@jbicha, current implementation is to disable verification for the dkms built modules in shim, making secure boot not that secure. An alternative way would be assisting users sign the built modules (which has key management problem). I'm not quite sure which way is preferred in upstream and/or Debian.
-- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1651124 Title: Please merge dkms 2.3-1 from Debian testing (main) To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1651124/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
