@jbicha, current implementation is to disable verification for the dkms
built modules in shim, making secure boot not that secure. An
alternative way would be assisting users sign the built modules (which
has key management problem). I'm not quite sure which way is preferred
in upstream and/or Debian.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1651124

Title:
   Please merge dkms 2.3-1 from Debian testing  (main)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/dkms/+bug/1651124/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to