb•1h ago
There are things like Roblox that are really only usable under Windows due to a perverse idea of what "anti-cheat" should look like.
blkhawk•5m ago
ah, I almost mentioned roblox but checking protondb it has gold status. So it should work?
ChocolateGod•1h ago
> Every couple of years MS do an update that messes up multi-boot/dual boot

IIRC the last time this happened it was the fault of Linux distros not updating their packages, it was just a Microsoft update updating the security requirements that affected distros that were caught slacking.

chaz6•1h ago
I use Fedora and have it enabled. Every time there is a kernel update I have to run a script to re-compile and sign the vmware drivers. I could probably figure out how to do it with dkms at some point. Every now and then, there's a kernel change big enough to make the vmware drivers stop working so I have to get a new patch.
michaelt•1h ago
I would rate the experience as 6.5/10

If you use a major distro like Ubuntu, you might find Secure Boot works out-of-the-box, with no need to dick about with 'machine owner keys' and suchlike.

Ubuntu has packages like "linux-modules-nvidia-550-generic" containing a version of nvidia's 550 drivers signed with canonical's keys. If the stars align and that package gets installed, you'll have nvidia drivers that work under secure boot.

They also have a second mechanism. You can set up a 'machine owner key' (MOK) then software updates will trigger automatically building new nvidia kernel modules, using 'dkms' then sign them with the MOK allowing them to work under secure boot.

The problem is this process can be a bit wonky. The MOK setup process involves rebooting and going through the "MOK Manager", an interface that looks like something from the 1980s. If you didn't know to expect it, or what it's there for, or you don't speak English, it's easy to hit the wrong thing and not set up your MOK. And it only shows up for a single boot, unless you know an arcane terminal command.

And if you run into any problems during the setup process - you're going to be researching the fix on your phone, because your PC isn't booting.

Meanwhile, the third option of just turning off secure boot is easy (assuming you know what the BIOS is) and it works every time. So a lot of 'how to set up nvidia drivers' guides just recommend doing that.

Although I complain about it, I find it impressive things like dynamically compiling and signing kernel modules works as well as it does - especially as so much of it is maintained by volunteers, selflessly giving up their free time when they could have simply turned off secure boot in their BIOS too.

icar•1h ago
With Arch, I've been using SecureBoot since sbctl [0] was released with 0 issues. Granted, I don't use any Nvidia hardware.

[0] https://github.com/Foxboron/sbctl

EnPissant•39m ago
UKI + secure boot works really well, but it is somewhat manual of a set up on Arch (what isnt).

If properly set up the only files you generate are:

- /efi/loader/random-seed

- /efi/EFI/Linux/arch-linux.efi

- /efi/EFI/Linux/arch-linux-fallback.efi

and the .efi are all automatically signed by hooks.

You can even skip a bootloader and boot the images directly.

CoolCold•25m ago
just doublechecked with "Confirm-SecureBootUEFI" - says True on my laptop which used > 1 year. I'm pretty sure on the previous system which was used for 4 years it was on too - have not noticed any issues.

Windows 10 and then 11

jeroenhd•23m ago
It works pretty well out of the box unless you're trying to combine Linux with Nvidia hardware. Even with Nvidia hardware it doesn't take that much effort to make it work, but as usual, Nvidia requires taking extra steps.

What Linux is really lacking is a user-friendly method for enrolling your own keys, which would instantly solve all the Nvidia/firmware updater/custom bootloader problems. The command line tools are slowly getting easier to use, but there's no guided instruction flow.

roschdal•2h ago
Secure boot is so evil.
negative_zero•2h ago
Well I can say that the update is not going 100% smoothly. I have a pending KEK update in Fedora but it's a test key (bug filed but no progress as of yet).
mkj•2h ago
It's not just Linux - certificates to sign Windows are also affected in 2026.

https://support.microsoft.com/en-us/topic/windows-secure-boo...

https://techcommunity.microsoft.com/blog/windows-itpro-blog/...

Really it seems like having any expiry date for these certificates is a mistake. The one thing it might protect against is a compromised signing key, but if you have to wait 15 years for a compromised key to stop being valid, it's not very useful!

Don't worry, the replacement MS certs expire in 2038 (a couple of months after the 32-bit unix time rollover).

littlestymaar•1h ago
Is that really a mistake? Or Microsoft just has no interest to care about computers not working as intended anymore.

It certainly wouldn't be the first evidence of that…

pjmlp•55m ago
Being cynic, there was the expectation that computers would get replaced before the certification expiration date.
nirui•41m ago
I'm feeling/guessing the expiration is more of a flow-with-tradition thing. TLS certificates expires, it's part of the security feature, so why not Secure Boot certificates too?

And of course, it gives the root certificate issuer enormous amount of power as well, good riddance from the POV of Microsoft.

However, I think if Microsoft REALLY care about security, they should not let application installed on their system to do anything that is unapproved by the user (such as installing a virus that encrypts all their data), which could actually enhance the user experience and security. But, with secure boot, at least you can be sure that your Windows kernel is not tampered so it can serve the virus correctly :)

jeroenhd•32m ago
The mistake was not to put an expiry date on the certificates, but to trust hardware vendors to do even basic firmware maintenance after motherboards and laptops leave the warehouse.

In theory a KEK update will fix the expiry issue just like a CA package update on any normal operating system will do.

In practice, most UEFI firmware is written like trash, unmaintained, and mostly untested.

semi-extrinsic•4m ago
> Really it seems like having any expiry date for these certificates is a mistake.

Especially when most relevant attacks occur in the scenario where attacker has control over the system clock.

Artoooooor•2h ago
Just another factor creating electro-junk. Currently I can install 30 year old system on 30 year old hardware (assuming that I keep both the machine and the installation media in a good shape). With current computers it will be impossible because they will be "unsupported".
jeroenhd•15m ago
Just disable secure boot if you can't update the certificate. You can still use your computer.
omnibrain•1h ago
I'm sure this is a naive take, but why is it not possible to enter a new key into the BIOS (dating myself, I know it's EFI) by hand?
nottorp•1h ago
You'd have control over what boots on your computer then...
nicman23•1h ago
you literally have though. you can self sign everything and set up uefi to only boot your signature
ozgrakkurt•1h ago
That would be a disaster. Or imagine what would happen if you just disabled secure boot, your computer will be infected with viruses and your bank account emptied instantly I reckon
nicman23•1h ago
it is
jcgl•32m ago
It should be, at least on higher-end boards, no?
xiconfjs•1h ago
Is there a reliable command in Ubutu to check for the secure boot key and its expiration date?
porridgeraisin•43m ago
mokutil

Check its various options

The 'Validity' field in the output will tell you the expiration date.

porridgeraisin•45m ago
Secure boot, disk encryption, etc are more trouble than they are worth IME. I have them all off.

Qualifier: for personal computers that you don't take regular backups of, test backups, etc

chabad360•37m ago
It should be noted, it is 100% possible to use Secure Boot with Linux and not be impacted at all. AFAIK, most (if not all) UEFI firmwares allow enrolling your own keys. Managing secure boot these days is as easy as installing sbctl and adding a hook to sign your kernel when rebuilding the initramfs. For the same price, as noted by the article, the key new key can be updated while the system is online without anyone being the wiser.

The FUD that gets spread around SB helps no one, and other than a small list of exceptions, you are always in control of your system.

SB allows MS to transparently enable Full Disk Encryption by default, which I think is a win for all users. It allows you to do the same on Linux. It lets server operators be sure their systems have not been tampered with. While there are many problems with UEFI, SB is not one of them.

palata•28m ago
[Warning: I'm not interested in sarcasm or uninformed rants against secure boot, there are plenty already]

I'm hoping to get insights from people who understand secure boot well here. My understanding on Android (for the minority of Android manufacturers that do it correctly) is that there is a "manufacturer key" burnt somewhere on the ROM that cannot ever be changed, and once a first system is installed properly:

1. It is impossible to overwrite the system partitions unless the bootloader is unlocked from the already-installed OS (I assume that something makes sure that only the signed OS can unlock the bootloader?).

2. Once the bootloader is unlocked, it is impossible to overwrite only parts of the system: it's all or nothing, such that one cannot inject stuff into an existing system (evil maid style).

Still on Android, it's possible to add custom keys. That's what GrapheneOS and the likes use.

How is it on UEFI? It sounds like the "manufacturer keys" are always from Microsoft, but is there not a way to use custom keys?

jeroenhd•22m ago
> Still on Android, it's possible to add custom keys. That's what GrapheneOS and the likes use.

AFAIK, that depends on the hardware used. Google Pixels allow it, but it's not universally permitted. Plenty of stories can be found on XDA where people tried to lock their bootloader that bricked their phone.

xyst•17m ago
Reading into the history of Secure Boot. Discovered Intel and AMD processors have back doors via Intel Management Engine [1] and AMD Platform Security Processor [2]. Both are closed source and have had a number of vulnerabilities over the years. They are essentially backdoors.

Seems disabling these "features" is nearly impossible as well.

[1] https://en.m.wikipedia.org/wiki/Intel_Management_Engine

[2] https://en.m.wikipedia.org/wiki/AMD_Platform_Security_Proces...

jeroenhd•11m ago
I wonder what my laptop will do soon.

Lenovo, in their infinite wisdom, has decided to load an Nvidia blob signed by Microsoft before even being able to access the UEFI firmware interface. People who have tried to install their own secure boot keys found out the hard way that you can't even get into the firmware configuration interface to undo the change.

Their official workaround is to only load secure boot keys through their firmware interface (rather than the standard Linux utility) which refuses to wipe the certificate used to sign the Nvidia firmware. However, that workaround will obviously stop working when that certificate expires.

When Root Meets Immutable: OpenBSD Chflags vs. Log Tampering

https://rsadowski.de/posts/2025/openbsd-immutable-system-logs/
21•todsacerdoti•1h ago•11 comments

Fully homomorphic encryption and the dawn of a private internet

https://bozmen.io/fhe
206•barisozmen•6h ago•58 comments

NIH is cheaper than the wrong dependency

https://lewiscampbell.tech/blog/250718.html
173•todsacerdoti•7h ago•97 comments

ChatGPT agent: bridging research and action

https://openai.com/index/introducing-chatgpt-agent/
579•Topfi•16h ago•392 comments

Linux and Secure Boot certificate expiration

https://lwn.net/SubscriberLink/1029767/08f1d17c020e8292/
80•pabs3•6h ago•65 comments

Mistral Releases Deep Research, Voice, Projects in Le Chat

https://mistral.ai/news/le-chat-dives-deep
546•pember•18h ago•115 comments

Data on How America Sold Out Its Computer Science Graduates

https://ifspp.substack.com/p/data-on-how-america-sold-out-its
53•haskellandchill•5h ago•34 comments

My experience with Claude Code after two weeks of adventures

https://sankalp.bearblog.dev/my-claude-code-experience-after-2-weeks-of-usage/
262•dejavucoder•15h ago•201 comments

My favorite use-case for AI is writing logs

https://newsletter.vickiboykis.com/archive/my-favorite-use-case-for-ai-is-writing-logs/
190•todsacerdoti•10h ago•126 comments

Arva AI (YC S24) Is Hiring an AI Research Engineer (London, UK)

https://www.arva.ai/careers/ai-research-engineer
1•OliverWales•1h ago

Perfume reviews

https://gwern.net/blog/2025/perfume
227•surprisetalk•1d ago•119 comments

Hand: open-source Robot Hand

https://github.com/pollen-robotics/AmazingHand
382•vineethy•21h ago•102 comments

TCP-in-UDP Solution (eBPF)

https://blog.mptcp.dev/2025/07/14/TCP-in-UDP.html
23•todsacerdoti•3d ago•4 comments

Extending That XOR Trick to Billions of Rows

https://nochlin.com/blog/extending-that-xor-trick
56•hundredwatt•3d ago•7 comments

Claude Code Unleashed

https://ymichael.com/2025/07/15/claude-code-unleashed
91•ymichael•2d ago•52 comments

DIY Telescope Mods That Transformed My Astrophotography

https://www.youtube.com/watch?v=Efmzr_K4ApQ
16•karlperera•3d ago•2 comments

Fixing a Direct3D9 bug in Far Cry (2018)

https://houssemnasri.github.io/2018/07/07/farcry-d3d9-bug/
23•anotherhue•7h ago•1 comments

Self-taught engineers often outperform (2024)

https://michaelbastos.com/blog/why-self-taught-engineers-often-outperform
286•mbastos•19h ago•230 comments

A look at IBM's short-lived "butterfly" ThinkPad 701 of 1995

https://www.fastcompany.com/91356463/ibm-thinkpad-701-butterfly-keyboard
74•vontzy•3d ago•21 comments

RisingWave: An Open‑Source Stream‑Processing and Management Platform

https://github.com/risingwavelabs/risingwave
36•Sheldon_fun•3d ago•4 comments

Inspect ANSI control codes and escape sequences

https://ansi.tools
5•webpro•3d ago•1 comments

All AI models might be the same

https://blog.jxmo.io/p/there-is-only-one-model
202•jxmorris12•16h ago•105 comments

Netflix uses generative AI in one of its shows for first time

https://www.theguardian.com/media/2025/jul/18/netflix-uses-generative-ai-in-show-for-first-time-el-eternauta
3•jmsflknr•22m ago•0 comments

Apple Intelligence Foundation Language Models Tech Report 2025

https://machinelearning.apple.com/research/apple-foundation-models-tech-report-2025
219•2bit•15h ago•156 comments

USB-C hubs and my slow descent into madness (2021)

https://overengineer.dev/blog/2021/04/25/usb-c-hub-madness/
147•pabs3•7h ago•101 comments

Astronomers Discover Rare Distant Object in Sync with Neptune

https://pweb.cfa.harvard.edu/news/astronomers-discover-rare-distant-object-sync-neptune
35•MaysonL•9h ago•6 comments

Run TypeScript code without worrying about configuration

https://tsx.is/
79•nailer•16h ago•48 comments

Archaeologists discover tomb of first king of Caracol

https://uh.edu/news-events/stories/2025/july/07102025-caracol-chase-discovery-maya-ruler.php
147•divbzero•4d ago•35 comments

Anthropic tightens usage limits for Claude Code without telling users

https://techcrunch.com/2025/07/17/anthropic-tightens-usage-limits-for-claude-code-without-telling-users/
333•mfiguiere•12h ago•210 comments

Modular Interpreters and Visitors in Rust with Extensible Variants and CGP

https://contextgeneric.dev/blog/extensible-datatypes-part-2/
17•PaulHoule•2d ago•0 comments