** Description changed: + [SRU Justification] + Move to using self-signed keys for signing DKMS modules, along with the wizard / guide to make this work properly, to let third-party modules be signed and loaded by enforcing kernels, rather than disabling Secure Boot altogether. + + [Test case] + 1) Install Ubuntu in UEFI mode. + 2) Install bbswitch-dkms (or another -dkms package if useful on your system). + 3) Follow the steps in the debconf prompts (enter a password, remember the password for next boot). + 4) Reboot; follow the steps in MokManagerL + 4a) Pick Enroll MOK: add the new key, enter the password when prompted to do so. + 4b) If the system was previously with Secure Boot disabled in shim (ie. a dkms package was previously installed), pick "Change Secure Boot state". Follow the prompts to enter password characters. + 5) Pick "Reboot". + 6) Log in and verify that the dkms module is loaded, using "lsmod | grep <module>". + 7) Run 'modprobe <module>' to validate that the module can be loaded explicilty. + 8) Validate that there are no errors from modprobe or errors in dmesg concerning signing keys. + + [Regression potential] + If anything currently relies on Secure Boot validation being disabled in order to correctly run with an enforcing kernel, or grub is used in enforcing mode, custom / third-party kernels and modules may fail to load. + + --- + shim-signed's update-secureboot-policy should allow creating a machine- owner key, and using this for signing kernel modules built via DKMS. Key generation and enrolling should be made as easy as possible for users.
-- You received this bug notification because you are a member of Kernel Packages, which is subscribed to dkms in Ubuntu. https://bugs.launchpad.net/bugs/1748983 Title: Generate per-machine MOK for dkms signing Status in dkms package in Ubuntu: Fix Released Status in shim-signed package in Ubuntu: Fix Released Bug description: [SRU Justification] Move to using self-signed keys for signing DKMS modules, along with the wizard / guide to make this work properly, to let third-party modules be signed and loaded by enforcing kernels, rather than disabling Secure Boot altogether. [Test case] 1) Install Ubuntu in UEFI mode. 2) Install bbswitch-dkms (or another -dkms package if useful on your system). 3) Follow the steps in the debconf prompts (enter a password, remember the password for next boot). 4) Reboot; follow the steps in MokManagerL 4a) Pick Enroll MOK: add the new key, enter the password when prompted to do so. 4b) If the system was previously with Secure Boot disabled in shim (ie. a dkms package was previously installed), pick "Change Secure Boot state". Follow the prompts to enter password characters. 5) Pick "Reboot". 6) Log in and verify that the dkms module is loaded, using "lsmod | grep <module>". 7) Run 'modprobe <module>' to validate that the module can be loaded explicilty. 8) Validate that there are no errors from modprobe or errors in dmesg concerning signing keys. [Regression potential] If anything currently relies on Secure Boot validation being disabled in order to correctly run with an enforcing kernel, or grub is used in enforcing mode, custom / third-party kernels and modules may fail to load. --- shim-signed's update-secureboot-policy should allow creating a machine-owner key, and using this for signing kernel modules built via DKMS. Key generation and enrolling should be made as easy as possible for users. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1748983/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : [email protected] Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp

