Intel Planning To End Legacy BIOS Support By 2020, Report Says (phoronix.com) 122
Michael Larabel, writing for Phoronix: Intel is planning to end "legacy BIOS" support in their new platforms by 2020 in requiring UEFI Class 3 or higher. Making rounds this weekend is a slide deck from the recent UEFI Plugfest. Brian Richardson of Intel talked about the "last mile" barriers to removing legacy BIOS support from systems. By 2020, they will be supporting no less than UEFI Class 3, which means only UEFI support and no more legacy BIOS or CSM compatibility support mode. But that's not going to force on UEFI Secure Boot unconditionally: Secure Boot enabled is considered UEFI Class 3+. Intel hasn't removed legacy BIOS / CSM support yet due to many customers' software packages still relying upon legacy BIOS, among other reasons. Removing the legacy BIOS support will mitigate some security risks, needs less validation by vendors, allows for supporting more modern technologies, etc.
Coreboot (Score:1)
Hopefully Coreboot will be more widespread by then and UEFI can just be a compatibility layer on top of Coreboot.
Re: (Score:2)
Intel is not stupid. They certainly don't want to lose the server market, and this is basically what would happen.
Re: (Score:1)
Unless systemd does it first.
Re:Coreboot (Score:5, Funny)
You should stick to secure MINIX, as Intel intended.
Re: (Score:2)
Apple only patches the last few versions of macOS and the latest versions of macOS require new hardware.
You can only rely on Apple for security patches for a few years, after that you're considered a non-paying customer.
Re: (Score:2)
latest versions of macOS require new hardware.
What is your definition of "new hardware"? The latest OS runs on my late-2008 MacBook Pro. That it works at all is a wonder - it owes me nothing.
Re: (Score:2)
Are you sure you're on the latest release? Neither Sierra nor High Sierra list support for any Macbook Pro before mid-2010.
https://support.apple.com/en-u... [apple.com]
Re: (Score:2)
Re: (Score:2)
I'm on a Hackintosh and I'll never upgrade to Sierra, because I'll lose Final Cut Pro permanently and probably Adobe Creative Suite too. They ave done far too many backward-compatibility breaking changes over the years.
Re: Coreboot (Score:2)
This isnâ(TM)t quite true. My Late 2007 MacBook Pro recieved the 2017-0004 security update recently.
Re: (Score:1)
Hopefully Coreboot will be more widespread by then and UEFI can just be a compatibility layer on top of Coreboot.
FYI: https://eshop.macsales.com/gui... [macsales.com] Plue Safari /Security, URFI and major Apps back to Lion (10.7.x) 64 bit
Force secure boot on unconditionally? (Score:5, Insightful)
As long as the user can always install their own platform key, so they retain ultimate control of their own computer, then this isn't such a big deal. But there needs to be a standardised interface for installing platform keys in the UEFI settings.
Re: (Score:1)
That's not even required in EFI Class 3, per the article:
that's not going to force on UEFI Secure Boot unconditionally: Secure Boot enabled is considered UEFI Class 3+.
Re:Force secure boot on unconditionally? (Score:5, Insightful)
Well, one, SecureBoot is not mandated. Been UEFI booting since before SecureBoot existed.
Two, *if* it were mandated, using UEFI settings menu interactively isn't going to cut it, as large deployments need less manual attention. Some automation friendly mechanism is needed. The challenge being that it's hard to make an automation friendly capability that isn't also malware friendly.
I would have liked the mechanism to ship unlocked until an OS vendor installs, which would then have optionally locked the platform to that vendors or enduser keys. But instead we get the joy of Microsoft's keys being the arbiter of the whole SecureBoot platform.
Re:Force secure boot on unconditionally? (Score:5, Insightful)
Looks like a false dichotomy to me. Why can't they make chipsets/motherboards that allow me to change UEFI settings (incl. installing my own keys for secure boot or switching it off) and switch off/on Intel ME by flipping physical switches, while at the same time offering chipsets/motherboards with less secure, but corporate-friendly automated mechanisms?
My guess is that they don't want to allow the first option because someone asked them not to allow it. In fact, I have no other explanation. Adding two jumpers and adjusting the firmware in an appropriate way doesn't seem like a major price point or technical obstacle that Intel just can't afford or solve.
Re:Force secure boot on unconditionally? (Score:4, Funny)
installing my own keys.....by flipping physical switches
You want to have 2048 dip switches for entering your secure boot key? I'd rather use a GUI for that.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
There's a solution to that: When the DIP switch is flipped, everything gets completely erased before any access to the key-loading utility is allowed. It's already done that way on some brands of ethernet switches... you can always bring the switch back to baseline if you forgot the password, but if you set it up in this certain mode, doing so erases all your keys and configuration (though I doubt it is actually very secure to a JTAG case intruder).
So, that reduces the problem to: someone who can flip a d
Re: (Score:2)
Well SecureBoot and TPM don't really relate.
SecureBoot merely validates that the OS booting is 'a' legitimate OS (for some value of legitimate). For the most part it means 'microsoft thinks this isn't malware'.
TPM gets into more specifics, and even it explicitly has the concept of physical presence as a way to 'recover' things.
However, a best practice there is for you to have an encrypted volume, with the keys sealed to TPM PCRs. Any TPM 'recovery' will make that sealed copy forever unrecoverable. So som
Re: (Score:2)
I would have liked the mechanism to ship unlocked until an OS vendor installs, which would then have optionally locked the platform to that vendors or enduser keys. But instead we get the joy of Microsoft's keys being the arbiter of the whole SecureBoot platform.
The latter is the result of implementing the former in a world where every computer is sold with a Microsoft OS. You got what you want, it just wasn't thought through.
Re: (Score:2)
In consumer market, true, and there the mandatory 'replace key using firmware config menu' is passable.
In business market, it is exceedingly common to ship computers without OS image and the business receiving is responsible for OS load choice, which is where scalable automation is critical.
Re: (Score:2)
Indeed, and in that market it is even more common to find Windows, hence it makes sense that the Windows key is preloaded.
Re: (Score:2, Insightful)
Re: (Score:2)
That's fine... the OS can be written to disallow an arbitrary user from being able to access the interface via software. Root or admin user should still be able freely use the API as it is designed.
If an otherwise unauthorized person somehow gets root/admin privileges, then... well... you were boned already.
Re: (Score:2)
But there needs to be a standardised interface for installing platform keys in the UEFI settings.
There already is. If your board supports it, and if secure boot is in setup mode, then efi-updatevar can write UEFI secure boot keys. (Mine doesn't, I have to use the UEFI menu to replace keys.)
The process of enabling secure boot for self-signed kernels is not for the faint of heart but it can be done. [gentoo.org]
From the motherboard (Score:3)
I doubt this would prevent someone from running a BIOS emulation layer through an EFI boot loader, just removing it from the EFI firmware. Can anyone confirm?
Re: (Score:2)
Note that usually BIOS boot is a BIOS emulation layer ('CSM') hosted in the firmware.
The usual approach has been that Intel reference platform included that emulation. Moving forward, they plan not to, however system vendors may opt to include it of their own volition.
Of course, in order to suspend UEFI runtime services, the UEFI would have to cooperate, so emulating BIOS without the cooperation of the firmware platform would be pointless, since you have the relatively small downsides of UEFI without the u
Redhat 5 (2007) and maybe RHEL4 too (Score:2)
I believe Redhat 5 (from 2007) had EFI support, and a quick Google search suggests people booted RHEL4 from EFI, but I don't know if that involved any hacks.
Re: From the motherboard (Score:1)
Hell, Intel could do this today with their MIMIX in the north bridge. Whole system boots clean and secure. BIOS comparability is an add on module to MINIX. Hell, they can (and do) be a hyper visor. So Linux and windows and the rest of the OSes can run side by side out the door.
As one who works at a vendor.... (Score:5, Interesting)
Intel has set deadlines for the death of BIOS and they came and passed and there was still BIOS.
This time they seem a bit more serious about it, but the UEFI vendors are planning to continue allowing CSM so long as they have customers.
Intel NICs may stop providing BIOS boot roms, new Intel storage devices may be only UEFI bootable. It will get harder and harder and more and more cases will require UEFI boot.
UEFI boot has gotten pretty normalized, it's a bit weird to formalize vfat as a required portion of the standard, but it is better than the MBR approach. UEFI runtime services are not as good as they should have been, but they do however take some memory away from the OS that BIOS and BIOS style boot of UEFI did not have to reserve.
Re:As one who works at a vendor.... (Score:5, Informative)
Low memory is also significantly less important on a UEFI system, because it boots straight into protected mode. Eventually, Intel will completely do away with trappings like v86 mode and pals, because they wont really be needed or useful, and will just be gobbling up die space.
What complicates intel's master plan, is that DOS (especially since the freedos project is very mature and has no licensing fees) is a very approachable target for many applications even in the modern era (Many things, from airport metal detectors to vinyl cutters, to industrial robots and pals), and that requires BIOS to operate. That you do not need to lug around a huge OS stack (DOS lives comfortably in less than 1mb of RAM), and dont have to contend with hundreds of multitasking processes (So your single task-oriented solution does not end up competing for resources or hardware events, because it is operating at realtime instead of time slices or having to wait for spin locks to disengage, etc) makes DOS a very approachable platform even today.
Intel just does not like that. It sees UEFI and their management processor security device model being the future in modern computing, and much like AMD, probably will only give up the keys to the management engine's castle after the vandals storm the place. (Meaning CoreBoot and pals will have to find ways to smash down the custom minix's doors and take over by force to overcome the designed security features of the processor, and hand them over to proper user control.) This is because the premise of the technology defacto asserts that the end user is not capable of being trusted with the security of the platform, and that only trusted persons or entities (orgs) can be vested with that responsibility. (This is at odds with GNU's philosophy.) Intel has many deep-pocketed orgs demanding this level of digital lordship, (microsoft *AND* apple being among the big ones), so the money is in giving the big pocketed groups what they want, which is mutually exclusive to projects like coreboot.
Re: (Score:3)
Eventually, Intel will completely do away with trappings like v86 mode and pals, because they wont really be needed or useful, and will just be gobbling up die space.
I'd be very surprised if they weren't entirely microcode today. Who cares if every real mode instruction takes 10 cycles to complete - no customers large enough to care about have performance critical real-mode code, and the few that do are probably happy if it's a few thousand times faster than their 80286. If it's in microcode, it's taking a trivial amount of die space and none in performance-critical parts.
Re: (Score:2)
Isn't the bigger question "When will virtualization vendors stop supporting it?"
It almost doesn't matter as long as the major virtualization platforms continue to support BIOS boot. Supporting older software on new hardware has long been a strength of virtualization.
As expected... (Score:3, Insightful)
Deliberately limiting customer choice and putting the machine that much closer to just being outright owned by the manufacturer, no matter who paid for it.
And as per usual, it's in the name of "security." The current UEFI standard means that the manufacturer doesn't have to let you add boot signature keys to the firmware, either. While there will be machines that can bypass this "upgrade," they'll be sure to slowly be priced sky high.
Let's see how long it takes Microsoft to try to cram Windows 10 S down all our throats and choke out any programs they can't control, and pay off the manufactures not to include facilities to add keys by end users except for an ever-increasingly expensive high end. After that, who knows what they'll try to force you into? They've already been talking about forbidding users from accessing websites they don't like. Or the "anti-cheating" features they're adding? You'll be able to turn them off... just like you could turn off UEFI secure boot, in the beginning.
Windows 10 S anti trust and eu browser choice iss (Score:2)
Windows 10 S has antitrust and eu browser choice issues. and no Linux on windows 10 s as well.
Re: (Score:2)
so I Have to reflash my SAS cards to uefi mode? (Score:1)
so I Have to reflash my SAS cards to uefi mode? why do I really need a full GUI for a server that's only vga out is used for the impi card?
Completely Untrue (Score:4, Insightful)
'Removing the legacy BIOS support will mitigate some security risks, needs less validation by vendors, allows for supporting more modern technologies,
Don't twist the wording - tell the truth.
Last time I looked I have NEVER seen a bios attack, excluding published NSA exploits.
The correct wording would be obsoleting older devices and pathways that support unconditional video decoding, and preventing other means to turn off underhanded telemetry and back door audits.
UEFI has plenty of proven security risks including a back door management interface that cannot be turned off. UEFI is flawed by design, and is pandering to Hollywood generally.
The sad thing is that Raspberry Pi or similar will soon be capable of 4K video processing, as are some streaming boxes now, so Hollywood has already lost out to sub $80 boxes.
Re:Completely Untrue (Score:5, Informative)
Last time I looked I have NEVER seen a bios attack
Found a millennial. Those of us with a few more grey hairs on our beards remember BIOS modifying related malware basically showing up as one of the originals during the birth of PC malware.
That's to say nothing of the fact you've had your eyes closed to multiple cases over the past few years, to say nothing of the several that have been discussed on Slashdot in the past.
Re: (Score:1)
Hardly a discerning statement for millennials. A BIOS that has a physical switch to prevent reflashing is difficult to attack, put not impossible. Non-volatile memory used for configuration is a potential vector, but would likely need to be specific to BIOS vendor and version. In the case that a physical control is not present, or just left on, malware could, after gaining a privilege execution level attempt to replace or patch the BIOS.
Re: (Score:2)
UEFI is flawed by design, and is pandering to Hollywood generally.
Give it a few days. Someone will step forward and #metoo accuse UEFI of sexually harassing them, then UEFI will be axed.
ok now force Vendor to give you impi bios updates (Score:3)
ok now force Vendor to give you impi bios updates with out needing to buy an addon key to unlock that.
Walled garden for bootloaders? (Score:2)
Does this mean that from now on, just like apps on a mac, everything we run during boot time has to be signed by a corporate?
Re: (Score:2)
There's a lot of it around.
Re: (Score:2)
I run unsigned apps on my mac, literally every day.
Re: (Score:2)
Shit, I meant unhacked iphone :(
Mere Mortal question (Score:4, Interesting)
References?
Re: (Score:2)
The short version is that now all your new computers will be capable of contracting viruses that you can't get rid of just by reformatting all drives and reinstalling your OS.
Will Google end Intel support? (Score:2, Funny)
Replace Your Exploit-Ridden Firmware with Linux [youtube.com]
Google has already been thinking about switching to POWER chips [fool.com]. Maybe this UEFI thing will be the final push they need?
End 16 bit real mode mode? (Score:2)
Re: (Score:2)
Even Windows 10 32-bit edition will still run 16-bit Windows 3.1 Applications. So as long as people install the 32-bit edition of Windows 10, the processor will need to have 16-bit support.
Re: (Score:2)
Re: (Score:2)
It runs the same instructions directly on the CPU, but Windows implements the DOS system interrupts differently.
If it was a virtual machine environment, then 16-bit apps would work on 64-bit Windows. They don't.
Re: (Score:2)
Re: (Score:2)
Re: (Score:1)
As per the Intel 64 and IA-32 Architectures Software Developer's Manual [intel.com] on page 8-20 in Volume 3A, the boot processor comes up in real mode and begins executing whatever is in memory at 0xFFFF_FFF0h. On step 8 out of 15 it switches the processor into protected mode.
Re: (Score:2)
My understanding is that with EFI, the processor never enters real mode, and initializes directly in protected mode.
All current x86/x64 chips start in real mode. So EFI has to make a switch to protected mode with long mode enabled.
However Intel has sold chips which boot up in protected mode in the past. E.g.
https://en.wikipedia.org/wiki/... [wikipedia.org]
The Intel 80376, introduced January 16, 1989, was a variant of the Intel 80386SX intended for embedded systems. It differed from the 80386 in not supporting real mode (the processor booted directly into protected mode) and having no support for paging in the MMU. The 376 was available at 16 or 20 MHz.
Of course so long as the PC standard includes the Bios, such a chip can't be PC compatible. Actually the 376 is a perhaps a bad example because it didn't have an MMU. However suppose you had a legacy free x64 chip which booted up in long mode and didn't support real mode. Such a devic
UEFI has been proven to no be that secure (Score:1)
https://threatpost.com/cert-wa... [threatpost.com]
It would be nice if computer har
Why does it matter? (Score:5, Insightful)
BIOS and EFI should only hand the boot loader an bit of RAM and boot image and enough extra stuff to load anther few megabytes off the boot source. I don't care if you call the BIOS something else like UEFI . Everything else should be up to the boot loader and the OS. I don't need the BIOS (or its successors) to test all the memory, just the 1st gig or so. If it is booting off disk, I don't need it to know about the network. I don't need it to know about the video or even the keyboard unless there is a problem. I only need it to know about NVE if I'm booting off that. The OS should rescan all the hardware and ignore anything provided by the BIOS.
Excessively complicated BIOS is a security risk not matter what it is called.
Re: (Score:2)
Re: (Score:2)
I would care if I still ran DOS, or a Windows booted from DOS. Otherwise, there's just no reason to give a damn.
Coinciding with the Windows 7 EOL (Score:1)
This will stop 7 users which already don't get supported updates anymore. This will continue 10's spyware regime with the alternatives being $ystemD infected Linux, obscure BSDs or having to go to Macs or Chromebooks, which won't have the games and business apps. Otherwise people will have to use old hardware which will go up in price.
Captcha: hooked.
There's a lesson here (Score:2)
Intel UEFI (Score:1)
Re: (Score:2)
Pure 64? Ever? (Score:3)
How about dropping everything except 64 bit mode. Boot straight to 64 bit, no turning back, no legacy, no compability?
How many CPUs actually ever run anything than 64 bit today?
(I do understand many windows desktops do, but apart from that: servers, linux computers, chromebooks should never need anything less than 64 bit mode)
Re: (Score:2)
I agree. Especially since x64 is a much improved/changed instruction set compared to x86. It is probably not that much more expensive for Intel or AMD to deliver both 32/64 in the same chip, but it must come at some cost. I think Xeon processors, and ultra low end (made for Chromebooks), could benefit from 64-bit only.
For instruction sets like PPC where 32/64-bit were essentially the same its a different story.
Re: (Score:2)
My guess is that would, at the absolute soonest, would be sometime in 2025 for ending 32-bit support on Windows assuming that Windows 10 follows the same 10-year support cycle, and 32-bit Windows 10 is the last of the 32-bit line. That's as far as the desktop goes, things like embedded versions of Windows would likely still have support for at least several more years on top of that (heck, even embedded XP is still supported until 2019...)
Right now, the 32-bit Windows is what I call the compatibility Wind
The real problem (Score:2)
and give AMD the server market? (Score:4, Insightful)
and give AMD the server market?
shared USB bus for networking and disk limits (Score:2)
shared USB bus for networking and disk limits the over all use.
Re: (Score:2)
Indeed. I know one large financial institution that is moving to Linux and another one that is planning it. They both also have a small number of Windows application servers, and these cause a large part of the problems with the software-landscape.
Nobody serious runs anything mission-critical on Windows. It is either Linux, one of the free BSDs or a commercial Unix. Even on the mainframe it becomes more and more Linux, because it is easier to get developers for that than for traditional mainframe coding.
Int
Re: (Score:2)
Yeah! FreeBSD for the win!
Re: (Score:2)
Do people really run OS on iron still?
I always put virtualization OS on first, and then Install the OS on top. Yes, even when the Guest OS is the only one. Makes for moving to another hardware platform easy.
Re: (Score:2)
Short answer: yes. Long answer: there are many legacy applications that require the high transaction processing while maintaining near perfect accuracy like in banks.
That's a long answer? We really have become the twitter generation...
Re: (Score:2)
There are people who still run on big iron, i.e., mainframes.
Mainframes are resilient, fault tolerant, upgradable without downtime (many have hot-swapable RAM, CPUs, etc.), and in general fucking reliable.
Even with HA / fault tolerant VM systems, you're relying on communication between external systems to identify failure, recover/transition automatically, and rectify any data inconsistencies. For many transactional systems, that's a no go. Many systems use distributed databases, fault tolerant / HA VMs,