PCs without the new certificates could eventually have trouble booting new OSes.
See full article...
See full article...
Horrible PR messaging. Most users will see that, believe they don't have to do anything, and stop reading any additional statements.If a device does not receive the new Secure Boot certificates before the 2011 certificates expire, the PC will continue to function normally, and existing software will keep running,” writes Nuno Costa, a program manager in Microsoft’s Windows Servicing and Delivery division.
Oh almost had a heart attack. So it's only if you're using a system that's trying to use Windows 11. And not older versions. Only Windows 11 without updated certificates will refuse to boot. Which is good to know but not that deadly.
Though with this exercise and a certificate this widespread. Wouldn't it be prudent now to update it every few years while it does have a long lifespan. Rather than wait 15 years to always keep the clock running.
HKLM:\SYSTEM\CurrentControlSet\Control\SecureBoot\ServicingHKLM:\SYSTEM\CurrentControlSet\Control\SecureBootWell i'm on a 10 machine now. Without ESU. And no update was pushed to be since all this time Even though technically the machine isn't 11 capable. So not really an issue. But still. You time bomb everything by not keeping the expiration updated only leaving a very short window to get it done or even possibly not at all. We assume Microsoft will be around "Forever" but think about infrastructure machines still running some Unix variant of a company that no longer exists 40 year old equipment now where no update will ever happen. Imagine a machine running off grid that controls waterflow never gets replaced and just dies because after a reboot and this is the reason.I think they had a roughly 3 year overlap, which is probably sufficient.
Secure Boot was enabled but technically optional for Windows 8 and Windows 10, but it became a formal system requirement for installing Windows starting with Windows 11 in 2021.
Secure Boot has relied on the same security certificates to verify bootloaders since 2011
mokutil \
--db > secureBootDB.txt
mokutil \
--kek > secureBootKEK.txt
cat secureBoot*
Yes, preventing the PC from even booting into the OS install media definitely ensures total security.Turning off Secure Boot is a terrible idea. It's a great security feature.
How convenient of Microsoft to bring it up shortly after the end of standard support for Win10. So to get the updates you'll need to sign up to ESU. Which means you need a Microsoft account.Well i'm on a 10 machine now. Without ESU. And no update was pushed to be since all this time
Not to mention, it’s not completely true. I’m nearly 100% sure that lack of Secure Boot on systems capable of it will trigger anti-cheat detection systems and it’s likely that other system level software may be affected, whether by intentional design or by bugs in untested code (pretty sure few software makers routinely test this case).Horrible PR messaging. Most users will see that, believe they don't have to do anything, and stop reading any additional statements.
“However, the device will enter a degraded security state that limits its ability to receive future boot-level protections. As new boot‐level vulnerabilities are discovered, affected systems become increasingly exposed because they can no longer install new mitigations. Over time, this may also lead to compatibility issues, as newer operating systems, firmware, hardware, or Secure Boot–dependent software may fail to load.”
To some extent, I mean, security is an onion and you want as many layers as possible. But if you have some malware attacking your bootloader things have gone pretty deeply wrong.Turning off Secure Boot is a terrible idea. It's a great security feature.
To some extent, I mean, security is an onion and you want as many layers as possible. But if you have some malware attacking your bootloader things have gone pretty deeply wrong.
To clarify, if you don't update your motherboard/computer with the new 2023 certificates before the 2011 certificates expire later this year are you still able to update to the new 2023 certificates after the 2011 certificates expire? Or are you going to be forever blocked from installing the 2023 certificates (ie. updating to a newer certificate can only occur before the existing certificate expires)?“If a device does not receive the new Secure Boot certificates before the 2011 certificates expire, the PC will continue to function normally, and existing software will keep running,” writes Nuno Costa, a program manager in Microsoft’s Windows Servicing and Delivery division.
“However, the device will enter a degraded security state that limits its ability to receive future boot-level protections. As new boot‐level vulnerabilities are discovered, affected systems become increasingly exposed because they can no longer install new mitigations. Over time, this may also lead to compatibility issues, as newer operating systems, firmware, hardware, or Secure Boot–dependent software may fail to load.”
Suppose they brought them to you because something had gone deeply wrong!I used to repair PCs and prior to the switch to UEFI with Secure Boot, saw bootkits all the time on Windows 7 and older. I literally never saw a single one from approximately 2012-2016 on a PC with Windows 8 or newer and Secure Boot on.
I love how PC users / console users / phone users etc. use 'flawless' to describe 'Well, it's kind of a PoS with all these irritations and oh jesus I hate it when it does this or that happens oh god it wants to reboot again but it mostly just works and it's less hassle than switching to something else and I want you to switch to this too to share the pain, so trust me bro it's 100% FLAWLESS.'too bad I'm afraid to mess with my 23h2 build, it's been absolutely flawless
Using W10 without secure boot and using legacy boot from previous dual boot. Oops. Not that I was planning to update to W11 ever anyway. But I have a fairly recent ish x570 AMD mobo so guess I'll have to turn it on and make sure it's updated at least.Legacy Bios here Intel series 4...
As someone currently in the process of moving to Linux from Windows, all I can say is "BS." I won't bother listing the numerous issues I've encountered on my quest to install Mint (massaged Ubuntu) on my laptop, but I will mention the most serious.
This is likely because secure boot is not enabled on the PC.Is there something off with the code? I tried both PowerShell and Terminal in Windows 11 and it seems to get an error, unless its just operator error:
Get-SecureBootUEFI : Variable is currently undefined: 0xC0000100
At line:1 char:43
+ CategoryInfo : ResourceUnavailable: (Microsoft.Secur...BootUefiCommand:GetSecureBootUefiCommand) [Get-S
- ... System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) ...
- ~~~~~~~~~~~~~~~~~~~~~
ecureBootUEFI], StatusException
+ FullyQualifiedErrorId : GetFWVarFailed,Microsoft.SecureBoot.Commands.GetSecureBootUefiCommand
(Edit: the second code example does work and returns False)
i had this issue, secure boot was enabled in the bios but showed as disabled in msinfo32. disabling CSM and resetting keys worked for me, though.Is there something off with the code? I tried both PowerShell and Terminal in Windows 11 and it seems to get an error, unless its just operator error:
Get-SecureBootUEFI : Variable is currently undefined: 0xC0000100
At line:1 char:43
+ CategoryInfo : ResourceUnavailable: (Microsoft.Secur...BootUefiCommand:GetSecureBootUefiCommand) [Get-S
- ... System.Text.Encoding]::ASCII.GetString((Get-SecureBootUEFI db).bytes) ...
- ~~~~~~~~~~~~~~~~~~~~~
ecureBootUEFI], StatusException
+ FullyQualifiedErrorId : GetFWVarFailed,Microsoft.SecureBoot.Commands.GetSecureBootUefiCommand
(Edit: the second code example does work and returns False)