←back to thread

253 points pabs3 | 1 comments | | HN request time: 0.497s | source
Show context
crinkly ◴[] No.44601831[source]
So is it a possibility that a grub update breaks an existing bootable node? That worries me as I have a couple of Linux desktops in the field which I can’t remember if secure boot is enabled on.
replies(1): >>44602823 #
jeroenhd ◴[] No.44602823[source]
If users don't update their keyrings or firmware (through fwupdmgr for instance), Grub will probably stop booting with secure boot on when the certificate expires.

If users update Grub once the old certificate is no longer used to sign the bootloader without updating their keyrings or firmware, Grub will probably stop booting with secure boot on when the certificate expires.

If users do update their systems and software, Grub will keep working.

Not updating is not a solution, unless the motherboard manufacturer really fucked up and doesn't validate the expiration date.

Luckily, fwupdmgr is integrated in the GUI updater tool on just about any Linux distro I know. As long as users don't ignore the "there are system updates available" popup and as long as the desktop vendor put out bare basic software support, things will probably go down fine.

replies(1): >>44603067 #
1. zozbot234 ◴[] No.44603067[source]
> Not updating is not a solution, unless the motherboard manufacturer really fucked up and doesn't validate the expiration date.

The article mentions that most motherboards will probably not validate the expiration date. There is a residual concern that new versions of the Shim will not be signed with the expired key, and thus be unbootable on hardware that doesn't accept the new key.