JohnstonJ / ubuntu-secure-boot

Self-signed UEFI- and GRUB-based secure boot system for Ubuntu.
MIT License
23 stars 10 forks source link

ubuntu-secure-boot package

The stock Ubuntu 15.10 installation only implements secure boot just enough to get a Microsoft-signed shim in place. It does nothing to actually secure the boot process. This package can help users do so.

Assumptions: (1) 64-bit computer booting via EFI, (2) full disk encryption is used. While this package will install without full disk encryption, it does nothing to secure the booted operating system beyond signing the kernel and initramfs. Private keys are stored within the /etc directory, so this must be secured as well. Note that the /boot partition may remain unencrypted, as one purpose of this package is to secure it.

After installing, you will need to run make-secure-boot-keys. Then, you will need to enable secure boot in your system firmware and import the generated keys into the configuration.

Build instructions

  1. Install debhelper if needed:

    apt-get install debhelper

  2. Build the package:

    dpkg-buildpackage

Install instructions

  1. Remove shim-related packages:

    apt-get purge shim-signed apt-get purge shim

  2. Install the package as normal:

    dpkg -i ubuntu-secure-boot__amd64.deb

    If prompted about missing dependencies, install them as normal using apt-get.

  3. Generate key pairs and sign your current boot files:

    make-secure-boot-keys

Digital signatures will be maintained whenever you install new kernels or update initramfs.

Features of ubuntu-secure-boot