@@ -295,7 +295,7 @@ If this step is not completed, enrolling custom keys will be rejected by the fir
295
295
Next is creating the keys for secure boot. 'create-keys' creates the key
296
296
hierarchy needed for secure boot into "/usr/share/secureboot".
297
297
298
- $ sbctl create-keys
298
+ # sbctl create-keys
299
299
Created Owner UUID a9fbbdb7-a05f-48d5-b63a-08c5df45ee70
300
300
Creating secure boot keys...✔
301
301
Secure boot keys created!
@@ -305,9 +305,12 @@ on a live system instead of having to boot or run a key management tool from the
305
305
UEFI shell.
306
306
307
307
'Note': This can fail because of firmware issues and unique options in the
308
- machine BIOS menu.
308
+ machine BIOS menu. Also, some devices have hardware firmware that is signed and
309
+ validated when Secure Boot is enabled. Failing to validate this firmware could
310
+ brick devices. It's recommended to enroll your own keys with Microsoft
311
+ certificates using the '-m' option. See **Option ROM*** above.
309
312
310
- $ sbctl enroll-keys
313
+ # sbctl enroll-keys
311
314
Enrolling keys to EFI variables...✔
312
315
Enrolled keys to the EFI variables!
313
316
@@ -323,19 +326,19 @@ store the file path, so we don't need to manually sign it later.
323
326
Note that *sbctl* can only keep track of file paths. On versioned kernels this
324
327
might prove tricky.
325
328
326
- $ sbctl sign --save /efi/vmlinuz-linux
329
+ # sbctl sign --save /efi/vmlinuz-linux
327
330
✔ Signed /efi/vmlinuz-linux
328
331
329
332
Next is to sign the bootloader. This can usually be found on the standard path
330
333
below, but might differ between installations.
331
334
332
- $ sbctl sign --save /efi/EFI/BOOT/BOOTX64.EFI
335
+ # sbctl sign --save /efi/EFI/BOOT/BOOTX64.EFI
333
336
✔ Signed /efi/EFI/BOOT/BOOTX64.EFI
334
337
335
338
*sbctl* is able to find and verify the ESP, along with any saved files to verify
336
339
we have signed the files we need.
337
340
338
- $ sbctl verify
341
+ # sbctl verify
339
342
Verifying file database and EFI images in /efi...
340
343
✔ /efi/EFI/BOOT/BOOTX64.EFI is signed
341
344
✔ /efi/vmlinuz-linux is signed
@@ -353,7 +356,7 @@ Secure Boot or enter User Mode in the firmware.
353
356
When we do a system update, we can run 'sign-all' to resign all the saved files
354
357
from earlier.
355
358
356
- $ sbctl sign-all
359
+ # sbctl sign-all
357
360
File has already been signed /boot/vmlinuz-linux
358
361
✓ Signed /efi/EFI/BOOT/BOOTX64.EFI
359
362
@@ -362,7 +365,7 @@ the initramfs, kernel and cmdline into one executable which can be signed for
362
365
secure boot. This allows you to authenticate larger parts of the bootchain
363
366
instead of only signing the kernel.
364
367
365
- $ sbctl bundle -i /boot/intel-ucode.img
368
+ # sbctl bundle -i /boot/intel-ucode.img
366
369
-l /usr/share/systemd/bootctl/splash-arch.bmp
367
370
-k /boot/vmlinuz-linux
368
371
-f /boot/initramfs-linux-lts.img
0 commit comments