I don't know exactly why but the following did the trick: grub-installInstalling for x86_64-efi platform.Installation finished. No error reported.[...manual reboot and Secure Boot activation in ThinkPad Setup...]mokutil --sb-stateSecureBoot enabled
Many thanks :) Best regards, l0f4r0 3 janv. 2020 à 18:46 de didier.gau...@gmail.com: > Le vendredi 3 janvier 2020 17:10:04 UTC+1, l0f...@tuta.io a écrit : > [...] > >> I've used >> https://cdimage.debian.org/debian-cd/current/amd64/iso-cd/debian-10.2.0-amd64-netinst.iso >> > > Good. > > I would verify shim* packages are installed and well configured (State/Error > flags "ii" at the beginning of the lines); > didier@hp-notebook14:~$ sudo dpkg -l shim* > Souhait=inconnU/Installé/suppRimé/Purgé/H=à garder > | > État=Non/Installé/fichier-Config/dépaqUeté/échec-conFig/H=semi-installé/W=attend-traitement-déclenchements > |/ Err?=(aucune)/besoin Réinstallation (État,Err: majuscule=mauvais) > ||/ Nom Version Architecture > Description > +++-=========================-============================-============-================================================================ > un shim <aucune> <aucune> > (aucune description n'est disponible) > ii shim-helpers-amd64-signed 1+15+1533136590.3beb971+7 amd64 boot > loader to chain-load signed boot loaders (signed by Debian) > ii shim-signed:amd64 1.33+15+1533136590.3beb971-7 amd64 > Secure Boot chain-loading bootloader (Microsoft-signed binary) > ii shim-signed-common 1.33+15+1533136590.3beb971-7 all > Secure Boot chain-loading bootloader (common helper scripts) > ii shim-unsigned 15+1533136590.3beb971-7 amd64 boot > loader to chain-load signed boot loaders under Secure Boot > > then I would verify if what I think is necessary is present : a third party > Microsoft tool (but perhaps I am wrong): > didier@hp-notebook14:~$ sudo mokutil --db | grep -i issuer > Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, > CN=Microsoft Root Certificate Authority 2010 > CA Issuers - > URI:http://www.microsoft.com/pki/certs/MicRooCerAut_2010-06-23.crt > Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, > CN=Microsoft Corporation Third Party Marketplace Root > CA Issuers - > URI:http://www.microsoft.com/pki/certs/MicCorThiParMarRoo_2010-10-05.crt > Issuer: C=US, O=Hewlett-Packard Company, CN=Hewlett-Packard Printing Device > Infrastructure CA > didier@hp-notebook14:~$ sudo mokutil --kek | grep -i issuer > Issuer: C=US, ST=Washington, L=Redmond, O=Microsoft Corporation, > CN=Microsoft Corporation Third Party Marketplace Root > CA Issuers - > URI:http://www.microsoft.com/pki/certs/MicCorThiParMarRoo_2010-10-05.crt > Issuer: C=US, O=Hewlett-Packard Company, CN=Hewlett-Packard Printing Device > Infrastructure CA > > I reach there my limitations to understand clearly how SecureBoot and UEFI > work, but on my laptop, the Microsoft Thir Party thing seems to be enabled > when enrolling something called "HP factory keys" or something of the same > kind (I have forgotten the exact name) in the HP UEFI interface. But perhaps > on your Lenovo you have ton confirm (by entering a code prompted by the UEFI, > for example) at boot time that you really want to enroll keys that the shim > is trying to install. > > So I would try this: > sudo dpkg-reconfigure shim-helpers-amd64-signed shim-signed:amd64 > shim-signed-common shim-unsigned > > and then reboot and see if the UEFI ask me to confirm any change and verify > if SecureBoot is really on: > > didier@hp-notebook14:~$ sudo mokutil --sb-state > SecureBoot disabled !(in my case that is volontary) > > > >> efibootmgr [...] >> > > I am persuaded that efibootmgr/efivar & al may present perfect informations > but are sometimes superseded by the manufacturer implementation of the UEFI > standard >