This package has no hardcoded /boot/efi/
paths. The EFI binaries are installed to /usr/share/shim-signed/
.
Search Criteria
Package Details: shim-signed 15.8+ubuntu+1.59-1
Package Actions
Git Clone URL: | https://aur.archlinux.org/shim-signed.git (read-only, click to copy) |
---|---|
Package Base: | shim-signed |
Description: | Initial UEFI bootloader that handles chaining to a trusted full bootloader under secure boot environments (prebuilt x64 and AA64 binaries from Ubuntu) |
Upstream URL: | https://packages.ubuntu.com/noble/shim-signed |
Keywords: | fbx64 mmx64 MokManager SecureBoot shim shimx64 UEFI |
Licenses: | BSD-2-Clause |
Submitter: | nl6720 |
Maintainer: | nl6720 |
Last Packager: | nl6720 |
Votes: | 34 |
Popularity: | 1.26 |
First Submitted: | 2016-12-07 12:04 (UTC) |
Last Updated: | 2024-12-08 10:23 (UTC) |
Dependencies (0)
Required by (3)
- refind-btrfs-c3-c4-git (optional)
- refind-git (optional)
- secureboot-grub
Sources (2)
nl6720 commented on 2018-04-24 07:01 (UTC)
crazyh commented on 2018-04-24 01:43 (UTC) (edited on 2018-04-24 01:44 (UTC) by crazyh)
It does not work when the ESP is mounted to /boot due to hardcoded "/boot/efi/..." paths. :(
nl6720 commented on 2016-12-07 13:17 (UTC) (edited on 2024-12-08 10:29 (UTC) by nl6720)
shimx64.efi
is signed with Microsoft key, they also have a hardcoded Ubuntu key inside.
MokManager (mmx64.efi
) is signed with Ubuntu's key.
shimx64.efi
can launch any EFI binary signed with Microsoft keys.
More information is available on the wiki: Secure Boot#shim.
fbx64.efi
scan the ESP for CSV files with bootloader information and adds boot entries to the NVRAM. Read README.fallback.
Alternative signed shim sources:
- Debian shim: https://tracker.debian.org/pkg/shim-signed
- Fedora shim: https://koji.fedoraproject.org/koji/packageinfo?packageID=14502
Pinned Comments
nl6720 commented on 2021-05-28 11:19 (UTC)
shim 15.4 requires SBAT. It will not launch EFI binaries without a
.sbat
section.nl6720 commented on 2016-12-07 13:17 (UTC) (edited on 2024-12-08 10:29 (UTC) by nl6720)
shimx64.efi
is signed with Microsoft key, they also have a hardcoded Ubuntu key inside. MokManager (mmx64.efi
) is signed with Ubuntu's key.shimx64.efi
can launch any EFI binary signed with Microsoft keys.More information is available on the wiki: Secure Boot#shim.
fbx64.efi
scan the ESP for CSV files with bootloader information and adds boot entries to the NVRAM. Read README.fallback.Alternative signed shim sources: