You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The current verification step downloads the Fedora 27 kernel and checks if it executes when Secure Boot is on.
Such kernel is signed with a Red Hat KEK (CN = "Fedora Secure Boot Signer").
Instead, the test should check that a kernel signed with the input key (whose certificate is passed with --oem-string) runs, because the purpose of EnrollDefaultKeys.efi is to set PK and the first KEK with the user's key.
As a matter of fact, I am a bit surprised that the Fedora 27 kernel (signed by Red Hat) boots at all.
That should not be happening, right? For the record, I am using EnrollDefaultKeys.efi from Fedora 33.
The text was updated successfully, but these errors were encountered:
The current verification step downloads the Fedora 27 kernel and checks if it executes when Secure Boot is on.
Such kernel is signed with a Red Hat KEK (CN = "Fedora Secure Boot Signer").
Instead, the test should check that a kernel signed with the input key (whose certificate is passed with
--oem-string
) runs, because the purpose ofEnrollDefaultKeys.efi
is to set PK and the first KEK with the user's key.As a matter of fact, I am a bit surprised that the Fedora 27 kernel (signed by Red Hat) boots at all.
That should not be happening, right? For the record, I am using
EnrollDefaultKeys.efi
from Fedora 33.The text was updated successfully, but these errors were encountered: