Il 04/10/2023 17:11, Max Nikulin ha scritto:

from Windows update. Then I installed Windows 11 with upgrade assistant.
So far, no blacklist of old Clonezilla.

Do you mean that installing Windows 10 or 11 from scratch could behave differently?

I am curious if just booting a recent media published by Microsoft (not install, just booting till first dialog) may change secure boot keys. If I have got you right, Windows with all updates installed still allows to boot old Clonezilla.

Just booting had no effect. Even a Windows 11 complete install from scratch (on empty disk) does not block old Clonezilla boot.

Tried also with "get latest updates as soon as they are available" option.

I did it to exclude something not standard in OEM installation.

If firmware has the "EFI shell" option then you may try "bcfg boot dump -v". Unsure if it is possible to redirect output to a file.

I'll try. Is there nothing inside Linux efi tools?

Sorry, your question is unclear for me. I was trying to suggest a way to inspect UEFI boot variables without disturbing its state. If Linux images may do something with secure boot keys then I see the following alternatives:
- Firmware may have EFI shell boot option included
- Perhaps there are some tools for Windows

Now I have a machine again. No, there is only the entry for "EFI shell", but no one is included in firmware. It wants it on a usb key, and says that you have to disable secure boot to make it work.

So it doesn't seem to be a good diagnostic platform for secure boot.

My idea is to load tools on old Clonezilla, to compare the condition between before and after new Clonezilla boot.
I cannot use a new Linux, because I would see a just changed condition.

EDIT:
Now I've tried Fedora live: it doesn't act like Debian. After it, I can still boot old Clonezilla. Not only at grub page: I can also load live environment.
This is what I expect from a live.
So I can use it to dig into secure boot keys.

Reply via email to