I'm the author of that secure boot package. I think you might misunderstand... what it does is put all the grub config etc into a signed initramfs. So you cannot change the grub.cfg. Also, to sign the binaries you need the GPG keyring and the passphrase.
The objective is to *not* use the shipped trusted microsoft key. The only key in the UEFI keystore is our own chain of trust. So The goal is to *not* use shim. It is used in conjunction w/ full disk encryption. The only file unencrypted is a single grub w/ the ininitramfs, and that is in turn signed. The kernel, etc, are all on the encrypted disk. Thus they cannot be tampered with by e.g. removing the disk etc. Installing shim means adding someone else trust, which I don't accept. I'm not sure what "don't support secure boot without shim" means, but I don't think that can or should be true. It doesn't support booting the Microsoft signed keys w/o shim, but, its certainly legal to remove the Microsoft keys from the BIOS and still use secureboot. as for the check_signatures=no, I'm ok if that is removed as a feature I guess, but it would need to be removed from the documentation. In my case its not a reduction in security (since you cannot change the grub.cfg w/o having the trust chain anyway). so tldr: * no, shim is not required to support secureboot * yes, you can self sign securely * no, merely having an option in grub.cfg or grub cmdline to disable subsequent checks need not reduce the security, as long as it is gated by being in a signed initramfs (and grub password is as strong as bios password) -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1890672 Title: secure boot fails after upgrade to grub2-common 2.04-1ubuntu26.2 To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/grub2/+bug/1890672/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs