Package: wireguard
Version: 0.0.20190702-1
Severity: important

The wireguard kernel module installed by wireguard-dkms doesn't appear to be
signed and is therefore unusable on a secureboot system (without me figuring
out how the whole mok key thing works and manually signing it myself). Since
debian is building and packaging a signed kernel, could you also do this for
this module?

error messages:

[   18.375387] Lockdown: Loading of unsigned modules is restricted; see
https://wiki.debian.org/SecureBoot

# modprobe wireguard
modprobe: ERROR: could not insert 'wireguard': Required key not available

Thanks!



-- System Information:
Debian Release: 10.0
  APT prefers testing
  APT policy: (500, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.19.0-5-amd64 (SMP w/32 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8), LANGUAGE=en_GB:en 
(charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages wireguard depends on:
ii  wireguard-dkms   0.0.20190702-1
ii  wireguard-tools  0.0.20190702-1

wireguard recommends no packages.

wireguard suggests no packages.

-- no debconf information

Reply via email to