PSA: Windows Secure Boot fix will render old boot media and backups unbootable

VirtualLarry

No Lifer
Aug 25, 2001
56,570
10,203
126
This is going to be painful for some, if not a lot of people.
OUCH!

I have literally boxes full of Linux ISOs to boot from. Are they saying that those will no longer boot, either? MS is blacklisting their EFI loader, presumably by loading revocation files into the BIOS, no? Does that then ONLY allow the MS loader, or also Linux still? Is the Linux loader signed with the compromised MS key that's being revoked?

Also, in the most extreme / worst-case, can we, as users, STILL remove Secure Boot keys/files from BIOS (including the added revocation files), and/or DISABLE Secure Boot, in order to "boot legacy"?
 

VirtualLarry

No Lifer
Aug 25, 2001
56,570
10,203
126
I don't think they are touching the BIOS. Only the EFI partition (the 100MB hidden one).
If that were true, then how would it rendered previously bootable boot media unbootable? I'm pretty sure that they are loading the revocation certs for MS's previous EFI bootloader (that had the exploits) into the BIOS, so future attempt to boot with that bootloader, on that PC/motherboard, fail cert checks.

The question is, does that revoke the key that prior Linux bootloaders used?
 
Jul 27, 2020
24,374
16,962
146
If that were true, then how would it rendered previously bootable boot media unbootable?
From the Microsoft page:

Open a Command Prompt window running as an Administrator, type each of the following commands and then press Enter to copy the Code Integrity Boot Policy to the devices EFI partition.


mountvol q: /S
xcopy %systemroot%\System32\SecureBootUpdates\SKUSiPolicy.p7b q:\EFI\Microsoft\Boot
mountvol q: /D
Once that policy file is copied to the EFI partition, all future boot managers will be verified against that. That means previous boot media and likely Linux ISOs/media will fail to boot because THEIR boot managers will be validated against that new policy file. To get them to boot, you would need to clear the EFI partition of your SSD/HDD, at which point the bootable media's temporary EFI partition will be used and it would then boot. That's how I understand it.
 
Jul 27, 2020
24,374
16,962
146
In case anyone needs their head spinning:


 

Shmee

Memory & Storage, Graphics Cards Mod Elite Member
Super Moderator
Sep 13, 2008
8,048
2,991
146
Does this at all affect those who don't have secure boot enabled? Also, to my knowledge, the article got at least one thing wrong. Secure boot isn't required on Windows 11, it just needs to be supported by firmware settings/hardware. Or did they change this recently?
 
Jul 27, 2020
24,374
16,962
146
Secure boot isn't required on Windows 11, it just needs to be supported by firmware settings/hardware. Or did they change this recently?

They seem to think it must be enabled. I didn't mess with the default BIOS settings on my Z790 mobo before installing Win11 so maybe they have secure boot enabled by default.