• MS-DEFCON 4: Side effects for dual booters

    Home » Forums » Newsletter and Homepage topics » MS-DEFCON 4: Side effects for dual booters

    Author
    Topic
    #2699626

    ISSUE 21.35.1 • 2024-08-27 By Susan Bradley Secure Boot is causing — once again — side effects for Windows patchers. The August updates are triggering
    [See the full post at: MS-DEFCON 4: Side effects for dual booters]

    Susan Bradley Patch Lady/Prudent patcher

    9 users thanked author for this post.
    Viewing 16 reply threads
    Author
    Replies
    • #2699652

      This is one of the reasons I prefer to use virtual machines rather than dual-booting.

      That’s right — always blame the user instead of the vendor when they change their security requirements.

      Seriously, the Secure Boot Certificates changes issue does not just affect those who dual-boot Windows and Linux. For example, I have Linux on an internal SSD, separate from Windows 11 Pro. But the bootloader is GRUB2, so technically this is also a dual-boot. So are USB, Thunderbolt and other external drives when booted using either Windows or Linux bootloaders. This includes various Rescue Media.

      I believe the patch with its SBAT updates would have been applied if the dual-boot was using GRUB2 rather than the Windows bootloader to manage the dual-boot. But I may have misread the documentation in this regard.

      Most Linux distros have already adjusted their shims to accommodate the Secure Boot changes. These were announced months ago. Most Linux installers also have been adjusted. Some Linux Live and Windows and Linux Boot USB environments have not been adjusted. These will encounter exactly the same Secure Boot Warnings. In some cases no upgrades are available. Ventoy would need to update their MOK (Security Key) entry routine, but nothing more would seem to be needed there.

      I use Linux Mint, Ubuntu and Ventoy with several ISOs onboard on a USB Flash Drive, and have yet to encounter any issues. I have applied the August updates per Susan’s previous advice when we were at MS DEFCON 3. I don’t use Bitlocker.

      -- rc primak

      2 users thanked author for this post.
      • #2699658

        That’s right — always blame the user instead of the vendor when they change their security requirements.

        Which vendor did you have in mind? Aren’t Shim/SBAT, and even the “Something has gone seriously wrong” message, open-source products to protect Linux users against bootkit/rootkit malware caused by vulnerable bootloaders?

        • #2701349

          Aren’t Shim/SBAT, and even the “Something has gone seriously wrong” message, open-source products to protect Linux users against bootkit/rootkit malware caused by vulnerable bootloaders?

          Yes and no.

          To understand the problem, consider this: SELinux had its bootloader blacklisted by this update.  And SELinux is not alone in having had some of what users consider current versions blacklisted.

          There are literally thousands of USB Boot ISOs which are built on SELinux. Yes, they are vulnerable. But how long and at what cost would it take to update all those boot USB images and ISOs to comply with the new Secure Boot requirements?

          Ventoy is a highly-modified multiboot USB creation tool. It also uses a form of bootloader which got blacklisted. To fix this requires much more than updating a shim or importing a new GRUB2. The developers of Ventoy as of this posting have yet to come up with a newer version  which passes the new SBAT requirements.

          There are many, many more examples, some from Window backup and recovery programs, where boot media which worked in June will no longer work in September on many Windows PCs. Many home users are finding that out the hard way.

          Consumers (home users) have no need for the added security of SBAT. That has been noted in dozens of tech and popular computer advice articles.

          This looks a lot like Microsoft trying to throw up roadblocks to installing Linux on our desktops, and to using third-party utilities and backup solutions. And to discourage dual-booting for some reason which I find totally baffling.

          And for no good security reasons — in a stand-alone or home network consumer grade computing environment.

          TPM security falls into the exact same category — for most home users, this added security is completely unnecessary. And it too interferes with launching and using Linux installers and using third party backup utility rescue media. As well as limiting dual-booting.

          Heck, if folks didn’t follow up their August Windows Updates by making entirely new Windows install and recovery USB media, they may be in for a nasty surprise down the road!

          -- rc primak

          4 users thanked author for this post.
      • #2699681

        I have seen too many issues with dual booting and getting too old to want to deal with it. Especially these days when you can repurpose hardware.

        Susan Bradley Patch Lady/Prudent patcher

        1 user thanked author for this post.
        • #2701352

          Susan, I empathize totally with the “I’m getting too old for this ****” mentality.

          But I am not throwing in the towel. Except maybe on Windows after Windows 11.

          That would end my interest in dual-booting, FWIW.

          -- rc primak

          1 user thanked author for this post.
    • #2699654

      If I were dual-booting Linux, I’d probably just turn Secure Boot off, it doesn’t really have much benefit over there from what I can see.

      3 users thanked author for this post.
      • #2701353

        I’d probably just turn Secure Boot off,

        That sadly, was my only viable option when my Intel NUC got the SBAT update. At least for most USB boot utilities. Ventoy in particular. I spent four days and three nights trying all the workarounds and nothing worked for me. Mind you, I’m not the most sophisticated person when it comes to low-level OS and hardware/firmware troubleshooting.

        -- rc primak

        1 user thanked author for this post.
        • #2704221

          Update: After weeks of poring over online Linux forums, I finally found a way to replace the older Shim and GRUB files on my Ventoy USB Fl;ash Drive with the updated versions. I used parts of the Fedora 40 Installer as my source, but Ubuntu and Mint (and Debian) all have their own versions of the updated Shim. Just make sure you rename your new Shim and grubx64.efi and mmx files correctly for Ventoy to continue to work.

          Once applied, these changes did require re-enrolling the MOK and Grub Hash once only per computer.  But other than that, the new configuration for Ventoy is compatible with the SBAT blacklist changes.

          Details: https://github.com/ventoy/Ventoy/issues/2692   

          https://mjg59.dreamwidth.org/70348.html 

           

          -- rc primak

    • #2699657

      Scenario:

      “If you enable the Windows boot menu then the ‘Macrium Reflect System Recovery’ option will be added to your start-up boot menu.”

      Question:

      If this ‘enable Windows boot menu’ option in Macrium Reflect has been enabled will it also be affected by the secure boot side effects mentioned in this MS-DEFCON post?

      Thanks!

      • #2699661

        @opti1
        As far as I understand the problem is with Linux so I don’t think the Windows boot menu would be affected.

        Linux Mint Cinnamon 21.1
        Group A:
        Win 10 Pro x64 v22H2 Ivy Bridge, dual boot with Linux
        Win l0 Pro x64 v22H2 Haswell, dual boot with Linux
        Win7 Pro x64 SP1 Haswell, 0patch Pro, dual boot with Linux,offline
        Win7 Home Premium x64 SP1 Ivy Bridge, 0patch Pro,offline

        2 users thanked author for this post.
      • #2699665

        @opti
        It’s a good question, though, since I remember being advised to make new Macrium Reflect USB rescue media to make sure they will boot. I imagine it could depend on what version of Macrium Reflect is used to add the boot menu option, assuming MR has updated its boot media. I have the Windows boot menu option also but just as a backup to the USB media. Hopefully someone else can answer your question definitively.

        Linux Mint Cinnamon 21.1
        Group A:
        Win 10 Pro x64 v22H2 Ivy Bridge, dual boot with Linux
        Win l0 Pro x64 v22H2 Haswell, dual boot with Linux
        Win7 Pro x64 SP1 Haswell, 0patch Pro, dual boot with Linux,offline
        Win7 Home Premium x64 SP1 Ivy Bridge, 0patch Pro,offline

      • #2699682

        No.

        Susan Bradley Patch Lady/Prudent patcher

        3 users thanked author for this post.
      • #2701356

        If this ‘enable Windows boot menu’ option in Macrium Reflect has been enabled will it also be affected by the secure boot side effects mentioned in this MS-DEFCON post?

        No this is not affected. You are going to use this option essentially from a partially booted Windows OS. The bootloader has already succeeded in getting as far as the selection menu, No further secure boot issues should occur. That boot option and the creation of the rescue media I believe use files from the host OS into which it is installed to prepare its WinPe/WinRE recovery environment. I have not seen these files conflict with the SBAT update. Though, maybe could it happen? I don’t think so.

        However, you will need to create the Boot Menu Option  and the Rescue Media fresh after the SBAT update is installed. At least as a precaution, maybe as a necessity to update everything. Macrium Reflect probably will prompt you to do so.  But even if not, do it anyway. Which reminds me, I need to do those updates in my NUC ASAP.

        -- rc primak

        2 users thanked author for this post.
    • #2699700

      Or just keep booting into Linux until the problem goes away, then do one boot and update in win!

      • #2701357

        Or just keep booting into Linux until the problem goes away

        No. The issue is that on some systems, when the SBAT blacklist is imposed, Linux stops booting. Windows is just fine.

        -- rc primak

    • #2699755

      Okay-I installed the updates last night and everything is normal. I didn’t touch the IV6 because I didn’t want to monkey with it and assuming IV6 has something to do with ethernal cables-I don’t use those for wifi so I am safe.

       

      Now the only updates needed is to make sure that the lenovo updates are installed and understanding how to install the new 22H3 update this weekend for the PC so it is in tip top form.

    • #2699811

      First, the Macrium Reflect boot option is NOT effected by this issue.  As said, above it is only Linux distros.

      I followed the directions in the Email about removing the Windows KB.  It seemed to work. I rebooted and tried to start my Linux system – Tails (from a flash drive) and got the same shim SBAT error!

       

      Now what???

      2 users thanked author for this post.
      • #2699816
        • From an advanced command prompt, copy and paste the following command:
        • reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\SBAT /v OptOut /d 1 /t REG_DWORD

        Can you try that?

        reg add HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SecureBoot\SBAT /v OptOut /d 1 /t REG_DWORD

         

        Moderator Edit: to make entire command visible.

        Susan Bradley Patch Lady/Prudent patcher

        • #2701358

          That Registry modification only works if applied BEFORE the update installs the SBAT blacklist.

          To remove the SBAT blacklist, one would need to know how to get inside their BIOS, go into the UEFI section, locate the DBx database, and reset it. I was not able to do this on my Intel 11th Gen NUC. Maybe I just don’t understand my BIOS in enough technical detail?

          In any event, the MOK Utilities in Linux have no effect on the error message.

          I found this error with the Ventoy multi-ISO USB flash drive program.  Nothing I tried fixed it. But maybe I missed something? I did not miss that Registry change.

          Why should home users ever need to look into our BIOSes in this much detail??

          -- rc primak

          1 user thanked author for this post.
    • #2699831

      Easy question:
      I have disabled IPV6 and also patched my systems. Should I leave IPV6 disabled, or turn it back on?

      • #2699832

        If you need/use it, turn it back on. Most ISPs still don’t support it.
        Otherwise it doesn’t matter either way, the Aug. patch has you covered.

        2 users thanked author for this post.
        • #2699897

          PK:  Thanks for the answer to bbobccat’s question – I was in the same dilemma.

          regards

          GeoffB

           

    • #2699855

      This seems to have gone through fine, and then I ran the Microsoft Store updates, and that caused an issue — never had any issues with it before.  While some updates went though as they have always done before, these seem to be not doing anything.

      Screenshot-AskW

    • #2699865

      I’ve been noticing more and more the catch phrase “Something has gone seriously wrong:” not just from malwaresoft, but many other companies. Is this the new “we screwed up and don’t know how it fix it” phrase?

      • #2699963

        Microsoft doesn’t use that phrase. Shim is an open-source Linux product.

        • #2701360

          Is this the new “we screwed up and don’t know how it fix it” phrase?

          No. Microsoft has created or added to a blacklist. It is up to everyone else to upgrade every USB boot device they own and every ISO on them, because Microsoft thinks we need the added security of TPM keys and SBAT blacklists on home stand alone and home networked PCs. Most tech resources aimed at consumers state explicitly that these security measures are vast overkill for most home users.

          Microsoft doesn’t use that phrase. Shim is an open-source Linux product.

          Shim is made necessary by the way Microsoft handles Secure Boot. Home users generally do not need the added security layers of TPM (MOK) keys and SBAT blacklists. And Shim does not always get the job of entering and updating MOKs and other Secure Boot items done in the exact way Microsoft demands.

          Why should a simple end-user need to know about such rocket-science?

          -- rc primak

    • #2699872

      This seems to have gone through fine, and then I ran the Microsoft Store updates, and that caused an issue — never had any issues with it before.  While some updates went though as they have always done before, these seem to be not doing anything.

      Screenshot-AskW

      I just tried re-registering Microsoft Store  — https://www.elevenforum.com/t/re-register-microsoft-store-app-in-windows-11.2408/#Two  — and it doesn’t seem to be helping

      EDIT: Actually, just restarted the computer, and now it seems to be working!

      1 user thanked author for this post.
    • #2700001

      Not a dual booter, but did the updates. 8 minutes, not bad, BUT in the middle of the update there was crash in Windows Update thaat I saw in several different ways. Though the updates appeared to be successful.

      They also unregistered 2 dll’s I register and WU unregistered every so often in updates and deleted a half dozen registry tweaks I have added. I keep them bookmarked so I know when they are gone. So a bit of a nuissance update morning.

      Description:
      Faulting application name: wuauclt.exe, version: 10.0.19041.4355, time stamp: 0x90a2b675
      Faulting module name: KERNELBASE.dll, version: 10.0.19041.4522, time stamp: 0xf7a99bd4
      Exception code: 0xc0000409
      Fault offset: 0x000000000012d332
      Faulting process id: 0x1bb8
      Faulting application start time: 0x01daf91e228d3420
      Faulting application path: C:\WINDOWS\system32\wuauclt.exe
      Faulting module path: C:\WINDOWS\System32\KERNELBASE.dll
      Report Id: 9747c89d-7588-4abd-971d-5cba9ecb1e68
      Faulting package full name:
      Faulting package-relative application ID:

    • #2700084

      It’s hardly the first time I’ve said that advanced booting techniques can lead to side effects. This is no different.

      To this I say : It is hardly the first time that Windows patches to the so-called “Secure Boot” have caused problems for dual-booters. I agree with rc primark above who said

      That’s right — always blame the user instead of the vendor when they change their security requirements.

      I don’t think you should blame computer users who prefer to dual-boot or multi-boot Windows with other operating systems over problems that Microsoft’s patches caused.

      As far as I can see, this “Secure Boot” thing is not that secure at all (Still remember BlackLotus, the bootkit that can bypass Secure Boot and first seen in 2022?), and when Microsoft needs to make changes to it to “enhance security” it often causes problems to dual-booters. The BlackLotus patches will apparently, once fully implemented, eventually make even older Windows boot media unbootable on systems using Secure Boot.

      I might be an extreme minority, but I make it a point NOT to use this rubbish when I setup a computer with a new motherboard (I never use OEM computers, one of the reasons being I am well aware some, may be most, of the OEM computers might not have an option to disable this rubbish.). One of the first things I do when I start up a new computer is to go into the BIOS / UEFI to disable Secure Boot and enable Legacy Boot (Yes, I don’t even boot using UEFI, only Legacy.). Oh, and of course, absolutely no Bitlocker or the so-called Device Encryption in Windows.

      If you believe this Secure Boot thing is good for your computer security, by all means continue to use it. But please do not attempt to persuade me to believe that.

      By the way, I setup (the Traditional Chinese version of) Windows 10 21H2 IoT LTSC on my main computer (based on a motherboard from over eight years ago) yesterday. It also hosts several other Windows systems : Windows 1809 LTSC / Windows Server 2019 / Windows 7 Enterprise / Windows 8.1 Enterprise / Windows Server 2012 R2 in a multi-boot configuration managed by a special boot program. I just installed KB5041580 on it and as far as I can see there were no problems with booting it and the other systems afterwards, as I boot in Legacy mode (and don’t boot Linux). All the boot SSDs (3 in total. 1 NVMe and 2 SATA) are partitioned using MBR format.

      Hope for the best. Prepare for the worst.

      2 users thanked author for this post.
      • #2701363

        I couldn’t have said it better myself. Though I tried. 😊

        -- rc primak

    • #2700390

      Windows 10 Pro – Version 22H2

      Ordinary Consumer / Not tech savy but I follow Susan Bradley’s and PKCano’s advice

      I boot as an ordinary home consumer / I don’t know what dual booting is / I don’t use Linux

      In her 8/16/24 article,  Susan Bradley provided instructions on how to “Disable IPv6 for your network connections”.  I have Bluetooth, Ethernet and WiFi Connections.  All three have IPv6 checked as active.  In this article, Susan Bradley indicates that the IPv6 risk is less than the original concern.

      So should I uncheck and deactivate IPv6 on my three Connections before installing the August Windows updates or leave IPv6 checked and active?

      If I deactivate IPv6 on my three Connections, should I check and activate IPv6 after the Windows Updates are installed?  I read PKCano’s answer above.  I have no idea whether my ISP(s) use IPv6, which is why I’m asking the same question.

      Thank you.

    • #2700480

      They also unregistered 2 dll’s I register and WU unregistered every so often in updates and deleted a half dozen registry tweaks I have added. I keep them bookmarked so I know when they are gone. So a bit of a nuissance update morning.

      Is there a way to know what, if any, changes a WU made or undid in the registry, and otherwise?

      • #2721203

        They also unregistered 2 dll’s I register and WU unregistered every so often in updates and deleted a half dozen registry tweaks I have added. I keep them bookmarked so I know when they are gone. So a bit of a nuissance update morning.

        Is there a way to know what, if any, changes a WU made or undid in the registry, and otherwise?

        Hi,  Just wanted to follow up.

        Happy Thanksgiving!

    • #2700556

      Updated 1 x Win11 Pro 23H2 machine with August CU (KB5041585), .NET Framework update, .NET 6 update, .NET .8 update and MSRT v5.127 without issues, except the minor annoyance that the system rebooted twice during installation, first time upon reaching 30% as usual, second time upon reaching 96% (no, I did not accidentally allow the system to reboot before any of the updates had finished installing).

      Updated 1 x Win10 Home 22H2 machine with August CU (KB5041580), .NET Framework update, .NET 6 update and MSRT v5.127 without issues at all, system rebooted only once upon reaching 30% installation.

      1 user thanked author for this post.
    • #2700499

      I have installed this months updates and everything was normal. PC has been on for 24 hours and seem normal as well.

      1 user thanked author for this post.
    • #2700802

      Updated 3 Win10 Pro and one Win11 Pro without incident after skipping prior month update.

      No dual boot or other complications.

      I post this because I appreciate when others post their updating success or failures.

      Pioneers wear arrow shirts…appreciate their sacrifice.

      2 users thanked author for this post.
    Viewing 16 reply threads
    Reply To: Reply #2699661 in MS-DEFCON 4: Side effects for dual booters

    You can use BBCodes to format your content.
    Your account can't use all available BBCodes, they will be stripped before saving.

    Your information:




    Cancel