sicher*boot automatically installs systemd-boot and kernels for it into the ESP, signed with keys generated by it.
The signing keys are stored unencrypted and only protected by the file system
permissions. Thus, you should make sure that the file system they are
stored (usually /etc
) in is encrypted.
After installing sicherboot, you can adjust a number of settings in
/etc/sicherboot.conf
and should set a kernel commandline in
/etc/kernel/cmdline
.
Then run
sicherboot setup
to get started.
/boot/vmlinuz-<ver>
and
/boot/initrd.img-<ver>
You want to run:
sicherboot bootctl update
sicherboot install-kernel <ver>
sicherboot remove-kernel <ver>
As an example, kernel and initramfs contain integration with /etc/kernel
and initramfs-tools. Install one of the kernel postinst.d
scripts - the dracut
one exists for dracut systems as a work around for dracut not supporting hooks.