On Wed, 2025-07-09 at 13:38 +0000, Richard Hughes via devel wrote: > In the pathological case at least one vendor has lost the private key used > for signing their PK, so they're having to issue firmware updates to replace > the PK on the running system -- which could be a terrible idea from an > attestation point of view. Those kind of vendors are also not the kind of > vendors that usually issue bios updates (usually because of "cost") so the > solution there is to turn off secure boot. If you're running a 7 year old > system firmware then UEFI secure boot certificates are probably quite low on > your compliance list.
In theory wouldn't we also have the option to ship an old shim for such cases? If the whole chain is old it should work, right? Of course, we'd then need some heuristic to figure out if we're on the old MS cert and install the old shim... I don't know if this is *worth it* vs just advising people to turn off SB... -- Adam Williamson (he/him/his) Fedora QA Fedora Chat: @adamwill:fedora.im | Mastodon: @ad...@fosstodon.org https://www.happyassassin.net -- _______________________________________________ devel mailing list -- devel@lists.fedoraproject.org To unsubscribe send an email to devel-le...@lists.fedoraproject.org Fedora Code of Conduct: https://docs.fedoraproject.org/en-US/project/code-of-conduct/ List Guidelines: https://fedoraproject.org/wiki/Mailing_list_guidelines List Archives: https://lists.fedoraproject.org/archives/list/devel@lists.fedoraproject.org Do not reply to spam, report it: https://pagure.io/fedora-infrastructure/new_issue