Page 1 of 1
MX and secure boot
Posted: Sun Oct 22, 2023 2:03 pm
by txtinman
I've installed Debian 12 on an uefi system with secure boot enabled and it works fine. As MX 23 is based on Debian 12 I would expect it to install as well. Was something changed or deleted that prevents MX from working with secure boot?
Re: MX and secure boot
Posted: Sun Oct 22, 2023 2:27 pm
by j2mcgreg
We don't have a signed kernel on offer.
Re: MX and secure boot
Posted: Sun Oct 22, 2023 2:39 pm
by Charlie Brown
The default kernel (6.1) is directly from Debian.
$ apt show linux-image-6.1.0-13-amd64
Package: linux-image-6.1.0-13-amd64
Version: 6.1.55-1
Built-Using: linux (= 6.1.55-1)
Priority: optional
Section: kernel
Source: linux-signed-amd64 (6.1.55+1)
Maintainer: Debian Kernel Team <
debian-kernel@lists.debian.org>
Installed-Size: 408 MB
Depends: kmod, linux-base (>= 4.3~), initramfs-tools (>= 0.120+deb8u2) | linux-initramfs-tool
Recommends: firmware-linux-free, apparmor
Suggests: linux-doc-6.1, debian-kernel-handbook, grub-pc | grub-efi-amd64 | extlinux
Conflicts: linux-image-6.1.0-13-amd64
-unsigned
Breaks: fwupdate (<< 12-7), initramfs-tools (<< 0.120+deb8u2), wireless-regdb (<< 2019.06.03-1~)
Replaces: linux-image-6.1.0-13-amd64
-unsigned
Homepage:
https://www.kernel.org/
Download-Size: 68.7 MB
APT-Sources:
http://debian.ipacct.com/debian bookworm/main amd64 Packages
Description: Linux 6.1 for 64-bit PCs (
signed)
The Linux kernel 6.1 and modules for use on PCs with AMD64, Intel 64 or VIA Nano processors.
The
kernel image and modules are signed for use with Secure Boot.
Re: MX and secure boot
Posted: Sun Oct 22, 2023 5:47 pm
by fehlix
txtinman wrote: Sun Oct 22, 2023 2:03 pm
I've installed Debian 12 on an uefi system with secure boot enabled and it works fine. As MX 23 is based on Debian 12 I would expect it to install as well. Was something changed or deleted that prevents MX from working with secure boot?
You can boot with MX Linux and Debian's signed kernel with secure boot enabled.
E.g all 64bit MX ISO's except the ahs ISO do boot from DVD or LiveUSB with secureboot enabled.
For installed it would require to also get Debian's signed boot loader (which we have on the ISO.),
but that just one package to get installed.
As MX also supports non-signed kernels and non-signed dkms-wifi driver secure boot is not enabled OOTB,
b/c this would break booting with non-sigened kernel and may disable some wifi driver.
Re: MX and secure boot
Posted: Sun Oct 22, 2023 8:01 pm
by j2mcgreg
@fehlix
Does this mean that we should stop telling prospective users to disable Secure Boot prior to installing MX?
Re: MX and secure boot
Posted: Mon Oct 23, 2023 2:52 am
by fehlix
j2mcgreg wrote: Sun Oct 22, 2023 8:01 pm
@fehlix
Does this mean that we should stop telling prospective users to disable Secure Boot prior to installing MX?
You can secure-boot from a MX Live media with a Debian signed kernel (except the MX AHS iso). And you can also install MX Linux onto the drive using MX Installer when having secure boot enabled. To keep in mind: The installation has two major parts: The MX Linux system and the boot loader. The point is that current MX Installer would install an unsigned boot loader only. Which means with secure boot enabled you would need to boot into the MX Linux system either with help of another signed boot loader, e.g from another secure-boot capable installation or from the MX LiveUSB, which offers to search for and boot into installed system. So in short, you would tell people, currently MX Linux installation is not fully secure boot capable mainly due to support of other unsigned kernels, e.g. liquorix kernels. So in order to boot into the system easiest at least after the installation to turn off secure boot within the UEFI system setup (aka PC-BIOS system settings).
Re: MX and secure boot
Posted: Mon Oct 23, 2023 3:21 am
by operadude
Thank you @fehlix for the explanation.
I hadn't thought about it, but my experience of booting-up lots of PCs and Laptops with an MX-Live USB, the machines all boot OK, without me having to turn off Secure Boot in the BIOS/UEFI settings.
As you say, post-install is a different story, but easily corrected by turning-off Secure Boot.
Thanks again for your clarity!
Re: MX and secure boot
Posted: Mon Oct 23, 2023 11:25 am
by txtinman
In my case secure boot cannot be disabled. I was trying to install the AHS version also. I found that on the computer I have the MX versions without AHS do not recognize the wifi card.
Re: MX and secure boot
Posted: Mon Oct 23, 2023 12:46 pm
by txtinman
fehlix wrote: Sun Oct 22, 2023 5:47 pm
txtinman wrote: Sun Oct 22, 2023 2:03 pm
I've installed Debian 12 on an uefi system with secure boot enabled and it works fine. As MX 23 is based on Debian 12 I would expect it to install as well. Was something changed or deleted that prevents MX from working with secure boot?
You can boot with MX Linux and Debian's signed kernel with secure boot enabled.
E.g all 64bit MX ISO's except the ahs ISO do boot from DVD or LiveUSB with secureboot enabled.
For installed it would require to also get Debian's signed boot loader (which we have on the ISO.),
but that just one package to get installed.
As MX also supports non-signed kernels and non-signed dkms-wifi driver secure boot is not enabled OOTB,
b/c this would break booting with non-sigened kernel and may disable some wifi driver.
Ok I gave it a try. I installed MX 23.1 KDE and it booted with secure boot enabled. It works fine except it does not recognize my Realtek wifi. I knew this going in. Sound works and works better than the other distros I've been trying to get to work with this computer.
Since KDE worked, I decided to try the AHS version with xfce. This version installed and booted also with secure boot enabled. Sees my Realtek card and sound works also, although not as well as the KDE version. The KDE version has the AHS repos installed, so maybe I can install a different kernel to get my wifi working as I would rather use KDE than xfce.
So it would appear that the 23.1 version will work with secure boot enabled. That's good for those of us who can't disable it in the bios.
Re: MX and secure boot
Posted: Mon Oct 23, 2023 12:51 pm
by Charlie Brown
You can simply install the "Debian 6.5 AHS" kernel when on KDE with "MX Package Installer" with 2 clicks.
(or just download the deb files beforehand when you have internet with others).
Re: MX and secure boot
Posted: Mon Oct 23, 2023 2:07 pm
by txtinman
Charlie Brown wrote: Mon Oct 23, 2023 12:51 pm
You can simply install the "Debian 6.5 AHS" kernel when on KDE with "MX Package Installer" with 2 clicks.
(or just download the deb files beforehand when you have internet with others).
So the package installer couldn't find the 6.5 kernel despite it being in the list. I installed the 6.3 ahs kernel and it sees my wifi now. However something is wonky with the audio. In system settings/audio it tests fine. Click on left speaker and get "left front", and likewise the right speaker. But no sound comes out when youtube or other audio source plays. Guess I'll try another kernel.
Didn't take long, just a reboot.
So, again MX-23.1 seems to boot just fine with secure boot enabled. Even the AHS version. 
Re: MX and secure boot
Posted: Mon Oct 23, 2023 2:31 pm
by Charlie Brown
You can still install the "Liquorix 6.5" on KDE :)
Re: MX and secure boot
Posted: Tue Oct 24, 2023 1:25 pm
by txtinman
Charlie Brown wrote: Mon Oct 23, 2023 2:31 pm
You can still install the "Liquorix 6.5" on KDE :)
I wasn't familiar with that kernel so I didn't try it. The 6.3 is working good, so I may leave it for now.
Re: MX and secure boot
Posted: Tue Oct 24, 2023 2:41 pm
by fehlix
txtinman wrote: Mon Oct 23, 2023 2:07 pm
Charlie Brown wrote: Mon Oct 23, 2023 12:51 pm
You can simply install the "Debian 6.5 AHS" kernel when on KDE with "MX Package Installer" with 2 clicks.
(or just download the deb files beforehand when you have internet with others).
So the package installer couldn't find the 6.5 kernel despite it being in the list. I installed the 6.3 ahs kernel and it sees my wifi now. However something is wonky with the audio. In system settings/audio it tests fine. Click on left speaker and get "left front", and likewise the right speaker. But no sound comes out when youtube or other audio source plays. Guess I'll try another kernel.
Didn't take long, just a reboot.
So, again MX-23.1 seems to boot just fine with secure boot enabled. Even the AHS version.
Please post QSI (aka Quick System Info). Run the tool found in the menu (or type "qsi" in the search field)
and click "Copy for Forum". Now paste the content including code-tags like those [
code]here[/code].
Thanks
Re: MX and secure boot
Posted: Thu Oct 26, 2023 9:51 am
by txtinman
fehlix wrote: Tue Oct 24, 2023 2:41 pm
txtinman wrote: Mon Oct 23, 2023 2:07 pm
Charlie Brown wrote: Mon Oct 23, 2023 12:51 pm
You can simply install the "Debian 6.5 AHS" kernel when on KDE with "MX Package Installer" with 2 clicks.
(or just download the deb files beforehand when you have internet with others).
So the package installer couldn't find the 6.5 kernel despite it being in the list. I installed the 6.3 ahs kernel and it sees my wifi now. However something is wonky with the audio. In system settings/audio it tests fine. Click on left speaker and get "left front", and likewise the right speaker. But no sound comes out when youtube or other audio source plays. Guess I'll try another kernel.
Didn't take long, just a reboot.
So, again MX-23.1 seems to boot just fine with secure boot enabled. Even the AHS version.
Please post QSI (aka Quick System Info). Run the tool found in the menu (or type "qsi" in the search field)
and click "Copy for Forum". Now paste the content including code-tags like those [
code]here[/code].
Thanks
Here you go-
Code: Select all
System:
Kernel: 6.3.0-2mx-ahs-amd64 [6.3.11-1~mx23ahs] arch: x86_64 bits: 64 compiler: gcc v: 12.2.0
parameters: BOOT_IMAGE=/boot/vmlinuz-6.3.0-2mx-ahs-amd64 root=UUID=<filter> ro quiet splash
Desktop: KDE Plasma v: 5.27.5 wm: kwin_x11 vt: 7 dm: SDDM Distro: MX-23.1_KDE_x64 Libretto
October 15 2023 base: Debian GNU/Linux 12 (bookworm)
Machine:
Type: Desktop Mobo: N/A model: N/A serial: <superuser required> UEFI: American Megatrends
v: CK12V101 date: 08/11/2022
Battery:
Device-1: hidpp_battery_0 model: Logitech Wireless Keyboard serial: <filter>
charge: 55% (should be ignored) rechargeable: yes status: discharging
CPU:
Info: model: Intel Core i7-10810U bits: 64 type: MT MCP arch: Comet Lake gen: core 10 level: v3
note: check built: 2020 process: Intel 14nm family: 6 model-id: 0xA6 (166) stepping: 0
microcode: 0xF8
Topology: cpus: 1x cores: 6 tpc: 2 threads: 12 smt: enabled cache: L1: 384 KiB
desc: d-6x32 KiB; i-6x32 KiB L2: 1.5 MiB desc: 6x256 KiB L3: 12 MiB desc: 1x12 MiB
Speed (MHz): avg: 1541 high: 1600 min/max: 400/4900 scaling: driver: intel_pstate
governor: powersave cores: 1: 1600 2: 1600 3: 1600 4: 1600 5: 1600 6: 1600 7: 1600 8: 1600
9: 1600 10: 1600 11: 900 12: 1600 bogomips: 38399
Flags: avx avx2 ht lm nx pae sse sse2 sse3 sse4_1 sse4_2 ssse3 vmx
Vulnerabilities:
Type: itlb_multihit status: KVM: VMX disabled
Type: l1tf status: Not affected
Type: mds status: Not affected
Type: meltdown status: Not affected
Type: mmio_stale_data mitigation: Clear CPU buffers; SMT vulnerable
Type: retbleed mitigation: Enhanced IBRS
Type: spec_store_bypass mitigation: Speculative Store Bypass disabled via prctl
Type: spectre_v1 mitigation: usercopy/swapgs barriers and __user pointer sanitization
Type: spectre_v2 mitigation: Enhanced / Automatic IBRS, IBPB: conditional, RSB filling,
PBRSB-eIBRS: SW sequence
Type: srbds status: Not affected
Type: tsx_async_abort status: Not affected
Graphics:
Device-1: Intel Comet Lake UHD Graphics driver: i915 v: kernel arch: Gen-9.5 process: Intel 14nm
built: 2016-20 ports: active: HDMI-A-1 empty: HDMI-A-2 bus-ID: 00:02.0 chip-ID: 8086:9bca
class-ID: 0300
Display: x11 server: X.Org v: 1.21.1.7 with: Xwayland v: 22.1.9 compositor: kwin_x11 driver: X:
loaded: modesetting unloaded: fbdev,vesa dri: iris gpu: i915 display-ID: :0 screens: 1
Screen-1: 0 s-res: 1680x1050 s-dpi: 96 s-size: 443x277mm (17.44x10.91") s-diag: 522mm (20.57")
Monitor-1: HDMI-A-1 mapped: HDMI-1 model: Samsung serial: <filter> built: 2011 res: 1680x1050
hz: 60 dpi: 267 gamma: 1.2 size: 160x90mm (6.3x3.54") diag: 801mm (31.5") ratio: 16:9 modes:
max: 1920x1080 min: 720x400
API: OpenGL v: 4.6 Mesa 23.1.2-1~mx23ahs renderer: Mesa Intel UHD Graphics (CML GT2)
direct-render: Yes
Audio:
Device-1: Intel Comet Lake PCH-LP cAVS driver: sof-audio-pci-intel-cnl
alternate: snd_hda_intel,snd_sof_pci_intel_cnl bus-ID: 00:1f.3 chip-ID: 8086:02c8 class-ID: 0401
API: ALSA v: k6.3.0-2mx-ahs-amd64 status: kernel-api tools: alsamixer,amixer
Server-1: PipeWire v: 0.3.65 status: active with: 1: pipewire-pulse status: active
2: wireplumber status: active 3: pipewire-alsa type: plugin 4: pw-jack type: plugin
tools: pactl,pw-cat,pw-cli,wpctl
Network:
Device-1: Realtek RTL8111/8168/8411 PCI Express Gigabit Ethernet driver: r8169 v: kernel pcie:
gen: 1 speed: 2.5 GT/s lanes: 1 port: 4000 bus-ID: 01:00.0 chip-ID: 10ec:8168 class-ID: 0200
IF: eth0 state: down mac: <filter>
Device-2: Realtek driver: rtw89_8852be v: kernel modules: wl pcie: gen: 1 speed: 2.5 GT/s
lanes: 1 port: 3000 bus-ID: 02:00.0 chip-ID: 10ec:b852 class-ID: 0280
IF: wlan0 state: up mac: <filter>
Bluetooth:
Device-1: Realtek Bluetooth Radio type: USB driver: btusb v: 0.8 bus-ID: 1-7:4 chip-ID: 0bda:b85b
class-ID: e001 serial: <filter>
Report: hciconfig ID: hci0 rfk-id: 1 state: up address: <filter>
Info: acl-mtu: 1021:6 sco-mtu: 255:12 link-policy: rswitch hold sniff park
link-mode: peripheral accept service-classes: rendering, capturing, object transfer, audio,
telephony
Drives:
Local Storage: total: 2.29 TiB used: 25.29 GiB (1.1%)
SMART Message: Unable to run smartctl. Root privileges required.
ID-1: /dev/sda maj-min: 8:0 model: FPT330M8SSD512G size: 476.94 GiB block-size: physical: 512 B
logical: 512 B speed: 6.0 Gb/s type: SSD serial: <filter> rev: X1.5 scheme: GPT
ID-2: /dev/sdb maj-min: 8:16 type: USB vendor: Seagate model: Expansion size: 1.82 TiB
block-size: physical: 4096 B logical: 512 B type: N/A serial: <filter> rev: 0710 scheme: GPT
Partition:
ID-1: / raw-size: 476.69 GiB size: 468.13 GiB (98.21%) used: 25.29 GiB (5.4%) fs: ext4
dev: /dev/sda2 maj-min: 8:2
ID-2: /boot/efi raw-size: 256 MiB size: 252 MiB (98.46%) used: 274 KiB (0.1%) fs: vfat
dev: /dev/sda1 maj-min: 8:1
Swap:
Kernel: swappiness: 15 (default 60) cache-pressure: 100 (default)
ID-1: swap-1 type: file size: 4 GiB used: 0 KiB (0.0%) priority: -2 file: /swap/swap
Sensors:
System Temperatures: cpu: 65.0 C pch: 61.0 C mobo: N/A
Fan Speeds (RPM): N/A
Repos:
Packages: pm: dpkg pkgs: 2562 libs: 1445 tools: apt,apt-get,aptitude,nala pm: rpm pkgs: 0
pm: flatpak pkgs: 0
No active apt repos in: /etc/apt/sources.list
Active apt repos in: /etc/apt/sources.list.d/debian-stable-updates.list
1: deb http://deb.debian.org/debian bookworm-updates main contrib non-free non-free-firmware
Active apt repos in: /etc/apt/sources.list.d/debian.list
1: deb http://deb.debian.org/debian bookworm main contrib non-free non-free-firmware
2: deb http://security.debian.org/debian-security bookworm-security main contrib non-free non-free-firmware
Active apt repos in: /etc/apt/sources.list.d/mx.list
1: deb http://mirrors.rit.edu/mxlinux/mx-packages/mx/repo/ bookworm main non-free
2: deb http://mirrors.rit.edu/mxlinux/mx-packages/mx/repo/ bookworm ahs
Info:
Processes: 302 Uptime: 5m wakeups: 3 Memory: 15.5 GiB used: 2.55 GiB (16.4%) Init: SysVinit
v: 3.06 runlevel: 5 default: graphical tool: systemctl Compilers: gcc: 12.2.0 alt: 12
Client: shell wrapper v: 5.2.15-release inxi: 3.3.26
Boot Mode: UEFI
Re: MX and secure boot
Posted: Thu Oct 26, 2023 12:41 pm
by fehlix
txtinman wrote: Thu Oct 26, 2023 9:51 am
fehlix wrote: Tue Oct 24, 2023 2:41 pm
txtinman wrote: Mon Oct 23, 2023 2:07 pm
So, again MX-23.1 seems to boot just fine with secure boot enabled. Even the AHS version.
Please post QSI (aka Quick System Info). Run the tool found in the menu (or type "qsi" in the search field)
and click "Copy for Forum". Now paste the content including code-tags like those [
code]here[/code].
Thanks
Here you go-
Code: Select all
System:
Kernel: 6.3.0-2mx-ahs-amd64 [6.3.11-1~mx23ahs] arch: x86_64 bits: 64 compiler: gcc v: 12.2.0
parameters: BOOT_IMAGE=/boot/vmlinuz-6.3.0-2mx-ahs-amd64 root=UUID=<filter> ro quiet splash
Desktop: KDE Plasma v: 5.27.5 wm: kwin_x11 vt: 7 dm: SDDM Distro: MX-23.1_KDE_x64 Libretto
October 15 2023 base: Debian GNU/Linux 12 (bookworm)
Info:
Processes: 302 Uptime: 5m wakeups: 3 Memory: 15.5 GiB used: 2.55 GiB (16.4%) Init: SysVinit
v: 3.06 runlevel: 5 default: graphical tool: systemctl Compilers: gcc: 12.2.0 alt: 12
Client: shell wrapper v: 5.2.15-release inxi: 3.3.26
Boot Mode: UEFI
Within QSI the boot mode is indicated. In case of enabled secure boot it would have been shown as such .
So, as mentioned you won't be able to boot an unsigned kernel when secure boot was enabled.
And all MX compiled ahs kernels are not signed.
You can check by yourself the secure boot state by running this:
Re: MX and secure boot
Posted: Thu Oct 26, 2023 1:33 pm
by txtinman
fehlix wrote: Thu Oct 26, 2023 12:41 pm
txtinman wrote: Thu Oct 26, 2023 9:51 am
fehlix wrote: Tue Oct 24, 2023 2:41 pm
Please post QSI (aka Quick System Info). Run the tool found in the menu (or type "qsi" in the search field)
and click "Copy for Forum". Now paste the content including code-tags like those [
code]here[/code].
Thanks
Here you go-
Code: Select all
System:
Kernel: 6.3.0-2mx-ahs-amd64 [6.3.11-1~mx23ahs] arch: x86_64 bits: 64 compiler: gcc v: 12.2.0
parameters: BOOT_IMAGE=/boot/vmlinuz-6.3.0-2mx-ahs-amd64 root=UUID=<filter> ro quiet splash
Desktop: KDE Plasma v: 5.27.5 wm: kwin_x11 vt: 7 dm: SDDM Distro: MX-23.1_KDE_x64 Libretto
October 15 2023 base: Debian GNU/Linux 12 (bookworm)
Info:
Processes: 302 Uptime: 5m wakeups: 3 Memory: 15.5 GiB used: 2.55 GiB (16.4%) Init: SysVinit
v: 3.06 runlevel: 5 default: graphical tool: systemctl Compilers: gcc: 12.2.0 alt: 12
Client: shell wrapper v: 5.2.15-release inxi: 3.3.26
Boot Mode: UEFI
Within QSI the boot mode is indicated. In case of enabled secure boot it would have been shown as such .
So, as mentioned you won't be able to boot an unsigned kernel when secure boot was enabled.
And all MX compiled ahs kernels are not signed.
You can check by yourself the secure boot state by running this:
You're right. It is disabled, but how? I didn't do it. In the bios setup page there isn't a secure boot toggle and the manufacturer said it couldn't be disabled. Maybe you have to install a signed kernel and then install the unsigned one?
Re: MX and secure boot
Posted: Thu Oct 26, 2023 2:40 pm
by Charlie Brown
Re: MX and secure boot
Posted: Thu Oct 26, 2023 3:49 pm
by Jerry3904
@dolphin_oracle Would it be a good idea to have a single clear Blog entry on this topic sometime? (Hope you didn't already do one...)
Re: MX and secure boot
Posted: Thu Oct 26, 2023 4:03 pm
by FullScale4Me
Jerry3904 wrote: Thu Oct 26, 2023 3:49 pm
@dolphin_oracle Would it be a good idea to have a single clear Blog entry on this topic sometime? (Hope you didn't already do one...)
Seems to already exist in the form of a post (and a link to another)
viewtopic.php?p=705225#p705225
Re: MX and secure boot
Posted: Thu Oct 26, 2023 4:09 pm
by Jerry3904
I know, thanks. But posts are hard to find and a Blog is easy. Plus I'm thinking of the general change in the Secure Boot scene.
Re: MX and secure boot
Posted: Thu Oct 26, 2023 4:14 pm
by FullScale4Me
I should have been clearer. My intent was to save Dolphin the pain of starting from a plain white screen for the first draft of the blog post.
It sorta has an anchor point on the MX WiKi article
Dual Boot https://mxlinux.org/wiki/system/dual-boot/
Re: MX and secure boot
Posted: Thu Oct 26, 2023 4:16 pm
by richb
@Jerry3904 Agree Jerry. I was under the impression that MX KDE having an AHS kernel would not boot with secure boot enabled. But at this point I am not even sure KDE does have an AHS kernel. Trying to decipher all the posts on the topic has confused me. A single definitive blog entry would be very helpful.
Re: MX and secure boot
Posted: Thu Oct 26, 2023 4:29 pm
by Charlie Brown
In MXPI - Kernels section they're called "Debian ... (AHS)" .. therefore I was thinking that they were (originally) from Debian (hence signed).
Re: MX and secure boot
Posted: Thu Oct 26, 2023 4:34 pm
by FullScale4Me
Not mentioned in fehlix's post is the requirement of a TPM in either Firmware or hardware. This is to store Debian's local copy of their signing key.
Said differently - a PC that came with Windows 7 or older most likely will NOT support Secure Boot.
When I worked in PC retail sales we did sell a LOT of new (post Windows 8 release) PCs with a TPM data store implemented but a roll back windows 7 license as these buyers did NOT want "The Windows 8 virus!". IIRC we were still selling them (by special order) past the Windows 10 release of July 2015. So, there's several hundred of these out there just in central New Jersey!
Re: MX and secure boot
Posted: Thu Oct 26, 2023 5:12 pm
by fehlix
FullScale4Me wrote: Thu Oct 26, 2023 4:34 pm
Not mentioned in fehlix's post is the requirement of a
TPM in either Firmware or hardware. This is to store Debian's local copy of their signing key.
Nope, that's not an requirement for Secure Boot. Validation is done in shim , which is an signed efi-binary holding Debian's pub-key signed with Microsoft's signature. So no need to hold anywhere Debian's signing key except in shim which is on the ESP (EFI System Partition)
It goes very roughly this way:
UEFI system checks two files on the ESP first shimx64.efi, which is signed by Microsoft and this contains Debian's signing pub-key.
Next check is the efi-grub loader, where Debian's signed pub-key is used to verify Debian's signature of the signed efi-grub bootloader.
The signed grub-loader finally loads the kernel, which again is verified with help of Debian's signed pub-key. Further any kernel module is sb-verified check before loaded.
Re: MX and secure boot
Posted: Thu Oct 26, 2023 5:17 pm
by FullScale4Me
OK, so Today I Learned aka TIL!
So, what is MOKutil up to during the MX Linux installation process?
Re: MX and secure boot
Posted: Thu Oct 26, 2023 5:22 pm
by fehlix
richb wrote: Thu Oct 26, 2023 4:16 pm
@Jerry3904 Agree Jerry. I was under the impression that MX KDE having an AHS kernel would not boot with secure boot enabled. But at this point I am not even sure KDE does have an AHS kernel. Trying to decipher all the posts on the topic has confused me. A single definitive blog entry would be very helpful.
I think there was a change in MX23 KDE where AHS repo is enabled, but the kernel is Debian's signed kernel not one compiled by MX available on AHS-repo.
On MX-21.3 KDE we had the unsigned kernel vmlinuz-6.0.0-6mx-amd64 from ahs repo.
On MX-23.1_KDE we have now Debian's signed kernels vmlinuz-6.1.0-13-amd64 :
here to "view" or list the signature with the kernel:
Code: Select all
sbverify --list /boot/vmlinuz-6.1.0-13-amd64
signature 1
image signature issuers:
- /CN=Debian Secure Boot CA
image signature certificates:
- subject: /CN=Debian Secure Boot Signer 2022 - linux
issuer: /CN=Debian Secure Boot CA
Re: MX and secure boot
Posted: Thu Oct 26, 2023 5:26 pm
by fehlix
FullScale4Me wrote: Thu Oct 26, 2023 5:17 pm
OK, so Today I Learned aka TIL!
So, what is MOKutil up to during the MX Linux installation process?
mokutils is used for communicating with the secure key environment on the UEFI system,
e.g for implantation of new keys either signed or self genrated mok-keys (Machine Owner's Key)
Or for sending instruction to trigger a confirmation process to disable signature valdation in shim,
which is kind of disabling secure boot for Linux by keep secure boot enabled for Windows.
Re: MX and secure boot
Posted: Thu Oct 26, 2023 5:29 pm
by richb
@fehlix Thanks. That clears it up for me. I was conflating old information on MX 21 with MX 23.