Your message dated Fri, 19 Nov 2021 09:33:00 +0100
with message-id <>
and subject line Re: Bug#996202: Acknowledgement (systemd - EFI Secure Boot for 
has caused the Debian Bug report #996202,
regarding systemd - EFI Secure Boot for systemd-boot
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact

Debian Bug Tracking System
Contact with problems
--- Begin Message ---
Package: systemd
Version: 247.9-4
Severity: wishlist

Hi folks

systemd already includes it's own small and EFI based bootloader.  To
make it more widely usable, it would be nice to have it secure boot
signed.  Signing for secure boot is supported in Debian via a round trip
inside the archive.

I would implement that something in the line of:

- Split off the existing EFI binary into a new package
- Create the template package "systemd-boot-$arch-signed-template".  It
  contains a list of files to be signed and a source package template,
  which gets signatures injected into and uploaded by the signing
- The template creates a source and binary package
  "systemd-boot-$arch-signed", shipping the signed EFI binary.
- Add a "systemd-boot" package that contains "bootctl" and a dependency
  on "systemd-boot-$arch-signed".

I can help with that, as I'm going work on secure boot anyway.


There is an order of things in this universe.
                -- Apollo, "Who Mourns for Adonais?" stardate 3468.1

--- End Message ---
--- Begin Message ---

I'm rescinding this request.  I've got a working prototype, but I don't
know where this would go.


--- End Message ---

Reply via email to