Jeremy Linton wrote:
> This is IMHO a mistake, the systemd-boot and UKI paths are the perfect
> time to break with shim and require some form of actual fedora/whatever
> secure boot key enrollment on the machine. Shim's fundamentally
> backdooring the UEFI security infrastructure, and frankly some of what
> is being done is pretty sketchy and its somewhat amazing it hasn't
> broken by vendors cleaning up their UEFI implementations*. Furthermore,
> the dependency on MS signing shim is also strongly in the pragmatic but
> not idea category as well.
How about we just use LogoFAIL to bypass Restricted Boot entirely without
bothering with signatures at all?
Kevin Kofler
--
_______________________________________________
devel mailing list -- [email protected]
To unsubscribe send an email to [email protected]
Fedora Code of Conduct:
https://docs.fedoraproject.org/en-US/project/code-of-conduct/
List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines
List Archives:
https://lists.fedoraproject.org/archives/list/[email protected]
Do not reply to spam, report it:
https://pagure.io/fedora-infrastructure/new_issue