I thought I was safe from this if I installed windows on a completely separate harddrive… I clearly overestimated Microsoft’s ability to make on operating system that does not act like literal malware. Oh well! I guess I’m 100% linux now.
You likely have secure boot and a Microsoft package key installed in UEFI. They likely did what they are supposed to do and removed the unsigned software.
You must either sign your own UEFI keys using the options in your bootloader that may or may not be present, or you must use a distro that has the m$ signed secure boot shim key. These are the only ways for both m$ and Linux to coexist. Indeed, with a shim key (Fedora/Ubuntu) you can easily have a windows partition on the same drive without issues.
Secure boot is a scheme to steal hardware ownership. Of course they say it is not because the standard specifies a mechanism to sign your own keys. However the standard specification is only a guideline and most consumer grade implementations do not allow custom key generation and signing.
If you need to do your own keys, search for the US defense department’s guide on the subject. It is by far the most comprehensive explanation of the system and how to set it up correctly. They have a big motivation to prevent corporate data stalking type nonsense and make this kind of documentation accessible publicly.
If your bootloader does not allow custom keys, there is a little known tool called Keytool that allows you to boot directly into UEFI and supposedly change the keys regardless of the implemented utility in the bootloader. I have never tried this myself. The only documentation I have found was from Gentoo, but their documentation assumes a very high level of competence.
deleted by creator
Great answer.
Windows went a step further on my machine. I thought it had just screwed up my bootloader, but when I went to restore it my Linux partition was completely gone. Windows Update had deleted the partition.
Malware is right.
as is tradition
How else would one motivate itself to learn about grub, boot partitions, UEFI, MBR and all the other wonderful crufty technologies involved in starting operating systems?
Is it just me or does no one actually know how any of it works, and everyone relies on a mixture of
grub-install
,os-prober
,Boot Repair
,bootcfg
, and random internet guides to make it all work? I dual boot windows and linux and I don’t understand where any of the boot files actually live or how they function. It feels like the deeper I dig, the more nondeterministic it all is.EFI booting is pretty straightforward, and you can mount and browse the efi boot partition easily to see the actual executable files, and view the entries added to firmware to point to them with efibootmgr.
MBR booting was not so fun.
There are resources out there to learn exactly what’s going on, and the process is not too complex.
I’ve recovered a bunch of nuked MBR records and broken boot partitions myself, and maybe things UEFI added some complexity, but it’s not hard if you have a live USB ready and know the appropriate conjurations.
Most of the fun comes from self centered arrogant companies that make monocultural software, blatantly ignoring that other OSs may already be installed.
I’ve spent the last two nights trying to rescue a windows installation from a rescue usb, and no amount of BCD recovery seems to help. It has forced me to take a closer look at the EFI partition, but even deleting it outright and recreating it from scratch still won’t boot. I think there must be something corrupted and I should just give up and reinstall. That’s windows for ya…
An example of something I just don’t understand, after deleting and recreating the EFI partition, and using bcdboot to repopulate it, I now see two Windows Boot Manager BBS entries listed in BIOS. No idea why, no idea how to find out. One site said I must have multiple entries in my BCD, but bcdedit just shows the standard
{bootmgr}
and{default}
OS entries.
deleted by creator
fTPM (hardware TPMs should be considered compromised at this point)
Interesting. Could you elaborate on that?
deleted by creator
Thanks, much appreciated!
It’s worth noting that this isn’t a bug in the tpm uhh 1.1(?) specification. It’s working as intended.
The system was designed to prevent compromises from software attacks and people yanking the hard drives, not keep an enterprising uart-haver at bay.
State level attackers were never the target of the tpm and neither were downwardly mobile highly educated individuals.
Not having to ever touch Windows again has made my life infinitely better. I can handle setting it up for a buddy on their new PC I’ll build. Getting to build a new PC is worth it. These fools don’t even realize how much I enjoy building their PCs. They don’t even charge me for it.
deleted by creator
/thread
UEFI or legacy BIOS? I recently installed Windows 11 on a machine with Proxmox on NVME but installed Windows on a SATA SSD. Windows added its boot entry to the NVME SSD but did not get rid of the Proxmox boot entry.
I’ve definitely had the same issue as you on in the past on legacy BIOS and when I worked in a computer shop 2014-2015 we always removed any extra drives before installing Windows to avoid this issue (not like the other drives had an OS anyway).
… may I ask what is your use case to install Wins alongside Proxmox (instead of in VM)?
In just curious & will prob learn something :).
It’s a gaming machine. I mainly use a gaming VM with GPU passthrough under Proxmox, but the anti-cheat is some games (Fortnite and The Finals) don’t allow you to run them in VMs. So I run those games in Windows directly under a standard user account as a compromise.
Ohh, interesting.
Also kinda dickish of them.
I kinda get it. The host has complete access to VM memory and can manipulate it without detection. Both of those games are free to play as well so cheating is more of an issue. I have no idea what Back4Blood’s justification would be though.
That said it’s a PITA and given the massive attack surface of Easy Anti Cheat it becomes easier to justify running in VMs where you can isolate things and use snapshots if there is ever a breach.
Welcome to the club :-) Microsoft, the true champion in overwriting boot loaders since 198…someth.ing TM ©
It does that for some decades already. The trick for dual booting was always to install Linux second. :/
welcome to the club 😂
did it overwrite your GRUB partition or did it just remove the uefi entry?
iirc the later is pretty easy to fix with efibootmgr if you have a live cd / usb
the partition was still there, but if i tried to boot from it would just kick me back to the bios. unless there’s some obscure grub bug that happened to trigger exactly after i booted into windows i guess…
the fix was pretty simple, i just reinstalled grub from a live environment.
RescaTux gives an easy UI that can fix it sometimes. Personally I prefer just going through the GRUB wiki page these days though. More reliable.
This is why my machine straight boots into linux and if I want windows I need to use the BIOS boot selector
Run it in a VM
Yeah, I didn’t risk dual booting. I have Windows 10 in a VM and a Windows 11 To Go USB drive.
Go into your bios and change boot order.