• Your GNU/Linux PCs with UEFI "Secure" Boot would no longer boot past 2025-09-11

    From xwindows@xwindows@tilde.club to tilde.meta on Thu Sep 4 18:39:46 2025
    Hello everyone,

    The memorial date of 9/11 terrorist attack on World Trade Center
    is coming near; but did you know that there is another new
    digital terrorist attack impending on this same date this year?

    It's the Microsoft's 9/11 attack on libre software.

    I suspect that many people who installed libre operating system
    (especially GNU/Linux) on PCs and laptops manufactured since 2010s,
    did not take a necessary step of turning off a Microsoft-introduced [0] on-by-default antifeature [1] that is misleadingly called "Secure Boot" [2]
    in their machine's UEFI firmware settings.

    But when such users installed mainstream (read: corporate)
    GNU/Linux distributions on such setups, those seemed to install
    and boot alright; because companies behind these distributions
    bowed down and paid Microsoft monies to get their bootloader-shim signed,
    so it could be installed and run; with users blissfully unaware [3]
    of the phantom menace underlying this seemly-smooth experience.

    And now this menace is rearing its head: the certificate chain
    which these shims rely on is about to expire on... 11-Sep-2025,
    i.e. next Thursday a.k.a. the 9/11:

    https://lwn.net/Articles/1029767/

    ^ Be aware about Microsoft employee in the thread trying to fudge the issue;
    especially for the first comment. [4]

    If your libre OS failed to boot on your machine past 11-Sep-2025;
    you know what is the culprit.

    The only real solution is disabling "Secure" Boot in your UEFI setup screen; which instruction on how to do so varies mainboard-to-mainboard,
    so be sure to RTFM.

    (On some "bad" computers, it might be require invasive action [5];
    or outright impossible [6] in some consumer laptops)

    ^ And note that if your system survived this without your intervention,
    it also likely meant that your mainboard's implementation of "Secure" Boot
    was broken (i.e. insecure); which basically make any ounce of
    [faux-]security it promised a snake oil anyway.
    (Whether you'd take this as a good or bad news, is another matter)

    If you don't have a chance to completely reboot the system to check
    in your UEFI setup menu right now; ~jmcs suggested to me you could check
    the status of this antifeature by issue `mokutil --sb-state` command [7]
    on a running GNU/Linux system.

    If you would like to read more between the lines of this situation, see:

    http://techrights.org/n/2025/08/26/The_UEFI_9_11_Part_I_Introduction_to_Impending_Catastrophe_Micr.shtml
    http://techrights.org/n/2025/08/28/The_UEFI_9_11_Part_II_Campaign_of_Censorship_and_Defamation_Aga.shtml
    http://techrights.org/n/2025/08/30/The_UEFI_9_11_Part_III_Chaos_is_Scheduled_to_Happen_Second_Thur.shtml
    http://techrights.org/n/2025/09/04/The_UEFI_9_11_Part_VI_This_Serious_Harm_Was_Planned_for_Over_a_.shtml
    http://techrights.org/n/2025/09/02/The_UEFI_9_11_Part_V_This_is_Not_a_Drill_Disable_SecureBoot_Now.shtml
    http://techrights.org/n/2025/09/01/The_UEFI_9_11_Part_IV_External_Interference.shtml

    May your system survive this logic bomb terrorist attack.

    Finger crossed,
    ~xwindows


    P.S. I myself am not affected, since I have been paying close attention
    to this issue since early 2010s, and disabled "Secure" Boot
    (as well as disabling UEFI booting altogether) on all UEFI-capable
    machines I own from day one.

    [0] And mandated through their OEM agreement with computer manufacturers
    that wish to ship machines with Microsoft Windows preinstalled.

    [1] Feature (i.e. intentionally-engineered software function)
    which is anti-user.

    [2] Which is an euphemism of bootloader locking; disallowing operating
    systems unapproved (by Microsoft) from booting.
    Basically security for Microsoft's market dominance,
    not user's security.

    [3] Well, might not be completely: there have been incidents in the past
    where big-name distributions distributed bootloaders
    (and sometimes kernel) which were signed incorrectly;
    and users found they could no longer boot after updating their system.

    [4] As pointed out in:
    http://techrights.org/n/2025/07/24/Microsoft_Microsofters_and_Secure_Boot_Shills_Already_Storming_.shtml

    [5] For example, Lenovo Ideapad laptop requires you to completely shut down
    the system in a very-specific way, then poke a sharp pin into
    a specific (but nondescript) hole on one side of the machine,
    then press the power button; to be able to access a menu which
    allow you to disable this antifeature. Yes, I have met these things
    in real life, unfortunately. (Thankfully, that wasn't my own laptop)

    [6] If you use consumer-grade laptops from ASUS, beware.

    [7] See <https://man.archlinux.org/man/extra/mokutil/mokutil.1.en>
    if you would like to RTFM about this utility specifically.
    --
    xwindows' gallery of freely-licensed artworks
    https://tilde.club/~xwindows/ http://tilde.club/~xwindows/ gopher://tilde.club/1/~xwindows/
    --- Synchronet 3.20a-Linux NewsLink 1.2
  • From keyboardan@keyboardan@tilde.club to tilde.meta on Thu Sep 4 18:14:23 2025
    --=-=-=
    Content-Type: text/plain
    Content-Transfer-Encoding: quoted-printable

    xwindows <xwindows@tilde.club> writes:

    Hello everyone,

    The memorial date of 9/11 terrorist attack on World Trade Center
    is coming near; but did you know that there is another new
    digital terrorist attack impending on this same date this year?

    It's the Microsoft's 9/11 attack on libre software.

    I suspect that many people who installed libre operating system
    (especially GNU/Linux) on PCs and laptops manufactured since 2010s,
    did not take a necessary step of turning off a Microsoft-introduced [0] on-by-default antifeature [1] that is misleadingly called "Secure Boot" [=
    2]
    in their machine's UEFI firmware settings.

    But when such users installed mainstream (read: corporate)
    GNU/Linux distributions on such setups, those seemed to install
    and boot alright; because companies behind these distributions
    bowed down and paid Microsoft monies to get their bootloader-shim signed,
    so it could be installed and run; with users blissfully unaware [3]
    of the phantom menace underlying this seemly-smooth experience.

    And now this menace is rearing its head: the certificate chain
    which these shims rely on is about to expire on... 11-Sep-2025,
    i.e. next Thursday a.k.a. the 9/11:

    https://lwn.net/Articles/1029767/

    ^ Be aware about Microsoft employee in the thread trying to fudge the iss=
    ue;
    especially for the first comment. [4]

    If your libre OS failed to boot on your machine past 11-Sep-2025;
    you know what is the culprit.

    The only real solution is disabling "Secure" Boot in your UEFI setup scre=
    en;
    which instruction on how to do so varies mainboard-to-mainboard,
    so be sure to RTFM.

    (On some "bad" computers, it might be require invasive action [5];
    or outright impossible [6] in some consumer laptops)

    ^ And note that if your system survived this without your intervention,
    it also likely meant that your mainboard's implementation of "Secure" B=
    oot
    was broken (i.e. insecure); which basically make any ounce of
    [faux-]security it promised a snake oil anyway.
    (Whether you'd take this as a good or bad news, is another matter)

    If you don't have a chance to completely reboot the system to check
    in your UEFI setup menu right now; ~jmcs suggested to me you could check
    the status of this antifeature by issue `mokutil --sb-state` command [7]
    on a running GNU/Linux system.

    If you would like to read more between the lines of this situation, see:

    http://techrights.org/n/2025/08/26/The_UEFI_9_11_Part_I_Introduction_to_I=
    mpending_Catastrophe_Micr.shtml
    http://techrights.org/n/2025/08/28/The_UEFI_9_11_Part_II_Campaign_of_Cens=
    orship_and_Defamation_Aga.shtml
    http://techrights.org/n/2025/08/30/The_UEFI_9_11_Part_III_Chaos_is_Schedu=
    led_to_Happen_Second_Thur.shtml
    http://techrights.org/n/2025/09/04/The_UEFI_9_11_Part_VI_This_Serious_Har=
    m_Was_Planned_for_Over_a_.shtml
    http://techrights.org/n/2025/09/02/The_UEFI_9_11_Part_V_This_is_Not_a_Dri=
    ll_Disable_SecureBoot_Now.shtml
    http://techrights.org/n/2025/09/01/The_UEFI_9_11_Part_IV_External_Interfe=
    rence.shtml

    May your system survive this logic bomb terrorist attack.=20

    Finger crossed,
    ~xwindows


    P.S. I myself am not affected, since I have been paying close attention
    to this issue since early 2010s, and disabled "Secure" Boot
    (as well as disabling UEFI booting altogether) on all UEFI-capable
    machines I own from day one.

    [0] And mandated through their OEM agreement with computer manufacturers
    that wish to ship machines with Microsoft Windows preinstalled.

    [1] Feature (i.e. intentionally-engineered software function)
    which is anti-user.

    [2] Which is an euphemism of bootloader locking; disallowing operating
    systems unapproved (by Microsoft) from booting.
    Basically security for Microsoft's market dominance,
    not user's security.

    [3] Well, might not be completely: there have been incidents in the past
    where big-name distributions distributed bootloaders
    (and sometimes kernel) which were signed incorrectly;
    and users found they could no longer boot after updating their system.

    [4] As pointed out in:
    http://techrights.org/n/2025/07/24/Microsoft_Microsofters_and_Secure_=
    Boot_Shills_Already_Storming_.shtml

    [5] For example, Lenovo Ideapad laptop requires you to completely shut do=
    wn
    the system in a very-specific way, then poke a sharp pin into
    a specific (but nondescript) hole on one side of the machine,
    then press the power button; to be able to access a menu which
    allow you to disable this antifeature. Yes, I have met these things
    in real life, unfortunately. (Thankfully, that wasn't my own laptop)

    [6] If you use consumer-grade laptops from ASUS, beware.

    [7] See <https://man.archlinux.org/man/extra/mokutil/mokutil.1.en>
    if you would like to RTFM about this utility specifically.

    Hi xwindows.

    Thank you for informing us with your message. Not a surprising
    behaviour from Capitalism towards Freedom.


    =2D-=20
    The pioneers of a warless world are the youth that
    refuse military service. ~ Albert Einstein

    --=-=-=
    Content-Type: application/pgp-signature; name="signature.asc"

    -----BEGIN PGP SIGNATURE-----

    iQJKBAEBCgA0FiEEOVeKaEm0xBhCsMmYlk/BEMQK1XUFAmi5yO8WHGtleWJvYXJk YW5AdGlsZGUuY2x1YgAKCRCWT8EQxArVdW6xD/9XunIUPIO8ncYwMrK4A5kfh1S1 wurwHMY0NKzm7J57grc92ONQErjcw5aL7aCAhBX4Z+MIw8m3vDtVMtTyodCjzMN8 BeSSFI1auNKgllWjYjCmwl/20TJ2nPWZ6F0/JHUnfChC8rRb+JX030W1IqlrSFac LtL2erKQfc+9az1I+u57WETO9nROjsDGyGSeuUL3f9ia4JOhp+IlOqBw4qH+u3s6 dNsnqjJIiUq8MBY2TBlpOu4+xQrtExdyfG3jW1YKxC7F1lNnvkHwuBnjxGfBsWSr VLuZrw08N5qXXZpzhtoMUHI9UK2Dm9Fh5fI1JyN0IZaOnN9VRrAtuSZ0Rb/QtW5Z PagMtnH36zVwgJPuM7GH2hTHyDI9oOmklr+XH/i4P9iYUEECIaSxN5tWczAsg7Ev h87HpBM5b10ZwHhAM8ICyfN0q1hm1kPjP6MJYUgD4d9hDX+H3pEFh+oDhFPxUB8r IYtdTH0F3roE/XoWI1QKK2xleHqoLjbyYFaOPKYWl3bDp2D2gGvbvqJ1yd6LQA27 ZGM2w6rA8ABolX4xjaO9Eb09Lai2iS9KFncJV9mZLiFAF1fT7jIQMycv5hINc6Tr 2IERHbnb/GepWyY/h3Zbeswg+YGbWUH7lnsh27PsnJFw2ZiZQXlfcZ83YghknyZU Ibox2RIC9fbLGqJmDA==
    =wviS
    -----END PGP SIGNATURE-----
    --=-=-=--
    --- Synchronet 3.20a-Linux NewsLink 1.2