| Summary: | uefi secure boot, update examples that are fedora specific | ||
|---|---|---|---|
| Product: | [Fedora] Fedora Documentation | Reporter: | Chris Murphy <bugzilla> |
| Component: | system-administrator's-guide | Assignee: | Stephen Wadeley <swadeley> |
| Status: | CLOSED CURRENTRELEASE | QA Contact: | Fedora Docs QA <docs-qa> |
| Severity: | low | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | devel | CC: | bugzilla, swadeley |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | Bug Fix | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2017-07-11 19:43:12 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
|
Description
Chris Murphy
2016-03-29 18:10:37 UTC
Thank you for raising this bug Hello What do you see for: dmesg | grep 'EFI: Loaded cert' Thank you (In reply to Stephen Wadeley from comment #2) > dmesg | grep 'EFI: Loaded cert' Returns no results. Possibly more reliable indicator of Secure Boot state is: [chris@f23s ~]$ journalctl -k | grep 'Secure boot' May 12 14:02:05 f23s.localdomain kernel: Secure boot enabled Or [chris@f23s ~]$ mokutil --sb-state SecureBoot enabled Where on a non-secure boot system: [chris@f24m ~]$ journalctl -k | grep 'Secure boot' [chris@f24m ~]$ mokutil --sb-state Failed to read SecureBoot Thank you Chris for comment 3 My feeling would be to go for a command that did not require using grep. I will try to get someone to confirm. Hello
Peter Jones confirms this is the best:
~]$ mokutil --sb-state
SecureBoot enabled
= = = =
commit d14f565da512a70f079cb0a10cfd7e1981366c23
Author: Stephen Wadeley <swadeley>
Date: Mon May 23 22:57:50 2016 +0200
To confirm if Secure Boot is enabled
Bug 1322076 - uefi secure boot, update examples that are fedora specific
Re this bit:
~]# keyctl list %:.system_keyring
5 keys in keyring:
...asymmetric: Microsoft Windows Production PCA 2011: a92902398e16c497...
...asymmetric: Fedora kernel signing key: ba8e2919f98f3f8e2e27541cde0d...
...asymmetric: Fedora Secure Boot CA: fde32599c2d61db1bf5807335d7b20e4...
...asymmetric: Red Hat Test Certifying CA: 08a0ef5800cb02fb587c12b4032...
...asymmetric: Microsoft Corporation UEFI CA 2011: 13adbf4309bd82709c8...
The above output shows the addition of two keys from the UEFI Secure Boot "db" keys plus the Fedora Secure Boot CA which is embedded in the shim.efi boot loader
the description, or explanation, is not very clear.
|