Linux users who have Secure Boot enabled on their systems knowingly or unknowingly rely on a key from Microsoft that is set to expire in September. After that point, Microsoft will no longer use that key to sign the shim first-stage UEFI bootloader that is used by Linux distributions to boot the kernel with Secure Boot. But the replacement key, which has been available since 2023, may not be installed on many systems; worse yet, it may require the hardware vendor to issue an update for the system firmware, which may or may not happen. It seems that the vast majority of systems will not be lost in the shuffle, but it may require extra work from distributors and users.

  • deadcatbounce@reddthat.com
    link
    fedilink
    arrow-up
    20
    ·
    16 hours ago

    Being beholden to Microsoft doesn’t sound like something anyone needs.

    Until that ends I’m doing best to avoid secure boot. I don’t want to.

    • data1701d (He/Him)@startrek.website
      link
      fedilink
      English
      arrow-up
      14
      ·
      16 hours ago

      You can self-sign and self-enroll secure boot keys. Can’t say it’s an easy process, though - I had a lot of misery with it on my Surface Go 1st Gen. Might be better on my Thinkpad.

      • ☂️-@lemmy.ml
        link
        fedilink
        arrow-up
        2
        arrow-down
        1
        ·
        6 hours ago

        thus turning computers into phones, where you have to do a complicated unlocking/rekeying process to install your own OS.

          • Max-P@lemmy.max-p.me
            link
            fedilink
            arrow-up
            2
            ·
            1 hour ago

            That’s bullshit. ARM is an architecture and by itself does not specify secure boot any more than x86 does. Raspberry Pis don’t have secure boot. You can unlock the bootloader on a Pixel, install GrapheneOS, and relock the bootloader just fine. Several other manufacturers allow bootloader unlocks no problem. The main reason you can’t on some popular phones is US carriers, even international Samsungs you can unlock the bootloader and flash whatever you want on it.

            I’m literally typing this comment on a phone running a custom OS (LineageOS on a OnePlus 8T). I’m literally 2 versions of Android ahead of the latest supported version. I also have a Galaxy S7 running Android 15, a phone that officially tops out at Android 8 and launched with Android 6. Both you literally just toggle the bootloader unlock option in the settings, no hacks no craziness, it’s literally a feature.

            At this point you’re just straight up making shit up.

      • deadcatbounce@reddthat.com
        link
        fedilink
        arrow-up
        1
        ·
        edit-2
        13 hours ago

        I thought it was a Microsoft centric thing in that the certificate authority was either Microsoft or signed by Microsoft?

        Maybe I need to read about it more? Can you direct me to the general area?

        • WhyJiffie@sh.itjust.works
          link
          fedilink
          English
          arrow-up
          6
          ·
          13 hours ago

          Microsoft’s keys are pre-installed to all motherboards, so boot binaries signed by Microsoft are trusted by default. afaik Microsoft keys often can’t be removed, but not because it’s not possible, but because it can brick devices. you can create your own MOK or Machine Owner Keys and set up your linux system to sign your bootloader and kernel with it, but that is in addition to Microsoft keys.

          https://wiki.archlinux.org/title/Unified_Extensible_Firmware_Interface/Secure_Boot

          • deadcatbounce@reddthat.com
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            11 hours ago

            Thank-you. Recently rebuilt my Arch Rescue build and saw that section in doing the UKI dance.

            I don’t mind the Microsoft keys being there at all. I just don’t think tying myself to them is particularly clever.

            From your final part. I think I need to go back and reread it. Thank-you again.