If I understand this article right <https://www.tomshardware.com/tech-industry/cyber-security/microsoft-signing-key-required-for-secure-boot-uefi-bootloader-expires-in-september-which-could-be-problematic-for-linux-users>,
there is a signing key stored in the flash RAM of PCs, issued by
Microsoft, which is used to sign a “shim” that allows third-party
Linux distros to boot. However, that key is due to expire this
September.
1) Existing devices will continue to boot existing installs.
(So we shouldn’t be panicing about devices failing to boot.)
One of the key things regularly trumpeted about Linux is about its ability to give new life to old machines.
In comp.misc, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
One of the key things regularly trumpeted about Linux is about its
ability to give new life to old machines.
Disabling secure boot is an option in many, if not most, devices. I have
done it many times, even on a Surface tablet.
Not all distros have signed loaders, so if you do need to use the
secure boot, you could be locked in to one of the big names.
The only real use case for secure boot is part of defense in depth
from someone who can get physical access to machine. Or to try to lock
owners out of their hardware, but who would do that?
In comp.misc, Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
One of the key things regularly trumpeted about Linux is about its
ability to give new life to old machines.
The only real use case for secure boot is part of defense in depth
from someone who can get physical access to machine. Or to try to
lock owners out of their hardware, but who would do that?
Installing Linux on an obsolete PC is a niche use case ...
Richard Kettlewell wrote:
Installing Linux on an obsolete PC is a niche use case ...
Or maybe not, given Microsoft is leaving hordes of Windows 10 users
stuck between an upcoming rock and a hard place ...
On Fri, 25 Jul 2025 09:12:41 +0100, Richard Kettlewell wrote:
1) Existing devices will continue to boot existing installs.
(So we shouldn’t be panicing about devices failing to boot.)
One of the key things regularly trumpeted about Linux is about its ability >to give new life to old machines.
Lawrence D'Oliveiro <ldo@nz.invalid> writes:
Richard Kettlewell wrote:
Installing Linux on an obsolete PC is a niche use case ...
Or maybe not, given Microsoft is leaving hordes of Windows 10 users
stuck between an upcoming rock and a hard place ...
But the same applied to earlier versions of Windows ...
Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
On Fri, 25 Jul 2025 09:12:41 +0100, Richard Kettlewell wrote:
1) Existing devices will continue to boot existing installs.
(So we shouldn’t be panicing about devices failing to boot.)
One of the key things regularly trumpeted about Linux is about its ability >>to give new life to old machines.
And it does. I believe this should not matter if you have secure boot disabled. If you don't have device encryption enabled, then secure boot
is useless anyway.... and if you do have device encryption enabled you
have a roadmap to deal with this (which may mean buying a new machine
or setting the bios date back, etc.)
--scott
I checked with my favourite AI which agreed with you, saying that
malware can get into firmware or in through other weaknesses. But I
wonder why encryption would prevent that, as if malware got in through
ssh or through a web browser, then the disk would be decrypted in the
same way as for a legitimate user.
Secure boot will prevent the system from booting without a boot password,
so without the boot password they won't be able to boot the machine and
try to guess your login password. It's really just a matter of passwording the machine as well as the disk and it's not really that useful.
Secure boot will in fact prevent bad people with physical access from
making changes to the bios firmware, but that is a relatively small risk.
Lawrence D'Oliveiro <ldo@nz.invalid> writes:
If I understand this article right
<https://www.tomshardware.com/tech-industry/cyber-security/microsoft-signing-key-required-for-secure-boot-uefi-bootloader-expires-in-september-which-could-be-problematic-for-linux-users>,
there is a signing key stored in the flash RAM of PCs, issued by
Microsoft, which is used to sign a “shim” that allows third-party
Linux distros to boot. However, that key is due to expire this
September.
https://fwupd.github.io/libfwupdplugin/uefi-db.html has a fairly clear technical explanation, including the impact:
1) Existing devices will continue to boot existing installs.
(So we shouldn’t be panicing about devices failing to boot.)
2) Existing devices will be unable to accept updates to their boot chain
after the certificate expires (until the new certificate is
installed). Boot chain updates are rare, but they do happen.
3) Newer devices (with only the new certificate) will be unable to boot
existing install media (signed only with the old key). e.g. you may
struggle to install Ubuntu 14.04 on a laptop released in 2026.
I would expect that platforms still in support (e.g. LTS releases)
will be re-signed with the new key.
| Sysop: | DaiTengu |
|---|---|
| Location: | Appleton, WI |
| Users: | 1,090 |
| Nodes: | 10 (0 / 10) |
| Uptime: | 64:56:32 |
| Calls: | 13,949 |
| Calls today: | 2 |
| Files: | 187,035 |
| D/L today: |
4,674 files (1,402M bytes) |
| Messages: | 2,461,444 |