Become a fan of Slashdot on Facebook

 



Forgot your password?
typodupeerror
×
Bug Microsoft Operating Systems Software Windows

Dual Boot Not Trusted, Rejected By Vista SP1 525

Alsee writes "Welcome to our first real taste of Trusted Computing: With Vista Enterprise and Vista Ultimate, Service Pack 1 refuses to install on dual boot systems. Trusted Computing is one of the many things that got cut from Vista, but traces of it remain in BitLocker, and that is the problem. The Service Pack patch to your system will invalidate your Trust chain if you are not running the Microsoft-approved Microsoft-trusted boot loader, or if you make other similar unapproved modifications to your system. The Trust chip (the TPM) will then refuse to give you your key to unlock your own hard drive. If you are not running BitLocker then a workaround is available: Switch back to Microsoft's Vista-only boot mode, install the Service Pack, then reapply your dual boot loader. If you are running BitLocker, or if Microsoft resumes implementing Trusted Computing, then you are S.O.L."
This discussion has been archived. No new comments can be posted.

Dual Boot Not Trusted, Rejected By Vista SP1

Comments Filter:
  • by The Warlock ( 701535 ) on Wednesday July 30, 2008 @04:30PM (#24407929)

    It's possible to use the Vista bootloader to chainload GRUB rather than the other way around (which is the default for most Linux installs.)

    Yes, it's a pain to set up, but so is any dual-boot setup.

  • Re:But what if... (Score:1, Informative)

    by Anonymous Coward on Wednesday July 30, 2008 @04:37PM (#24408031)

    I have Vista SP1 installed on a machine that uses GRUB to dual boot into Kubuntu, so it appears to work fine on systems without a TPM.

  • Re:Except that... (Score:3, Informative)

    by X0563511 ( 793323 ) on Wednesday July 30, 2008 @04:39PM (#24408067) Homepage Journal

    And no TPM in the laptop.

    That's the whole point of the problem, TPM has begun causing issues. You don't have TPM, so you are not affected.

  • by salimma ( 115327 ) on Wednesday July 30, 2008 @04:42PM (#24408101) Homepage Journal

    Yes, it's a pain to set up, but so is any dual-boot setup.

    EasyBCD makes it rather easy, actually. The hardest part in dual-booting with Windows is partitioning -- the trick is to make sure there are some gap between the Windows partition and the Linux partitions, or even better, create all the partitions in Windows, and only change the type and initialize them from the Linux installer.

    Otherwise, Windows and Linux sees different disk geometries, and if you're not careful you could end up with an overlap, with disastrous consequences.

  • by doas777 ( 1138627 ) on Wednesday July 30, 2008 @04:44PM (#24408135)
    no, you just have to have a version of Vista that supports BitLocker, whether it is on or off. Enterpise and ultimate are the only versions that support BL, so they are the ones that need the KB which is prerequisite to SP1 install (because SP1 upgrades some bitlocker features). Never Trust Trustworthy computing. it hasn't earned it.
  • by mpapet ( 761907 ) on Wednesday July 30, 2008 @04:47PM (#24408181) Homepage

    This *may* be a corner case as most TPM's were shipped in the disabled state back when XP was still shipping.

    Instead, how about testing the open source BIOS stack? Most of you have an unused box of recent vintage and I'm sure the projects can use the feedback.

    FYI: An open sourced bios is an Achilles heel for Microsoft. Mobo OEM's will **jump** on a Free bios because it saves them money and elminating TPM saves them much more money.

    Get involved!!

    http://www.coreboot.org/Welcome_to_coreboot [coreboot.org]

    http://openbios.info/Welcome_to_OpenBIOS [openbios.info]

  • Re:But what if... (Score:1, Informative)

    by Anonymous Coward on Wednesday July 30, 2008 @04:49PM (#24408211)

    Terrorizing the poor multi billion $ business of M$

  • Re:WTF is S.O.L.? (Score:4, Informative)

    by denis-The-menace ( 471988 ) on Wednesday July 30, 2008 @04:51PM (#24408235)

    I thought it was: Shit Out of Luck
    which is not in your list.

  • by Ferzerp ( 83619 ) on Wednesday July 30, 2008 @04:54PM (#24408293)

    I have Vista Enterprise on a dual boot laptop with a TPM that I have never enabled. Installing SP1 did nothing adverse to the dual boot capability.

  • by Eggplant62 ( 120514 ) on Wednesday July 30, 2008 @04:58PM (#24408359)

    I won't use it. I just bought a laptop on Ebay, brand new, out of box, that came with the Home edition, great bargain at $421. First thing I did with it was actually start it up and say "No" on the AUP acceptance page. I immediately powered it off, put in my trust Ubuntu Hardy 64-bit install cd, wiped the disk, and installed a real operating system that will stay the fuck out of my way.

    Sorry, Microsoft, but I'd call this Epic Fail. Trusted computing causes me to lose control of *my* computer. Problem is, Microsoft don't understand the definition of computer ownership.

  • Re:Who cares? (Score:5, Informative)

    by gehrehmee ( 16338 ) on Wednesday July 30, 2008 @04:58PM (#24408361) Homepage
    Linux with ntfs-3g has been supporting full read/write on ntfs for some time, and works out of the box on my ubuntu hardy machine anyways.
  • Re:Who cares? (Score:1, Informative)

    by AceofSpades19 ( 1107875 ) on Wednesday July 30, 2008 @05:01PM (#24408397)
    Actually most linux distros can read/write ntfs now
  • Re:Who cares? (Score:5, Informative)

    by jdb2 ( 800046 ) * on Wednesday July 30, 2008 @05:03PM (#24408423) Journal

    Why do you say "Dual booting was always an ugly hack"?

    Two words: filesystem support.

    Boot up Linux and all the stuff on your NTFS partition is read-only.

    What? You know, Linux has had full NTFS Read/Write support for a while now, see :

    http://www.linux-ntfs.org/ [linux-ntfs.org]

    Also, ever heard about WUBI [wubi-installer.org] ?

    jdb2

  • by wherrera ( 235520 ) on Wednesday July 30, 2008 @05:04PM (#24408437) Journal

    Yes, our family laptop is Vista Ultimate and Ubuntu, set up this way, and took Vista SP1 without a hiccup. Have Vista's bootup load the linux GRUB bootloader.

    Ubuntu's Wifi is much more reliable on the same hardware, but Ubuntu won't run Adobe CS3 properly.

  • Re:Who cares? (Score:2, Informative)

    by Anonymous Coward on Wednesday July 30, 2008 @05:07PM (#24408483)

    Not to mention it's fairly easy to get Windows to read ext2/3 partitions with the extfs driver.

  • by oldspewey ( 1303305 ) on Wednesday July 30, 2008 @05:12PM (#24408571)

    Just games? There are lots of people who run windows as their primary OS (because it's what they are used to after spending 15+ years on a MS platform, or maybe because there are apps they rely on that aren't available elsewhere), and they dual boot Linux because they want to be able to hack around, learn more, and generally have fun.

    Taking an interest in Linux does not automatically mean somebody will abandon Windows the next morning.

  • Re:But what if... (Score:5, Informative)

    by gparent ( 1242548 ) on Wednesday July 30, 2008 @05:14PM (#24408591)
    Informative gives Karma but Funny doesn't. Therefore, people who appreciate the post and wish to give the user some karma will choose Informative.
  • by olivier69 ( 1176459 ) on Wednesday July 30, 2008 @05:18PM (#24408647) Homepage
    Beware : the new Intel ICH10R has an integrated TPM.
  • Re:Vista and Mac OS? (Score:5, Informative)

    by Sentry21 ( 8183 ) on Wednesday July 30, 2008 @05:22PM (#24408711) Journal

    Intel Macs use EFI instead of a BIOS, and EFI uses GUID Partition Tables (GPT) instead of MBR.

    The space that the MBR used to sit in is reserved in GPT, so when a legacy system reads, uses, or modifies the partition table, it only changes the old MBR partition table, which is not actually used to boot. In contrast, Boot Camp's dual-boot features only use the GPT, which means that as far as Vista knows, it IS the only boot loader involved.

  • Re:But what if... (Score:5, Informative)

    by Nimsoft ( 858559 ) on Wednesday July 30, 2008 @05:22PM (#24408715)

    Not at all....

    Booting is handled by the EFI, and any operating system booted under the legacy BIOS emulation wouldn't be able to do a thing about it!

  • by Sentry21 ( 8183 ) on Wednesday July 30, 2008 @05:25PM (#24408775) Journal

    Quicken's cock-up was that it was writing to parts of the MBR that DOS/Windows didn't use - but GRUB/LILO did. In this case, it would do the same thing, since it's unlikely that Vista has changed how such things work.

    Microsoft's choice to 'intentionally not read Mac floppy disks' likely involves not having support for MFS/HFS, and not seeing any real need to reverse-engineer them to implement them.

  • Re:But what if... (Score:3, Informative)

    by Ferzerp ( 83619 ) on Wednesday July 30, 2008 @05:27PM (#24408815)

    The bug would be in the enforcement of the check when it does not apply, not in the very existence of it.

    Do you agree that a full disk encryption product needs to protect the data from unauthorized access in every way possible?

    If you agree to the above, do you assert that despite that, it should allow access to the data when the environment is verifiably NOT what it expects?

    I'm not suggesting that the Windows boot loader is infallible (far from it), but it seems like you are suggesting that the FDE solution should continue on its merry way when it has detected an obvious deviation from the environment that it was designed to work in? We make sacrifices in usability and performance when we want to ensure that our data is safe. This disabling would obviously be purposeful. However, what I am saying is that if it is triggered when it does not apply (when FDE isn't enabled, for example), *THAT* is a bug.

  • Re:But what if... (Score:5, Informative)

    by Intron ( 870560 ) on Wednesday July 30, 2008 @05:31PM (#24408869)
    Its only in Vista Enterprise or Vista Ultimate, which support disk encryption.
  • by brianjlowry ( 1015645 ) on Wednesday July 30, 2008 @05:35PM (#24408935)
    I'm running Vista Ultimate 64bit with GRUB for Ubuntu, but BitLocker is turned off. No problems here thankfully.
  • by Intron ( 870560 ) on Wednesday July 30, 2008 @05:39PM (#24408981)

    Date of article you reference: October 13, 2006

    Date of KB935509 [microsoft.com] update which breaks this: January 7, 2008

  • by kosmosik ( 654958 ) <kos@ko[ ]sik.net ['smo' in gap]> on Wednesday July 30, 2008 @05:39PM (#24408985) Homepage

    > Would not TrueCrypt be the better option?

    It depends on what you need. This is an old and true as hell slogan - security as strong as the system's weakest element.

    So for example it does not matter if you use the bestests the strongest the most sexy cryptographic algorithms for your Truecrypt installation if it is easy to get your keys from memory using other ways.

    Such way would be for example *booting* the system into tiny supervisor.

    This is fairly new concept of attack but it is possible as hell. All new VT technologies introduced sometime ago are now finding their way into consumer systems. Security researched warned about this since ca. 2003.

    Now that MS is trying to think ahead and protect from such attacks it is Bad. But if they wouldn't it would also be Bad.

  • by Christophotron ( 812632 ) on Wednesday July 30, 2008 @05:44PM (#24409057)
    Refuses to boot? Vista even refuses to INSTALL on a hdd that it doesn't believe is the "first" drive. It won't tell you why, either. It just says the partition doesn't meet its "criteria". Unplug the other hard drive and try again, and all of a sudden it works. Ignorance of surroundings is REQUIRED for a Vista installation. Use the BIOS boot selector (instead of messing with GRUB) after each individual OS is installed.
  • by Goldberg's Pants ( 139800 ) on Wednesday July 30, 2008 @05:54PM (#24409183) Journal

    most people are content to leave it at that

    First thing I did on the three systems I bought this last year was kill Vista and install XP. Yes it was from a pirate copy, but Microsoft has gotten their tax off me for THREE different systems so FUCK THEM. I am using a Microsoft OS. I am using one that is, in the words of Daft Punk, Harder Better Faster Stronger. (Okay, so the middle two are the most accurate.)

    The big problem is the fact that despite providing XP drivers less than a year ago for these systems, now the various manufacturers basically say "Fuck you" if you ask them for help (some say it more politely than others) and leave you to sort it out yourselves. I got an HP laptop recently. Brand new. Had Vista on it. I tried it. After 20 minutes I was tearing my hair out with, among other things, the pathetic hand holding masquerading as security, so I dug out my XP disk.

    It took me SIX HOURS to find drivers that had everything working. (And another few to refine driver versions to make stuff work WELL.) That's just the core stuff as well. Wireless, graphics, sound etc... Little things, like the fingerprint lock thing, I've never found drivers for. It is an absolute nightmare to get drivers for new systems these days, especially laptops. Basically you're relying on other peoples experiences, experimentation and message board postings to find stuff that works. You just have to hope that someone before you has gotten your model sorted.

    Worst by FAR was the nVidia drivers for the graphics. Almost NONE work. Even hacked ones I found to support a wider variety of chipsets. (I must have had to reboot with the "use previous known good configuration" god knows how many times.) I must have tried 20 different sets of drivers before finding the one set that would actually work! (When I have issues with games now and folk immediately say "upgrade your graphics drivers" I just sit and weep in the corner muttering "the horror... the horror" quietly to myself.)

    Hardly a surprise most people are content to leave it at that given "upgrading" to XP has been made so treacherous and complicated.

  • by Sancho ( 17056 ) * on Wednesday July 30, 2008 @06:08PM (#24409371) Homepage

    Does TrueCrypt enforce a chain of trust down to the hardware?

    I believe it does. You can load any OS you want or put the disk in another machine and still not be able to decrypt the "hidden" partition, even if you know of its existence.

    You misunderstood the question. TPM and full disk encryption, used in this way, ensures that every piece of software from the bootloader on up is either considered trusted or not. It starts this chain of trust in the hardware, which is considered much harder to trojan than software (like the bootloader or OS.)

    Put another way, TPM conceivably protects you from software keyloggers by verifying the signature of the bootloader, the OS loader, and the OS itself before allowing you to decrypt your data. If anything in the chain has been modified, it won't release the keys, thus protecting your data. Unless Truecrypt interfaces with TPM, merely knowing the key is enough to decrypt the data, regardless of the computer that you put the disk in. Truecrypt adds a layer of deniability, but that's not the same thing.

  • by init100 ( 915886 ) on Wednesday July 30, 2008 @06:14PM (#24409441)

    Windows allows multi-OS booting; yes, even Vista allows it. You just have to know how to do it; just like any dual boot scenario.

    False. Your solution requires hackery, while many Linux distros together with most things except Vista takes care of setting up dual-boot during the installation process.

  • by Anonymous Coward on Wednesday July 30, 2008 @06:22PM (#24409539)

    No, they do. I think a lot of people here misunderstand what TPM is meant to actually do and what it's supposed to be good for; and what it is useless for. (Frankly, I'm not sure Microsoft fully understood.)

    It's because the MBR has *changed* that means the chain isn't signed with something that will allow the system state register to authenticate with the TPM key storage; the register contents will have changed because the SHA-1 fingerprints changed, so you're not going to be able to get a coherent response from the TPM regarding any keys you've stored in it if you've taken ownership already. Without resetting the token and destroying the keys, that is.

    You want another way of doing this? Don't take ownership of the TPM to store the keys, but put 'em on a thumbdrive and use a secure passphrase (10 word Diceware, for example) to unlock them; this is also a supported mode of operation under BitLocker (assuming you trust the Elephant diffuser as being part of a reasonable cipher mode; frankly, I'm not that happy with it and prefer OCB or XTS modes, or failing that Linux's aes-cbc-essiv:sha256)... doing it the "thumbdrive way" is highly recommended when a TPM isn't available or wanted. Putting the hard disk encryption keys in the TPM isn't necessarily a good idea; they are recoverable given some effort, and that's not really what the TPM tech is for.

    This is all entirely by design; it's closing an actual security hole whereby a trojaned MBR could capture your encryption keys. Obviously this is unsuitable for any dual-booting setup. TPM just isn't designed to work with that kind of scenario; it's really more of a system for verifying extremely stable system images such as you might find on a server or tightly-controlled corporate workstation that you want to be able to have a reasonable degree of confidence hasn't had the MBR tampered with because it's a trusted client that handles classified data (and any tampering with the software whatsoever would decertify it).

    You control the chain of trust when you take ownership of the TPM; they do work just fine with Linux, and Linux does have support for them - if you want to know and prove to another system that the bootloader, BIOS, and kernel haven't changed since the state you knew was good, you can do that (although the proof is only as good as the integrity of the TPM).

    They're just hardware tokens coupled with a signed BIOS/bootloader/kernel, really. Handling the actual key management that results from that, or what you do with it, is entirely up to you.

    Vista using the TPM for BitLocker is hardly plug-and-play, and quite unsuitable for many scenarios (many TPMs out there don't even support TCG1.2); there's always TrueCrypt or PGP Whole Disk Encryption or one of the many other solutions available if you want a little more flexibility and control.

    In particular, it's not really about DRM. None of the DRM systems proposed or deployed have ever used it, or are likely to ever use any part of it, as a key storage blackbox, because an entirely homogeneous image just isn't something you can guarantee on any consumer box (that's one reason it's not even on or in the vast majority of OEM and consumer motherboards/chips). It's perhaps a bit more practical for laptops...

    Also, TPM implementations are quite breakable where the attacker has physical access and ownership of the machine and plenty of time. PCs aren't even consoles, and look what we've done to those...

    It's meant to be one interlocking part of a whole enterprise security solution. It sure as heck isn't a "magic crypto chip" that will lock up your PC, and it shares none of the common criteria with DRM scenarios (which are, of course, just as doomed if they use a hardware blackbox as if they use a software blackbox, because the plaintext is always available...). In fact, having a TPM around if you're running Linux, will at least make sure you always have a secure entropy source for /dev/random...

  • Re:But what if... (Score:4, Informative)

    by gparent ( 1242548 ) on Wednesday July 30, 2008 @06:36PM (#24409727)
    Informative has the benefit of generating a "Why is this informative!" post, which leads to people replying "Informative gives Karma but Funny doesn't. Therefore, people who appreciate the post and wish to give the user some karma will choose Informative." and getting rated Informative, which generates Karma itself.

    It's kind of a huge karma circleje-..dependency.
  • Re:But what if... (Score:5, Informative)

    by Oktober Sunset ( 838224 ) <sdpage103@ y a h o o . c o.uk> on Wednesday July 30, 2008 @06:53PM (#24409875)
    Too right, I just modded it informative too, and your post as well, so your ka... oh wait. whoops.
  • Re:But what if... (Score:5, Informative)

    by Chris Burke ( 6130 ) on Wednesday July 30, 2008 @06:54PM (#24409889) Homepage

    Informative gives Karma but Funny doesn't. Therefore, people who appreciate the post and wish to give the user some karma will choose Informative.

    What I don't understand is why anyone would care... Slashdot Karma is competing with Kool-Aid Fun Points for score that has the least impact on my life.

  • Re:But what if... (Score:5, Informative)

    by Emperor Zombie ( 1082033 ) on Wednesday July 30, 2008 @06:55PM (#24409895)
    This should definitely be modded Informative.
  • Re:But what if... (Score:3, Informative)

    by gparent ( 1242548 ) on Wednesday July 30, 2008 @07:00PM (#24409965)
    I think the point is just to be nice :)
  • Re:But what if... (Score:0, Informative)

    by Anonymous Coward on Wednesday July 30, 2008 @07:00PM (#24409971)
    Prithee sirrah, thy archaism doth suck mightily.

    " Thou shalt devote thyself wholeheartedly to evil or to the good".

  • Re:But what if... (Score:4, Informative)

    by Von Helmet ( 727753 ) on Wednesday July 30, 2008 @07:02PM (#24409987)

    It's because what people are really saying is +1 satire./P

  • Re:But what if... (Score:5, Informative)

    by Chris Burke ( 6130 ) on Wednesday July 30, 2008 @07:08PM (#24410039) Homepage

    Oh, well heh, I think modding someone funny for being funny is nice enough for a little o' that real life karma. :)

  • Re:But what if... (Score:5, Informative)

    by Artuir ( 1226648 ) on Wednesday July 30, 2008 @07:14PM (#24410103)

    So "informative" is the new "funny"?

    Damn!

  • Re:why can i do it? (Score:2, Informative)

    by Anonymous Coward on Wednesday July 30, 2008 @07:27PM (#24410225)
    Because you don't have a TPM chip, I'd guess.
  • Re:But what if... (Score:4, Informative)

    by Digital Vomit ( 891734 ) on Wednesday July 30, 2008 @07:46PM (#24410423) Homepage Journal
    Oh no! You guys started an infinite Karma loop!
  • by Martin Blank ( 154261 ) on Wednesday July 30, 2008 @07:46PM (#24410425) Homepage Journal

    I have Vista Enterprise in a dual-boot laptop with TPM and grub as the primary boot loader, and SP1 installed without any problems at all, and never altered the boot loader. It's 64-bit Vista, which is typically even more stringent with the code checks than 32-bit.

    Were Microsoft not attaching it to a KB article, I'd have called it FUD, but I will say that I have not experienced it at all.

  • Re:But what if... (Score:2, Informative)

    by MrOctogon ( 865301 ) on Wednesday July 30, 2008 @08:00PM (#24410559)
    Why is this rated informative?
  • Re:How is this news? (Score:3, Informative)

    by initialE ( 758110 ) on Wednesday July 30, 2008 @08:55PM (#24410963)
    The scenario in question is a stolen laptop. Adequate physical security? Are you kidding me?
  • Re:But what if... (Score:5, Informative)

    by jcuervo ( 715139 ) <cuervo.slashdot@zerokarma.homeunix.org> on Wednesday July 30, 2008 @09:13PM (#24411155) Homepage Journal
    Uh. Mods are now definitely literally on crack. Not behaving in an incomprehensible and unpredictable manner, they are putting the pipe to their lips and inhaling the smoke from burning crack cocaine.
  • Re:Vista and Mac OS? (Score:4, Informative)

    by Mad Merlin ( 837387 ) on Wednesday July 30, 2008 @09:43PM (#24411337) Homepage

    Respectively... No. Yes. No. Maybe.

  • by jasonditz ( 597385 ) on Wednesday July 30, 2008 @10:14PM (#24411531) Homepage
    How many Vista Enterprise or Ultimate users really dual boot? Since this article is dated four months ago and this is the first we're hearing about it, I'm guessing not many.
  • Re:But what if... (Score:3, Informative)

    by Beat The Odds ( 1109173 ) on Wednesday July 30, 2008 @11:28PM (#24411973)
    We need a new category called Infunmative....
  • Re:But what if... (Score:4, Informative)

    by ucblockhead ( 63650 ) on Wednesday July 30, 2008 @11:50PM (#24412083) Homepage Journal

    Dear sir, if you find my posts funny, please mark them funny so that I know you got the joke and don't think you got confused and took me serious.

    I don't give a fuck about karma. Anyone willing to make the effort can have theirs pegged at the cap if they wanted, anyway. (Karma whores don't deserve it, and those that don't care about karma and just post things that are interesting and informative are always at the cap anyway.)

  • No problems here... (Score:2, Informative)

    by mizkitty ( 786078 ) on Thursday July 31, 2008 @01:04AM (#24412477)
    I have a dual-boot setup with Ubuntu 8.04 and Vista Ultimate. Linux was loaded first then Vista with the bootloader replaced with EasyBCD v1.72 from NeoSmart. Service Pack 1 installed w/o any problems at all.
  • by Alsee ( 515537 ) on Thursday July 31, 2008 @01:38AM (#24412637) Homepage

    This *may* be a corner case as most TPM's were shipped in the disabled state back when XP was still shipping.

    I wrote the summary.

    Service Pack 1 refuses to install, even if you are not running BitLocker.
    Service Pack 1 refuses to install, even if the TPM is in a disabled state.
    Service Pack 1 refuses to install, even if you you do not have a TPM.
    If you are running a Windows version with support for the Trust system at all - currently Vista Enterprise and Vista Ultimate - then the service pack sees the install is going to invalidate the Trust chain, will cause the lock you out of and and all keys of this sort. Not merely your BitLocker keys, but your keys to any other existing or future software which activates this Trust system. Right now that pretty much just means BitLocker - but applying the service pack can and will result in the Trust chip nuking any and all software built on this Trusted system.

    Trusted Computing was intended to be a fully implemented "feature" of Vista, but dropped in the massive feature cuts. If/when Microsoft resumes and fully implements that plan in Windows 7 or whatever, then there isn't much possibility for any workaround. You won't be able to install/run service packs at all, you won't be able to install/run core elements of the operating systems at all, if you have any such unapproved modifications. If Trusted Computing is implemented as they planned, it becomes a strict either-or situation. Either you run an unmodified Trusted Windows install exactly as Microsoft dictates and locked in Microsoft handcuffs, or you can run what you like while absolutely you are locked out of Windows and locked out of any of your own data secured under the Windows Trust system.

    -

  • Worked for me.... (Score:3, Informative)

    by rklrkl ( 554527 ) on Thursday July 31, 2008 @03:21AM (#24413177) Homepage
    I multi-boot with several 64-bit Linux distros and 64-bit Ultimate Vista on a Dell Vostro 400 I bought back in February (does this have the TPM stuff?). Grub is installed on the MBR and I don't have BitLocker enabled in Vista (why would I - can't read the disks in Linux if I did!). I installed Vista SP1 when it came out and had absolutely no problems (I may have had to re-install GRUB on the MBR, but I do that so often that I consider it no big deal). So am I the odd one out?
  • Re:How is this news? (Score:5, Informative)

    by Alsee ( 515537 ) on Thursday July 31, 2008 @03:29AM (#24413221) Homepage

    First, note that Iam the story submitter.
    Second, and more important, note that I am a programmer and have I read the Trusted Platform Module technical specification from cover to cover. The 332 page technical spec.

    The goal is to allow you to trust that your computer has not been compromised by a third party

    Demonstrably incorrect. That is NOT the fundamental design criteria of the Trust chip.
    You could get all of that functionality from a virtually identical design that did not secure the computer AGAINST the owner. If you are up for the technical details, you could for example have an identical chip with identical capabilities, except that you permit the owner to get a printed copy of his PrivEK when he buys the system. That alone would be minimally sufficient to grant the owner ultimate control of his system, but for technical reasons the chip should also have the capability to export the RootStorageKey encrypted to the PrivEK, as this makes things massively simpler benefiting security.

    I forget the page number, but at one point somewhere in the latter half, the technical spec EXPLICITLY refers to the the owner as an "attacker". The specification explicitly details the measures that must be taken to secure the system AGAINST THE OWNER.

    AGAINST
    THE
    OWNER.

    Q.E.D. The fact that the technical specification for the chip repeatedly places the HIGHEST PRIORITY of forbidding the owner to ever obtain his own key (which would provide him ultimate control of his own computer) demonstrates that in fact the purpose of the design is to secure the computer against the owner. As the grandparent put it:
    Trusted computing is all about allowing vendors like microsoft to trust the computer to work in thier partners interests rather than the users.

    Of course, if you pour concrete over my house and take other insane measures to lock me out of my own home, yeah.... that does also incidentally have the effect of keeping other people out of my home too. The point here is that the owner is denied the key to his own house. Trying to advertise that as a security system securing the home FOR the owner is obviously a comically bogus argument.

    -

  • Re:Affects crack? (Score:3, Informative)

    by 0xygen ( 595606 ) on Thursday July 31, 2008 @03:59AM (#24413321)

    I believe the whole point of the TPM chip is that it performs the checking before we gain control.

    If the checks pass, the TPM key is then "available" for that boot.

    If the checks fail, the TPM key is locked away.

    I wholeheartedly agree with the "why would you want to run Vista" comment though!

    For me, the only reason is PC gaming, but manufacturer support is currently still good for XP, and the DX9 vs DX10 difference is small.

    Come DX11, things may change, but that's ages away.

  • Re:But what if... (Score:3, Informative)

    by Chris Mattern ( 191822 ) on Thursday July 31, 2008 @05:05AM (#24413623)

    Informative gives Karma but Funny doesn't. Therefore, people who appreciate the post and wish to give the user some karma will choose Informative.

    People who appreciate the post and don't really understand the rating system, that is. The correct way to deal with this is to rate the post "Underrated". This gives the poster karma without hanging any new (and inappropriate) tag on the post.

  • Re:But what if... (Score:5, Informative)

    by Doug Neal ( 195160 ) on Thursday July 31, 2008 @05:06AM (#24413625)

    Uh. Mods are now definitely literally on crack. Not behaving in an incomprehensible and unpredictable manner, they are putting the pipe to their lips and inhaling the smoke from burning crack cocaine.

    Name a better way to spend a Thursday morning with mod points in your account!

  • Re:But what if... (Score:4, Informative)

    by MindKata ( 957167 ) on Thursday July 31, 2008 @06:36AM (#24414019) Journal
    "intentional way of censoring what somebody considers a really sensitive topic"

    I've also suspected this is possible a number of times. Companies like Sony, for example, have been shown up for using such tactics as Gorilla Marketing, to get their message across and employing bloggers to appear to be independent reviewers, when in fact they are working as part of an organized PR campaign So its well within the concepts of Gorilla Marketing style behavior to work to manipulate popular forum discussions. I wouldn't be at all surprised if many big companies and even some governments could be playing these same disinformation style games. Its interesting how manipulations to the Wikipedia have been detected and proven to be occurring. Forum style discussions need some way to detect organized disinformation/manipulation campaigns, but that's not going to be so easy to detect, but over time, at least more people are becoming aware of these disinformation games.
  • Re:But what if... (Score:4, Informative)

    by makomk ( 752139 ) on Thursday July 31, 2008 @07:35AM (#24414245) Journal
    The nasty thing isn't that Funny doesn't give karma, it's that Overrated and other downmods still take away karma on a post marked as Funny. So, if a post gets moderated up to +5 Funny, then gets two Overrated downmods, the poster loses karma overall. Over time, this can eat away at someone's karma, especially if they're writing a lot of humorous posts that don't go down well with everyone.
  • Re:Vista and Mac OS? (Score:3, Informative)

    by wolrahnaes ( 632574 ) <seanNO@SPAMseanharlow.info> on Thursday July 31, 2008 @10:06AM (#24416003) Homepage Journal

    Is EFI planned to replace BIOS in the non-mac world?

    If you ask Intel, yes. If you ask the rest of the world, meh. I don't think anyone would argue that BIOS should stay, it's a crusty old POS that's been hacked on top of hacks over the years to keep supporting new things, but what should replace it is very debatable.

    Can Linux bootloaders and whatnot play nicely with EFI?

    http://sourceforge.net/projects/elilo/ [sourceforge.net]
    http://refit.sourceforge.net/ [sourceforge.net]

    The former is a Linux-focused bootloader for all EFI platforms, rEFIt is a generic loader built with Intel Macs in mind. I have no idea if it can run on other EFI platforms.

    Heck, can Windows?

    Yes and no. Windows has had an EFI loader for a few years now, as it's required for Itanium. That was finally brought to normal processors with Server 2008 and Vista SP1, x64 only. So if you're 32 bit or running anything but the latest versions of Windows, you're stuck with the BIOS.

    If so, can one even BUY a motherboard that uses EFI? As I'm planning to build a system on which I can (hopefully) run both windows and linux, I'd like to try to avoid the whole MBR shenanigans.

    It seems MSI is shipping a MB they call "EFINITY" and a few OEMs supposedly have started using EFI on their custom boards, but in the non-Mac x86 world it's still pretty rare.

  • by js_sebastian ( 946118 ) on Thursday July 31, 2008 @11:52AM (#24418001)

    I'm failing to see why this is a big deal. Software is in place to check for a piece of third party code intercepting your encryption key... It successfully detects GRUB as such software, and stops. So what?

    This is a flaw of the trusted computing architecture. If the partition of the trusted OS (Vista) is encrypted, Multiboot does not break trust, because the other OS cannot decrypt the partition. But in trusted computing, if an untrusted bootloader loads a trusted OS the chain of trust is broken.
     
      If trusted computing were designed with the user's interest in mind, the user would be able to decide that the bootloader he is using (grub) is trusted, sign it with a key which enables that bootloader only on his computer, and get on with his life. But now we have to wait for Microsoft to implement and sign a real bootloader... good luck with that.

One man's constant is another man's variable. -- A.J. Perlis

Working...