Package: wireguard Version: 0.0.20190702-1 Severity: important The wireguard kernel module installed by wireguard-dkms doesn't appear to be signed and is therefore unusable on a secureboot system (without me figuring out how the whole mok key thing works and manually signing it myself). Since debian is building and packaging a signed kernel, could you also do this for this module?
error messages: [ 18.375387] Lockdown: Loading of unsigned modules is restricted; see https://wiki.debian.org/SecureBoot # modprobe wireguard modprobe: ERROR: could not insert 'wireguard': Required key not available Thanks! -- System Information: Debian Release: 10.0 APT prefers testing APT policy: (500, 'testing'), (90, 'unstable') Architecture: amd64 (x86_64) Kernel: Linux 4.19.0-5-amd64 (SMP w/32 CPU cores) Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8), LANGUAGE=en_GB:en (charmap=UTF-8) Shell: /bin/sh linked to /bin/dash Init: systemd (via /run/systemd/system) LSM: AppArmor: enabled Versions of packages wireguard depends on: ii wireguard-dkms 0.0.20190702-1 ii wireguard-tools 0.0.20190702-1 wireguard recommends no packages. wireguard suggests no packages. -- no debconf information