Shuttleworth Calls for Declarative Firmware
Ubuntu founder denounces insecurity in proprietary, close-source software blobs.
Ubuntu founder Mark Shuttleworth has called for an end to the dominance of the ACPI power management and device configuration interface used for firmware configuration in many PCs. In a recent blog post, Shuttleworth points out that low-quality, closed source firmware as a major threat to system security.
"If you read the catalog of spy tools and digital weaponry provided to us by Edward Snowden, you'll see that firmware on your device is the NSA's best friend. Your biggest mistake might be to assume that the NSA is the only institution abusing this position of trust--in fact, it's reasonable to assume that all firmware is a cesspool of insecurity, courtesy of incompetence of the worst degree from manufacturers, and competence of the highest degree from a very wide range of such agencies."
Shuttleworth goes on to call the ACPI system a "trojan horse of monumental proportions," adding portentously, "I've been to Troy; there is not much left."
According to Shuttleworth, blobs of commercial, closed-source code in the firmware just opens the door for sophisticated intruders, whether they are government spies or conventional criminals. His solution:
Firmware should be open source, so the code can be checked and verified, and innovative new features should be submitted through an upstream, peer-reviewed process such as the Linux kernel development process.
Firmware should be declarative, meaning that it describes "hardware linkages and dependencies" and doesn't include executable code.
Mark Shuttleworth is artful enough to sense that the furor over the NSA spying scandal means the world might be especially receptive right now to a pitch about the benefits of free software. Beyond the public relations, however, is an interesting development for Shuttleworth's own beloved Ubuntu project. The Free Sofware Foundation still lists Ubuntu as a "nonfree GNU/Linux distribution," noting that "...the version of Linux, the kernel, included in Ubuntu contains firmware blobs."
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Subscribe to our ADMIN Newsletters
Support Our Work
Linux Magazine content is made possible with support from readers like you. Please consider contributing when you’ve found an article to be beneficial.
News
-
Juno Computers Launches Another Linux Laptop
If you're looking for a powerhouse laptop that runs Ubuntu, the Juno Computers Neptune 17 v6 should be on your radar.
-
ZorinOS 17.1 Released, Includes Improved Windows App Support
If you need or desire to run Windows applications on Linux, there's one distribution intent on making that easier for you and its new release further improves that feature.
-
Linux Market Share Surpasses 4% for the First Time
Look out Windows and macOS, Linux is on the rise and has even topped ChromeOS to become the fourth most widely used OS around the globe.
-
KDE’s Plasma 6 Officially Available
KDE’s Plasma 6.0 "Megarelease" has happened, and it's brimming with new features, polish, and performance.
-
Latest Version of Tails Unleashed
Tails 6.0 is based on Debian 12 and includes GNOME 43.
-
KDE Announces New Slimbook V with Plenty of Power and KDE’s Plasma 6
If you're a fan of KDE Plasma, you'll be thrilled to hear they've announced a new Slimbook with an AMD CPU and the latest version of KDE Plasma desktop.
-
Monthly Sponsorship Includes Early Access to elementary OS 8
If you want to get a glimpse of what's in the pipeline for elementary OS 8, just set up a monthly sponsorship to help fund its continued existence.
-
DebConf24 to be Held in South Korea
Busan will be the location of the latest DebConf running July 28 through August 4
-
Fedora Unleashes Atomic Desktops
Fedora has combined its solid distribution with rpm-ostree system to make it possible to deliver a new family of Fedora spins, called Fedora Atomic Desktops.
-
Bootloader Vulnerability Affects Nearly All Linux Distributions
The developers of shim have released a version to fix numerous security flaws, including one that could enable remote control execution of malicious code under certain circumstances.