Interesting article here which suggests …
Canonicals ‘Ubuntu BIOS/UEFI Requirements’ may lock down a ‘secure boot’ enabled system tighter than Microsofts ‘Windows 8 HCR’ (Hardware Certification Requirements):
http://www.muktware.com/3709/ubuntus-uefi-secure-boot-requirements-odms
as (according to the article) “there’s no indication that Canonical will be offering any kind of signing service” … and the rest is pretty much the same as Microsofts Windows 8 HCR as far as secure boot is concerned.
In fairness, it must be said that there’s also no indication that they won’t … and the Microsoft section on secure boot doesn’t mention a signing service either (as far as I can see).
Here’s the relevant section of the Ubuntu BIOS/UEFI Requirements PDF:
[u][i][b]9.5. Secure boot[/b][/i][/u]
Section 27 of the UEFI specification [UEFI 2.3.1] defines “Secure Boot”, a mechanism for authenti-
cating boot images loaded by UEFI firmware. Although the description of the secure boot mecha-
nism is comprehensive, it does not define any policy for ownership of authentication information.
Canonical, in conjunction with industry partners, has released a whitepaper [UEFI-SB] detailing the
issues surrounding UEFI secure boot and Linux-based operating systems.
Canonical will provide keys and signed boot images for use with secure boot functionality. The sign-
ing key will be provided as an x.509-encapsulated 2048-bit RSA public key. OEMs must embed this
key in the KEK and db signature databases, as an entry of type EFI_CERT_X509_GUID. The PK is
left for the OEM to define.
Any machine shipped with Ubuntu must support reconfiguration of the keys used in the secure
boot process, to allow users to use secure boot with their own keys and custom boot images.
The firmware interface should allow a physically-present user to enter the machine in to setup
mode, or manually load KEK, db and dbx entries from disk or removable storage. This require-
ment is compatible with the Windows 8 Hardware Certification Requirements [WIN8HCR], §
System.Fundamentals.Firmware.UEFISecureBoot, item 20.
Any machine shipped with Ubuntu must allow a physically-present user to disable and re-enable se-
cure boot verification functionality. This requirement is compatible with the Windows 8 Hardware
Certification Requirements [WIN8HCR], § System.Fundamentals.Firmware.UEFISecureBoot, item 21.
Systems shipping with secure boot enabled must not use a CSM module for legacy BIOS compatibil-
ity.
Due to the very limited availability of UEFI implementations with secure boot functionality, Canon-
ical requires additional testing effort for any SKUs that are required to support secure boot. We re-
quire that a sample SKU be provided early in the enablement process, to allow for this additional
testing.
For more information on enabling Ubuntu on a system supporting secure boot, please contact
Canonical.
For those that are interested … here are links to the Ubuntu BIOS/UEFI Requirements and Windows 8 certification requirement (secure boot) PDF’s:
Ubuntu BIOS/UEFI Requirements (seccure boot starts at page 26):-
http://odm.ubuntu.com/docs/ubuntu-bios-uefi-requirements.pdf
Windows 8 HCR(secure boot starts at page 119):-
or direct download:
http://download.microsoft.com/download/A/D/F/ADF5BEDE-C0FB-4CC0-A3E1-B38093F50BA1/windows8-hardware-cert-requirements-system.pdf
This validates secure boot just as much (if not more) than the Fedora solution … it still remains to be seen how Canonical/Ubuntu are planning on dealing with secure boot on non-Ubuntu-certified systems.
IMHO for the time being Linux devs should plan for (contingency), but DO NOTHING concerning secure boot … validating secure boot allows the hardware manufacturers to NOT include a secure boot disable feature … though it must be said that in the open source world keeping your contingency plans quiet would probably be impossible 