You are not logged in.

#1 2026-02-11 14:11:53

LocodraTheCrow
Member
Registered: 2024-09-04
Posts: 6

Confirming MS signed bootloaders before setting up SB

I've installed my system on an "LVM on LUKS"  configuration and I now wish to apply SB with TPM on it, but I'm insecure about the phrasing of "Replacing the platform keys with your own can end up bricking hardware on some machines"

I followed the steps in here and found a signature on my GPU.

I just want to make sure I won't brick my laptop before I go on and the wiki does not provide a method to check if you do have a microsoft signed bootloader, only if you have an OpRom.

I do not dualboot and there is no windows OS installed in this laptop, so if this implies that there is no bootloader that microsoft could sign and this question is really stupid I apologize, but I just felt too insecure about the phrasing, as stated above.

Offline

#2 2026-02-11 19:23:53

V1del
Forum Moderator
Registered: 2012-10-16
Posts: 25,064

Re: Confirming MS signed bootloaders before setting up SB

How UEFIs interpret the presence or absence of things is sadly very dependant on the UEFI implementation (which manufacturer are we talking here?) and there's no general guarantee on how they react to potentially losing the MS keys. If you want to be on the safe side, make sure you keep the ms keys and firmware files, sbctl makes this easy with the -m and -f options respectively.

Offline

#3 2026-02-12 02:25:25

LocodraTheCrow
Member
Registered: 2024-09-04
Posts: 6

Re: Confirming MS signed bootloaders before setting up SB

It's an Asus Rog Zephyrus G14 (2022), AMD GPU and CPU. Would just keeping the ms signed stuff by using sbctl with the argument -m be enough? Is it really that simple?

Offline

#4 2026-02-14 12:58:33

Everything2067
Member
Registered: 2025-06-29
Posts: 71

Re: Confirming MS signed bootloaders before setting up SB

Even if you clear the existing keys, some BIOSes have an option to restore the MS keys. You can make use of that if you mess up.

Many (including me) do not recommend using secure boot at all. Is there a specific purpose for it?

Last edited by Everything2067 (2026-02-14 12:59:47)

Offline

#5 2026-02-14 14:58:01

cryptearth
Member
Registered: 2024-02-03
Posts: 1,982

Re: Confirming MS signed bootloaders before setting up SB

Everything2067 wrote:

Many (including me) do not recommend using secure boot at all. Is there a specific purpose for it?

I'm part of this - with my reason: unless one keeps the chain all the way up to the user-level software and its data the entire concept breaks at the very point where the context allows the user to execute arbitrary code with access to arbitrary data
secureboot only makes sense if the chain is kept not just from the firmware to the kernel and initrd but all the way to every user-level code along with all its configs and other assets - so everything can be fully validated from the OEMs platform master key up to each and every program executed in the DE - which basically boils down to locked down kiosk mode systems
for an arbitrary system used by your average joe with root/admin access able to run code at OS level which can modify the firmware - why would it ANY matter if there's a chain for only about half of it if you can alter it afterwards anyway?

unless for very specific use cases secureboot is completely failed by design

Offline

Board footer

Powered by FluxBB