MESSAGE
DATE | 2013-03-25 |
FROM | From: "Paul Robert Marino"
|
SUBJECT | Re: [NYLXS - HANGOUT] UEFI
|
From owner-hangout-outgoing-at-mrbrklyn.com Mon Mar 25 08:59:16 2013 Return-Path: X-Original-To: archive-at-mrbrklyn.com Delivered-To: archive-at-mrbrklyn.com Received: by mrbrklyn.com (Postfix) id 574BD161C9E; Mon, 25 Mar 2013 08:59:16 -0400 (EDT) Delivered-To: hangout-outgoing-at-mrbrklyn.com Received: by mrbrklyn.com (Postfix, from userid 28) id 45310161CA8; Mon, 25 Mar 2013 08:59:16 -0400 (EDT) Delivered-To: hangout-at-mrbrklyn.com Received: from mail-yh0-f49.google.com (mail-yh0-f49.google.com [209.85.213.49]) by mrbrklyn.com (Postfix) with ESMTP id B7C78161C9E for ; Mon, 25 Mar 2013 08:59:15 -0400 (EDT) Received: by mail-yh0-f49.google.com with SMTP id m1so381293yhg.8 for ; Mon, 25 Mar 2013 05:59:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113; h=x-received:message-id:date:from:to:subject:in-reply-to:x-mailer :mime-version:content-type; bh=vU67MvFybV1gr93uYF8vukOxNfwUffIOIUa5sqGRero=; b=mDUmPFCweZV2NVG/4iKmTtt5mizaoRc6/ucTvQnt1JQSFwoXRPyW5qSq//kQ/jD+rn 5lerg79SBuOCzsx0QgfvLWjOox61nPnwDhs3b5K47TlfMZfUajalVMxIFOWoEgX5t8sV S+dOv0Tk9GlQFOWhJqjPMv1RMUvLuHZnEB2IHm1kY1960XbB46Q7ripUmXPkP97hLb4N mzqRIuB4CjDOcwKt8nDDL40KJYNsPHkb3ZjR1FQQxoBH1i3iiMJX29HoPwgzHsIIL0cd klPhSjl21zcwNSywTN2WiaEywgIWGjgfNcZTVZbVNx7+Cqz9VLuun/z+RfYOpr/cMsSP 00sA== X-Received: by 10.236.2.230 with SMTP id 66mr6823972yhf.202.1364216354811; Mon, 25 Mar 2013 05:59:14 -0700 (PDT) Received: from www.palm.com (m984036d0.tmodns.net. [208.54.64.152]) by mx.google.com with ESMTPS id i71sm18560996yhj.14.2013.03.25.05.59.12 (version=TLSv1 cipher=RC4-SHA bits=128/128); Mon, 25 Mar 2013 05:59:13 -0700 (PDT) Message-ID: <51504a21.eb8eec0a.412d.ffff8ab1-at-mx.google.com> Date: Mon, 25 Mar 2013 08:59:13 -0400 From: "Paul Robert Marino" To: Subject: Re: [NYLXS - HANGOUT] UEFI In-Reply-To: <514FEF06.3090106-at-panix.com> X-Mailer: Palm webOS MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="Alternative_=_Boundary_=_1364216352" Sender: owner-hangout-at-mrbrklyn.com Precedence: bulk Reply-To: hangout-at-mrbrklyn.com
--Alternative_=_Boundary_=_1364216352 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Mac =3DPC made by apple
Yes it is possible to sign and install your = own keys they had to add support for it otherwise Microsoft would have been= looking at an other anti trust case. They just made it extremely difficult= the funny thing about it is it actually make the "security" useless. I mea= n in a sense it adds an other layer which will break legacy MBR viruses but= it doesn't prevent new ones from installing their own certs so it makes th= e whole thing pointless. Furthermore there are several distributions which = have now filled out the mountain of paperwork to get Microsoft to sign thei= r keys. This key signing is "free" if you don't count paying the lawyers in= volved. So there are several ways this can work.
-family:Prelude, Verdana, san-serif;">
>99;">-- Sent from my HP Pre3 t-family:Prelude, Verdana, san-serif; "> 5%">On Mar 25, 2013 2:30 AM, Ruben <mrbrklyn-at-panix.com> wrote: r>On 03/24/2013 01:58 AM, Paul Robert Marino wrote:=0D > well = usually you just turn it off secure boot in the bios=0D =0D I thought= that wasn't always possible. Also, there seems to be problems =0D read= ing from the MBR=0D >=0D > however there is a tool to inject yo= ur own keys generated by openssl=0D > into the boot.=0D > here = is an article=0D > http://en.gentoo-wiki.com/wiki/UEFI=0D > her= e is a better one=0D > http://blog.hansenpartnership.com/uefi-secure-= boot/=0D >=0D =0D I've read this. It is frankly depressing. H= ow does one install GNU on =0D a Mac?=0D =0D
--Alternative_=_Boundary_=_1364216352--
--Alternative_=_Boundary_=_1364216352 Content-Type: text/html; charset="UTF-8" Content-Transfer-Encoding: quoted-printable
Mac =3DPC made by apple
Yes it is possible to sign and install your = own keys they had to add support for it otherwise Microsoft would have been= looking at an other anti trust case. They just made it extremely difficult= the funny thing about it is it actually make the "security" useless. I mea= n in a sense it adds an other layer which will break legacy MBR viruses but= it doesn't prevent new ones from installing their own certs so it makes th= e whole thing pointless. Furthermore there are several distributions which = have now filled out the mountain of paperwork to get Microsoft to sign thei= r keys. This key signing is "free" if you don't count paying the lawyers in= volved. So there are several ways this can work.
-family:Prelude, Verdana, san-serif;">
>99;">-- Sent from my HP Pre3 t-family:Prelude, Verdana, san-serif; "> 5%">On Mar 25, 2013 2:30 AM, Ruben <mrbrklyn-at-panix.com> wrote: r>On 03/24/2013 01:58 AM, Paul Robert Marino wrote:=0D > well = usually you just turn it off secure boot in the bios=0D =0D I thought= that wasn't always possible. Also, there seems to be problems =0D read= ing from the MBR=0D >=0D > however there is a tool to inject yo= ur own keys generated by openssl=0D > into the boot.=0D > here = is an article=0D > http://en.gentoo-wiki.com/wiki/UEFI=0D > her= e is a better one=0D > http://blog.hansenpartnership.com/uefi-secure-= boot/=0D >=0D =0D I've read this. It is frankly depressing. H= ow does one install GNU on =0D a Mac?=0D =0D
--Alternative_=_Boundary_=_1364216352--
|
|