-
Notifications
You must be signed in to change notification settings - Fork 158
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
automate running "sudo mokutil --import /var/lib/dkms/mok.pub
"
#429
Comments
If we automate it, and the user does not know what's happening, it will be prompted with the MOK enrollment screen. If the user cancels the operation, then the automation will try to rerun it again and again. I'm strongly against this. What we can do, is to add a hint/message to the output if the MOK key has not been enrolled yet. I'll make a prototype as soon as the other merge request are closed. |
Something like this (fake output):
|
Anything would be an improvement over the current state. However, it seems that DKMS already automates this action on 1 Linux distribution, namely Ubuntu. Here is the related source code copied here for convenience:
As per the source code comment " It may provide some sort of "moderation" (avoidance of adding keys the user does not wish to add, avoidance of adding keys over and over again) or other usability features. Debian as DKMS source code says lacks the |
Ubuntu's Debian's |
Fwiw personally I'm not excited about having more distro specific paths. The fact that update-secureboot-policy has diverged across distros (is undocumented, projects lacks CI, contribution guildlines etc) makes things even less compelling. If the latter is resolved, I would be more supportive of the idea. |
As of Debian bookworm, the most non-intuitive, difficult for users to figure out setup step that must be applied on Secure Boot enabled systems is the following:
This is documented in DKMS readme but that is not easily discovered by users.
The text was updated successfully, but these errors were encountered: