Microsoft Begins the First-Ever Secure Boot Certificate Swap Across Windows Ecosystem (windows.com) 91
Microsoft has begun automatically replacing the original Secure Boot security certificates on Windows devices through regular monthly updates, a necessary move given that the 15-year-old certificates first issued in 2011 are set to expire between late June and October 2026.
Secure Boot, which verifies that only trusted and digitally signed software runs before Windows loads, became a hardware requirement for Windows 11. A new batch of certificates was issued in 2023 and already ships on most PCs built since 2024; nearly all devices shipped in 2025 include them by default. Older hardware is now receiving the updated certificates through Windows Update, starting last month's KB5074109 release for Windows 11. Devices that don't receive the new certificates before expiration will still function but enter what Microsoft calls a "degraded security state," unable to receive future boot-level protections and potentially facing compatibility issues down the line.
Windows 10 users must enroll in Microsoft's paid Extended Security Updates program to get the new certificates. A small number of devices may also need a separate firmware update from their manufacturer before the Windows-delivered certificates can be applied.
Secure Boot, which verifies that only trusted and digitally signed software runs before Windows loads, became a hardware requirement for Windows 11. A new batch of certificates was issued in 2023 and already ships on most PCs built since 2024; nearly all devices shipped in 2025 include them by default. Older hardware is now receiving the updated certificates through Windows Update, starting last month's KB5074109 release for Windows 11. Devices that don't receive the new certificates before expiration will still function but enter what Microsoft calls a "degraded security state," unable to receive future boot-level protections and potentially facing compatibility issues down the line.
Windows 10 users must enroll in Microsoft's paid Extended Security Updates program to get the new certificates. A small number of devices may also need a separate firmware update from their manufacturer before the Windows-delivered certificates can be applied.
Re: (Score:3)
Re:certificates expiring..... (Score:5, Insightful)
I mean, maybe it will go fine, but it is current year Microsoft and
Well, that rules out anything from Microsoft ... (Score:1)
Re: (Score:2)
Nothing will be "bricked". You would simply have to reinstall the OS.
Re:certificates expiring..... (Score:5, Informative)
for a very large number of Windows users that's a distinction without a difference
Re: (Score:2)
You don't have to do anything. The certificate used to sign the boot process is expiring. That doesn't make your computer unbootable, it means you can't sign new boot certificates or update the revocation database. Actually reinstalling the OS may be a problem, but using your computer as normal is not.
Re: (Score:2)
Nothing will be "bricked". You would simply have to reinstall the OS.
How will your Aunt Carol "simply... reinstall the OS"?
Re: (Score:2)
It does not. Secure boot is entirely within the users control. At the most it may cause a boot failure and a quick google will direct any idiot to a solution.
Re: (Score:2)
To add to this, this certificate expiry issue will not cause computers to fail to boot. It will cause the inability to sign a new or changed boot process... something which only happens if the bootloader is changed by an OS update. Not only is nothing bricked, the end user is unlikely to notice anything changed.
Well normally they're dirtbags (Score:4, Interesting)
They love forcing customers do whatever microsoft wants because that's how they get off. This would have been a great way to force hardware upgrades at gunpoint. So it really makes you wonder, what's their real motive here.
Re: (Score:2)
I'm not sure what you mean. This policy doesn't differ from any other. Windows 10 devices on extended support contracts get a new cert. Windows 10 devices not on extended support contracts do not. It's no more or less of a forced upgrade than anything else Windows 10 vs 11 has been. Their motive hasn't changed.
Also it's not like anything becomes unbootable here. The issue is that if a bootload changes it can't be signed due to an expired certificate. But... if you're not getting upgrades for Windows 10, ..
Why not have people make their own keys? (Score:5, Insightful)
This is another example of absolute trust, instead of zero trust, something Microsoft seems to get wrong constantly.
Re:Why not have people make their own keys? (Score:5, Insightful)
Re: (Score:2)
Re: (Score:2)
I can see how Microsoft would prefer to make computers less safe. It's in their DNA.
Re: (Score:2)
Obligatory, FUCK the police.
Re: (Score:3)
The goal of "Secure Boot" is to ensure that Microsoft control your PC, not you. It's working as intended.
Re: (Score:2)
Re: (Score:2)
Secure boot is functionally useless if you're not using custom keys
That's a load of shit. Key signing practices have varying benefits. It's not binary. It's not secure vs not. Based on your own description precisely nothing on the internet is secure because certificates are signed by not you.
Yes signing your own key would be the most secure, but in practice it is only marginally more secure than trusting a third party (such as a third party that already has low level access to your system via pushed updates) to keep their keys under control.
Re: (Score:2)
Re: (Score:2)
Real security, real zero-trust, means you're absolutely prevented from being able to peak. It means you remove the reliance on faith, hope and belief. I know I'm sounding like Stallman right now, and I don't mean to, but the reality is some stupidly massive amount of daily everything is not secure. Even if you can make your own keys, are they actually trustworthy? Can you be sure that no other keys exist to bypass your keys?
I do consider this black and white, either you're secure or you're not. If it doesn't matter, that's fine, but with something like secure boot, where the entire purpose is unshaken validation with zero trust, you better bet I'm going to insist the keys are self-generated.
I wish the term "zero trust" would just go away. It is an oxymoron that only confuses people.
Re: (Score:2)
Re: (Score:2)
Again you used the word secure. Secure isn't a thing. It's a sliding scale. Secure Boot moves you along that scale, so does TLS, so does putting a password on your Windows PC, so does having a firewall.
None of this is perfect, your "real security" doesn't exist, but that doesn't make any of it functionally useless.
Re: (Score:2)
Re: (Score:2)
Re: (Score:2)
That's a load of shit. Key signing practices have varying benefits. It's not binary. It's not secure vs not. Based on your own description precisely nothing on the internet is secure because certificates are signed by not you.
It is hard to argue with the proposition nothing is secure without managing trust yourself. The Internet's system of global trust anchors exist to prevent MITM attacks on peers.
Yet anyone in a position to perform such an attack can easily (often for free) get any of those same anchors to provide them with the very keys required to persistently compromise those peers. The system is total madness. Here secure boot is such a massive house of cards security is effectively a fools errand.
Yes signing your own key would be the most secure, but in practice it is only marginally more secure than trusting a third party (such as a third party that already has low level access to your system via pushed updates) to keep their keys under control.
You are not just trus
Re: (Score:2)
"what Microsoft should do is walk the user through the enrolment of custom keys,"
The 90th percentile Slashdot user is not competent to enroll custom keys. Are you going to pay the support costs if that's foisted on normal people?
Re: (Score:2)
Re: (Score:2)
Secure Boot has been one of the most effective security tools that Microsoft has ever released. Before Secure Boot, it was common for malware to simple hook into low level drivers for IDE and SATA, so that even the OS couldn't see the malware on disk and it could install itself during the early part of the boot process. The only way to get rid of it was to boot a Linux CD with AV software, assuming your system was not encrypted, and of course that was way beyond most people.
Secure Boot put a stop to that, a
Re: (Score:2)
Nothing is Secure as Hardware Write Disabled (Score:2)
Re: (Score:2)
Let's be fair... They don't go to a landfill, they get shipped to India to be burned.
Re: (Score:2)
Bro, disabling write means disabling security patches and updates. Not very secure, is it?
Re: (Score:2)
Bro, disabling write means disabling security patches and updates. Not very secure, is it?
Wow! You really nailed them! It's almost like they should have said something, like, I don't know, maybe:
Want to update the OS, you flick the switch back to update to disable the write protect.
Re: (Score:3)
Re: Nothing is Secure as Hardware Write Disabled (Score:2)
This is how industrial PLCs handle it: with a physical key. Almost any time you hear about some "hack" of a PLC, the fine print says someone must leave the key turned to program.
Re: (Score:3)
This is exactly how I boot my computer.
In Windows I:
- Insert write-protected VeraCrypt recovery USB stick into USB
- Boot and hit F12
- Select the stick as the device to boot from, when VeraCrypt's recovery appears, I select to boot from the stick's copy of the EFI bootloader.
- Enter my Windows VeraCrypt partition password, and only when that processes can the bootloader even see my Windows drive, which can't really be tampered with because it's encrypted.
In Windows, the EFI bootloader doesn't change except i
Re: (Score:2)
I was saying this when UAC was a thing.
If you want me to do something to the OS, rather than to my user account, make me flick a switch to do it, which puts the computer in an entirely different mode.
Now the only virus that can infect my bootloader is one that I actively participate in installing.
Multi-user computer? The switch is a key.
Disable secure boot? (Score:5, Insightful)
Re: (Score:2)
Yes it's always an option. There's rarely a reason to enable it unless your workplace forces it on.
Re: (Score:1)
You got that completely backwards. There's no reason to disable it unless you're running an unsigned boot process (e.g. dual booting with Linux without bothering to setup secure boot, or regularly trying to boot systems from USB sticks). There's literally no downside to the end user and only increased security.
Re: (Score:2)
Indeed. It is basically worthless for security, all it does is cause problems.
Re: (Score:2)
Is that not an option on most hardware?
It is a *required* option of any BIOS on a device sold with Windows Hardware Certification (on x86). Microsoft does not enforce it for ARM devices. Even Microsoft first party devices like Surface Laptops allow you to disable secure boot.
Re: (Score:2)
I have MS own laptop, which was gifted to me, and it allows me to disable secure boot in BIOS settings. It gives me angry red banner with unlocked lock, but other than that it does not prevent booting. Is that not an option on most hardware?
Disabling secure boot is an option on most hardware, however, there are some applications/features that will not fully operate if secure boot is not enabled, and that includes some multi-player games.
Re: (Score:2)
and that includes some multi-player games.
I've ran into this, sucks so bad, I have to give in to this kind of crap for kids to play w/ their friends otherwise they get left out of friendships.
All this "security" isn't anything other than forced obsolescence. (in all its forms, from phones, etc)
Re: (Score:2)
All this "security" isn't anything other than forced obsolescence. (in all its forms, from phones, etc)
Yes. And DRM. Not made to help you or protect you.
Re: (Score:2)
If it takes forced obsolescence to protect idiots from themselves then maybe it's a good thing.
Re: (Score:1)
Re: (Score:2)
You also don't need to disable secure boot. The certificates are used to sign the bootloader. The system will continue to boot just fine, it just may have problems if something changes on the bootload, ... which won't happen because you aren't getting updates. And if you are getting updates one will give you a new certificate.
This is a nothing burger for the end user, other than their systems will have secure boot sitting in a somewhat compromised state.
Re: (Score:2)
Strictly speaking TPM hardware is not required for Windows 11 to install or operate, and secure boot isn't either. You just have to bypass/ignore all the warnings.
All this leaves you without secure boot as an added bonus, so no downsides.
Re: (Score:2)
Or you install and then turn TPM off.
The one place I have it on is on my teaching laptop, because I have exams and grades on there and hence BitLocker. But if BigBlueButton works (trying this semester), I can get off Teams and move that machine to Linux. I finally eliminated PowerPoint end of last year (LibreOffice and LaTeX for slides now).
Re: (Score:2)
All this leaves you without secure boot as an added bonus, so no downsides.
Yeah except no signed boot process, so possibility for reboot persistent malware, failure for some anti-cheat systems to work so some games don't work. Your Windows Hello key stored on device insecurely, the inability to apply automated full disk encryption...
The really stupid part about all of this is that there are no downsides to some part of this discussion. There are no downsides to having TPM and SecureBoot enabled. It does provide a meaningful benefit, and anything that actively uses it nefariously a
Re: (Score:2)
Battery went dead and the machine promptly forgot all the keys. Now I can fix that, but the average person can not.
Re: (Score:2)
In fact part of the Secure Boot standard is that it must be possible to disable it, and it must be possible to install your own Secure Boot keys.
Microsoft also made keys for signing Linux kernels available, if you want to use Secure Boot with that and with the default keys. Of course, you can use your own keys as well.
Bullshit (Score:5, Insightful)
Windows 10 users must enroll in Microsoft's paid Extended Security Updates program to get the new certificates.
Microsoft should be required to provide a certificate without any restriction. How many tens of millions of computers still run W10? Forcing people to enroll in something just to get a required update should be an automatic penalty.
Re: (Score:1)
lol we're waaayyy past that, big guy
Re: (Score:2)
It's a bit of a moot point. Systems that aren't receiving general OS updates wouldn't receive updated bootloaders anyhow. So they wouldn't need the updated certificates that allow for bootloaders signed after June 2026.
It gets a bit tautological, but only systems that are getting updates need updates.
Re: Bullshit (Score:2)
I think that your completely correct point is lost on most people. They don't realize that a signature is valid if the certificate was valid at the time of signing, not that the certificate must be valid for the life of the universe.
Re: (Score:2)
No one is forced to enrol in anything. Windows 10 is no longer secure. Simply disable secure boot in the BIOS and move on with your life. You're not getting anything running secure boot on a system which isn't receiving basic security updates anymore.
Re: (Score:2)
Actually I was wrong in my other post. Not only are you not forced to enrol in anything, you also don't need to disable secure boot. Nothing changes for the end user. Either you get updates, which updates the certs. Or you don't get updates, in which case there's nothing that would change the bootloader (which remains signed and bootable).
Secure boot is optional for all people affected and their systems will continue to boot just fine even with it on.
Re: (Score:2)
- A lot of corporate clients require certified/"blessed" stacks
- They have legacy software that doesn't support Windows 11 so they have to use Windows 10.
- Microsoft (Oracle/IBM/etc) sales staff figures out how much cost they'll tolerate before they move to something else
- They then charge you $0.01 below that.
When Y2K was a thing we still had some o.g. NT 3.x (I think 3.1) servers running. IT refused to update them
new way (Score:2)
New way to own a brick.
Linux distros work with Secure Boot (Score:2)
At least, they do NOW. Let's see if Microsoft breaks things for Linux as part of this update...
Re: (Score:2)
At least, they do NOW. Let's see if Microsoft breaks things for Linux as part of this update...
LInux (if your distro has fwupd installed and enabled to offer the update) has been offering to install some of the new certs for a while now.
At least one distro has had a test day to validate that it is possible to sign their boot loader with various combinations of the old/new keys. I expect additional testing across the Linux distro eco-system (as some hardware is just so interesting).
Many manufacturers (that still support your hardware) will be issuing new bios firmware that also include the newer
Re: (Score:2)
I have about 70 machines (Dell) I'll need to take care of. AlmaLinux supports fwupd, but for whatever reason (at least on my test box) fwupdmgr keeps telling me there's no available firmware, which is demonstrably incorrect. We do have a password set on the firmware, so I've been assuming that is the issue and I'm gonna need to visit every machine with a USB stick.
Re: (Score:2)
At least, they do NOW. Let's see if Microsoft breaks things for Linux as part of this update...
Your post is dumber than usual. This is literally the point Microsoft is making, they are updating the Microsoft UEFI CA cert which is used for example to sign Linux bootloaders, and the Key Exchange Key which allows modifying the database of allowed signatures to enable Linux secure boot.
Nothing else about the way Linux keys are signed changes. Nothing about secure boot allowing a user to use their own keys changes (Microsoft's only involvement in Linux is allowing Linux to boot with an MS shim, that's not
Re: Linux distros work with Secure Boot (Score:1)
Re: (Score:2)
You probably meant switching it on. CSM is the compatibility support module. Enabling this disables secure boot which for the purpose of installing Linux would allow you to boot any ol' bootable media. Once your system is installed one of two things happen, either you manually have to load the new Key Exchange Key and Cert into the UEFI, or the easier option (the one that many people will use, and anyone who is dual booting will be forced to use) is have the installer automatically load a Machine Operator K
Handy reminder! (Score:5, Funny)
That reminds me that I need to check the security system on my henhouse which ensures that _only_ foxes, and no other predator has 24h access.
Via Windows Update? (Score:2)
Or is it only CA certificates that can only be loaded directly from Microosft.com?
Fortunately I have that crap switched off (Score:2)
All it does is cause problems. DRM, not "security"...
Re: (Score:2)
Oh you're so clever. Let me guess you don't use passwords either because you're at risk of forgetting them.
Hint: DRM is in someone else's control. Secure boot is in yours. You can load whatever key you want into BIOS. It's your security system to use the way you want. Or you can take the stupidest approach and just turn it off.
By the way this is causing problems for zero people. Linux users are using their own keys. Windows users will have new certificates issued. And Windows users who don't get updates and
Re: (Score:2)
You can load whatever key you want into BIOS
That is what the discussion is about. It is not the user who loads they key, but Microsoft.
Hmmm... (Score:2)
"Windows 10 users must enroll in Microsoft's paid Extended Security Updates program to get the new certificates. "
Holding your system to ransom. You never really thought it was "your" PC, did you?
Re: (Score:2)
This is why I bought a Framework laptop.
I'm pretty confident that, if it came to it, the BIOS would let me enter a "Linux" UEFI key of my choosing, not just be locked to the Microsoft ones.
As it is, it barely matters as the machine only runs Linux anyway, and I don't have a single Windows machine in my house as of Christmas.
I wonder if that had anything to do with Windows 11, Microsoft enshittification, etc. etc. etc. etc.?
What happens if the deadline is missed? (Score:2)
Serious question here. Let's say I have an offline computer for whatever reason that can't connect to the internet, or maybe I have a legacy Windows 10 computer that can't get extended updates. What happens after June / October 2026? Can the machine still boot? Or does it become an expensive paperweight?
This reminds me of the way root certificates are managed on Android devices. Stopping system updates makes the device basically unusable after a few years because the root certificates are not updated anymor
Late June (Score:2)
A certificate that expires late june should have been renewed a year ago. I already see the cases of computers that were off for a long time or just failed updates with little time to fix before the certificate expires. I wonder if you can turn back the clock or if secure boot has measures against that.