Canonical 和 Red Hat 呼吁 Secure boot 选择权

jopen 12年前
     <p><span style="line-height:24px;font-family:Helvetica, Arial, sans-serif;color:#444444;font-size:14px;" class="Apple-style-span">几个星期前微软要求win8认证客户机支持安全启动,启动进程内的所有固件和软件都需要可信CA签名,显然微软试图锁定启动进程,阻止安装无签名的第三方系统如Linux。前不久,自由软件基金会(FSF)就此发表<span style="padding-bottom:0px;margin:0px;padding-left:0px;padding-right:0px;padding-top:0px;"><a style="padding-bottom:0px;margin:0px;outline-style:none;padding-left:0px;padding-right:0px;color:#444444;text-decoration:none;padding-top:0px;" href="/misc/goto?guid=4958194140797204276" target="_blank">声明</a></span>,称限制性的安全启动将会让电脑只能运行微软的操作系统,限制用户安装自由软件GNU/Linux的自由,它呼吁<span style="padding-bottom:0px;margin:0px;padding-left:0px;padding-right:0px;padding-top:0px;"><a style="padding-bottom:0px;margin:0px;outline-style:none;padding-left:0px;padding-right:0px;color:#444444;text-decoration:none;padding-top:0px;" href="/misc/goto?guid=4958194141541785450" target="_blank">签名抵制</a></span>。(<a style="padding-bottom:0px;margin:0px;outline-style:none;padding-left:0px;padding-right:0px;color:#444444;text-decoration:none;padding-top:0px;" href="/misc/goto?guid=4958196601517000924">原报道</a>)现在Canonical 和 Red Hat 联手发布白皮书<a style="padding-bottom:0px;margin:0px;outline-style:none;padding-left:0px;padding-right:0px;color:#444444;text-decoration:none;padding-top:0px;" href="/misc/goto?guid=4958196602267135071">UEFI Secure Boot Impact on Linux [PDF]</a>,由Jeremy Kerr, Matthew Garrett, and James Bottomley撰稿,呼吁所有用户应拥有Secure Boot选择权,系统商应建立一个机制让用户来配置自己认可的软件列表,PC机应包含一个应用界面允许用户轻易启用/禁用Secure boot。</span></p>    <p><span style="line-height:24px;font-family:Helvetica, Arial, sans-serif;color:#444444;font-size:14px;" class="Apple-style-span"><img title="Canonical 和 Red Hat 呼吁 Secure boot 选择权" border="0" alt="Canonical 和 Red Hat 呼吁 Secure boot 选择权" src="https://simg.open-open.com/show/1d2a38ac5c04e501f97433501293d319.jpg" width="550" height="129" /><br /> </span></p>    <p><span style="line-height:24px;font-family:Helvetica, Arial, sans-serif;font-size:14px;" class="Apple-style-span"> </span></p>    <p style="padding-bottom:0px;padding-left:0px;padding-right:0px;margin-bottom:0.5em;color:#444444;padding-top:0px;"><span style="padding-bottom:0px;margin:0px;padding-left:0px;padding-right:0px;color:#008000;padding-top:0px;" class="Apple-style-span">“We present a set of recommendations that will allow users the freedom to choose their software, while retaining the security features of UEFI Secure Boot, and complying with open source licenses used in distributions of Linux.”</span></p>    <p style="padding-bottom:0px;padding-left:0px;padding-right:0px;margin-bottom:0.5em;padding-top:0px;"><span style="color:#008000;" class="Apple-style-span">另外:</span></p>    <p style="padding-bottom:0px;padding-left:0px;padding-right:0px;margin-bottom:0.5em;color:#444444;padding-top:0px;">Linux基金会同样也于今日发表了一份UEFI Secure Boot白皮书:<a style="padding-bottom:0px;margin:0px;outline-style:none;padding-left:0px;padding-right:0px;color:#444444;text-decoration:none;padding-top:0px;" href="/misc/goto?guid=4958196603009295179">Making UEFI Secure Boot Work With Open Platforms</a>,由James Bottomley and Jonathan Corbet撰稿。</p>    <p style="padding-bottom:0px;padding-left:0px;padding-right:0px;margin-bottom:0.5em;color:#444444;padding-top:0px;"><span style="padding-bottom:0px;margin:0px;padding-left:0px;padding-right:0px;color:#008000;padding-top:0px;">“Linux and other open operating systems will be able to take advantage of secure boot if it is implemented properly in the hardware. This document is intended to describe how the UEFI secure boot specification can be implemented to interoperate well with open systems and to avoid adversely affecting the rights of the owners of those systems while providing compliance with proprietary software vendors’ requirements.”</span></p>    <p style="padding-bottom:0px;padding-left:0px;padding-right:0px;margin-bottom:0.5em;color:#444444;padding-top:0px;">两份白皮书都定义了UEFI Secure Boot 规范应如何定义,以让PC正常运行自由操作系统。<br /> <br /> 本文转载自: <a href="/misc/goto?guid=4958196603745841833" rel="nofollow">http://blog.51osos.com/linuxnews/canonical_redhat_secure_boot/</a> </p>