This should absolutely not be done. Disabling Secure Boot validation
needs to be a conscious decision, as otherwise such a process could be
used to bypass security and compromise systems.
shim-signed now ships /usr/sbin/update-secureboot-policy which can be
used to toggle shim validation; we will continue improving it to make
self-signing DKMS modules easier.
Closing as Won't Fix.
** Changed in: shim-signed (Ubuntu)
Assignee: Ivan Hu (ivan.hu) => (unassigned)
** Changed in: shim-signed (Ubuntu)
Status: Confirmed => Won't Fix
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1609209
Title:
Disable signature validation on shim without user interactions under
secureboot enabled
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/shim-signed/+bug/1609209/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs