this post was submitted on 11 Aug 2025
52 points (91.9% liked)

Linux Gaming

20598 readers
310 users here now

Discussions and news about gaming on the GNU/Linux family of operating systems (including the Steam Deck). Potentially a $HOME away from home for disgruntled /r/linux_gaming denizens of the redditarian demesne.

This page can be subscribed to via RSS.

Original /r/linux_gaming pengwing by uoou.

No memes/shitposts/low-effort posts, please.

Resources

WWW:

Discord:

IRC:

Matrix:

Telegram:

founded 2 years ago
MODERATORS
 

Id like to hear thoughts. Of course us gamers hate kernel level anti cheat, but is that actually tied to secureboot?

I know some/most distros can boot in secure mode, so it doesn't seem like an issue there.

With all the new games moving to it, looks like we will all have to sit them out or install Spyware (microshit) to play. I will opt not to.

top 41 comments
sorted by: hot top controversial new old
[–] Crozekiel@lemmy.zip 5 points 1 day ago (1 children)

I've avoided kernal anti-cheat basically forever on principle. On the plus side, there is talk about Microsoft kicking 3rd parties out of the kernal on windows, stemming from the cloudstrike debacle. If they kick out anti-virus, I can't imagine that they let game publishers stay. We might actually see the death of kernal anti-cheat soon.

On a side-note, it's a really sad state that so much of the world runs on computers but the majority of people don't know the first thing about using them. It has led us to so many bad places today that I really didn't expect when I was a teen...

[–] StopSpazzing@lemmy.world 1 points 13 hours ago

Crowdstrike*

[–] donio@lemmy.world 6 points 1 day ago

It depends. If it's under your control with your own keys then it can be beneficial. If it's under someone else's control (as it is for most people) then it's a step towards the walled garden.

[–] sugar_in_your_tea@sh.itjust.works 50 points 3 days ago (1 children)

All secure boot does is ensue the binary (say, Linux or Windows kernel) run in early boot is "trusted," meaning it's cryptographically signed by a key the motherboard has. You can usually load your own keys and sign your own binaries, but I imagine only large orgs do that if they have a lot of Linux systems or something.

The way Linux works with this is they use a shim binary that is signed by Microsoft's key, and that binary loads the actual Linux kernel. The kernel itself is not signed with that key.

The only way this impacts gaming is if games check if Secure Boot is enabled. If it is enabled, the game knows the system booted with something signed by a key the motherboard trusts. For most systems, that means Microsoft's keys, but AFAIK, they can't check what key was used in early boot unless the kernel provides some indication of that.

Basically, it's an anti-tampering check, so they have some assurance the kernel is untampered from what the maintainer released.

[–] exu@feditown.com 28 points 3 days ago (1 children)

Some newer distros like Bazzite are pretty awesome in that they install their own Secure Boot keys during the first time setup.

[–] sugar_in_your_tea@sh.itjust.works 13 points 3 days ago* (last edited 3 days ago) (1 children)

That's pretty dope! I imagine we'll see more distros follow suit as the September expiration of Microsoft's keys approaches.

My distro, openSUSE Tumbleweed, does that as well, but I imagine plenty don't.

Edit: I'm wrong, looks like they do that for "Trusted Boot," but not "secure boot," if this documentation is to be believed. It's an option, not forced. I'm going to check later if it's configured properly on my machine that I set up several years ago.

[–] redsand@lemmy.dbzer0.com 1 points 2 days ago (1 children)

Apparently. OpenSUSE is going hard on the "we build quality" angle, and I'm here for it.

[–] BlameTheAntifa@lemmy.world 28 points 2 days ago (3 children)

Neither Secure Boot nor TPM were ever actually about security and neither meaningfully improves security. They are DRM features that exist solely to ensure you can never truly own the things you buy.

How is TPM involved in making sure you don't own things? It certainly improves security (other than the poorly made ones at least)

[–] pishadoot@sh.itjust.works 22 points 2 days ago

Um, TPMs for sure provide meaningful security. Maybe their use is implemented poorly a lot of the time, AND they can be abused to hold control over hardware you've purchased, but low level exploits are for sure a thing and TPMs and other dedicated hardware security modules (for enterprise) most definitely serve a purpose.

They're a response to the ever evolving advancement of cyber exploits. Don't knock them on principle, take affront to when they're used poorly.

[–] bridgeenjoyer@sh.itjust.works 3 points 2 days ago

There's the truth. Thank you.

Sticking to linux and indie games forever then !

[–] Bishma@discuss.tchncs.de 26 points 2 days ago* (last edited 2 days ago)

The biggest issue to me is that if you (the OS maker) wants a shim so you can use your own CA, you have to go through Microsoft. And they can just say no.

I think Tuxedo is still waiting on their shim.

[–] SoftestSapphic@lemmy.world 19 points 2 days ago

Kernal level anticheat is invasive and the vast majority of anticheats are probably installing spyware with root access.

[–] that_leaflet@lemmy.world 27 points 3 days ago (2 children)

For Linux, the protection is weak.

But if properly implemented, it’s good. But it would be a hassle to do and would require users to register new keys and blacklist Microsoft’s.

Measured boot is a better solution for Linux. It’s decentralized and does not rely on Microsoft. It uses the TPM to “measure” various parts of the UEFI, bootloader, and OS to ensure they have not been tampered with.

[–] lemonskate@lemmy.world 8 points 3 days ago (1 children)

Measured boot requires secure boot to be enabled as one of its components.

The real value of measured boot is when paired with full disk encryption as it protects against boot loader attacks that can compromise your sealed keys.

[–] that_leaflet@lemmy.world 3 points 2 days ago

I don't believe that's the case, according to Aeon. The state of secure boot can be measured, so if you have it enabled/disabled, you have to keep it that way or else the measurement will fail and the TPM will complain.

[–] naeap@sopuli.xyz 4 points 3 days ago (1 children)

Never heard of that

Does "every" modern BIOS support that?
Need to read up on it...

[–] that_leaflet@lemmy.world 12 points 3 days ago* (last edited 3 days ago) (2 children)

No, it requires a TPM2 chip. So the requirements for measured boot are to similar to Windows 11.

Poettering has a few blog posts and conference videos on it. And Aeon is a distro that implements measured boot as the default.

[–] sugar_in_your_tea@sh.itjust.works 8 points 3 days ago (1 children)

I use Aeon on my laptop, and I will say there are usability issues, but hopefully the kinks get worked out. Since installing in March, I've had to enter my recovery key and reenroll three times due to some kind of firmware update. This is on an older laptop (Ryzen 3500U), so I don't know if it's a common issue or unique to me.

Anyway, it's a cool idea, I hope it gets more attention. The benefits for regular users are fairly minimal, but I certainly appreciate security for security's sake.

[–] naeap@sopuli.xyz 1 points 2 days ago (1 children)

Thanks!

That's good to know.
As I need my laptop for work, I can't really risk such experiments...

Yeah, mine is just for mucking around at home. I mostly browse the web and play casual games. Nothing important is stored there, so if I need to reinstall, then so be it.

[–] naeap@sopuli.xyz 1 points 2 days ago

Ah, ok, gotcha.
Thanks for the input!

[–] jjjalljs@ttrpg.network 24 points 3 days ago

I kind of assume Microsoft's real motivation was to make Linux harder to install, and the "oh it's more secure" stuff is a happy coincidence for them.

[–] kbal@fedia.io 14 points 3 days ago (1 children)

It's not all bad necessarily, but that "anticheat" vendors are demanding it sure does suggest it's being used for nefarious purposes.

[–] BlameTheAntifa@lemmy.world 4 points 2 days ago

Except it was never about cheaters. It's about DRM. You don't own the things you buy and they want to make sure it stays that way.

[–] wizzim 12 points 3 days ago

Linux does support TPM and secure boot: https://wiki/ .debian.org/SecureBoot#What_is_UEFI_Secure_Boot.3F

So the problem is really only about kernel level anticheat, not the secure boot itself ?

[–] cmnybo@discuss.tchncs.de 8 points 2 days ago

It's pretty pointless if you allow it to use Microsoft's keys. It's a lot of work to set it up to only use your keys and that bricks certain poorly designed laptops.

[–] goatinspace@feddit.org 8 points 2 days ago

Secure boot is BS

[–] hisao@ani.social 9 points 3 days ago* (last edited 3 days ago) (1 children)

In my understanding, Secure Boot has absolutely nothing to do with games or kernel-level anticheats some games use. Those latter are completely different beasts, more similar to drivers. There are many concerns about Secure Boot, like how it can harm Linux adoption or eventually give MS hardware control overreach.

[–] bridgeenjoyer@sh.itjust.works 1 points 2 days ago (2 children)

Why do games require secureboot to be on then? Its gotta be related to their kernel level anti cheat.

I think both windows and Linux turn on a number of kernel hardening options when secure boot is on.

[–] hisao@ani.social 2 points 2 days ago (1 children)

Idk, this is the first time I hear about it. Do you know which particular games do this? I played few with kernel-level anticheats (Genshin Impact, League of Legends) without having Secure Boot on, even though my hardware fully supports it and I have it enabled now on Linux.

[–] bridgeenjoyer@sh.itjust.works 4 points 2 days ago* (last edited 2 days ago)

Fortnight and bf6, valorant, likely gta6. All games I wont play anyway

[–] coherent_domain 8 points 3 days ago* (last edited 2 days ago) (1 children)

Secureboot is a security measure to make sure the boot environment have not been tampered with. It would detect malwares that attempt to modify the boot environments. According to ArchWiki, it ensures "core boot components (boot manager, kernel, initramfs) have not been tampered with", which would protect against initramfs-swap attacks like de-LUKS, however there are conflicting reports on the internet, and I have not tried myself.

I personally don't find it makes Linux harder to install, like others suggested. Unless you use a surface device, it will happily accept the key for most common linux distro, including Ubuntu, Debian, Fedora, and many more. For most custom distros, you can easily register its key via MOK (require root privilege and confirmation in the UEFI, for security purpose). In fact, Debian project is quite clear on SecureBoot not being a tool for MS to monopolize the desktop market: https://wiki.debian.org/SecureBoot#What_is_UEFI_Secure_Boot_NOT.3F .

However, if you need to load additional kernel modules, like NVIDIA drivers, secureboot can get quite annoying. I am actually quite interested in why Windows don't have a problem loading additional drivers, yet Linux do.

In the end, I feel if you are using a distro that works with secureboot, there is no reason to leave it off; if you find it annoying, yet okay with a downgrade in security, then you might want to leave it off.

Isn't Windows a hybrid kernel? Perhaps things like drivers technically don't run in the kernel and instead technically operate outside of it. Linux loads kernel modules directly, so maybe that's the issue?

Or maybe drivers are also signed by Microsoft's key?

I don't know a ton about Secure Boot, so maybe it's something else entirely.

[–] fubarx@lemmy.world 7 points 2 days ago

Others have already explained the secure boot process. But one thing that might impact gaming is that TPMs also implement cryptographic acceleration in hardware. Not only does it speed up operations, it guarantees that the binary code for the library running on the chip hasn't been modified.

Some anti-cheat libraries might require the TPM and having secure boot on guarantees that feature exists.

[–] JackbyDev@programming.dev 7 points 3 days ago

No, it's not actually bad, it can just be a hassle to deal with. Much like when TLS was becoming the norm for websites there was a bit of an adjustment period when things weren't always configured just right or folks didn't have good auto renewal yet. It doesn't mean the tech is bad.

[–] TabbsTheBat@pawb.social 4 points 3 days ago (1 children)

¯⁠\⁠_⁠(⁠ツ⁠)⁠_⁠/⁠¯ it's not necessarily bad afaik, but it is a hassle if you don't use windows, so it's not something I plan on putting up with really

Thankfully none of the games I play seem to be going that route (yet)

[–] bridgeenjoyer@sh.itjust.works 2 points 2 days ago

The games that use it seem to be made by companies we shouldn't be supporting anyway, so win win.

[–] AntiBullyRanger@ani.social 1 points 2 days ago* (last edited 2 days ago)

🤭 nobody 🧵 talk𐑙 b𐑬t CVE-2025-7027.

𐑓 commoners.