Verification-done for mokutil 0.3.0+1538710437.fb6250f-0ubuntu2~18.04.1 on bionic:
I have verified that timeout, export, and reset / toggle-validation features in mokutil all work, as a verification for the new features and smoketesting for the existing features already in use.
When using timeout, export, reset and toggle-validation, mokutil correctly writes the variables in the firmware that cause the system to boot next into MokManager to process the requests.
Verification-done for mokutil 0.3.0+153871043 7.fb6250f- 0ubuntu2~ 18.04.1 on bionic:
I have verified that timeout, export, and reset / toggle-validation features in mokutil all work, as a verification for the new features and smoketesting for the existing features already in use.
When using timeout, export, reset and toggle-validation, mokutil correctly writes the variables in the firmware that cause the system to boot next into MokManager to process the requests.
ubuntu@ lucky-moth: ~$ apt-cache policy mokutil 7.fb6250f- 0ubuntu2~ 18.04.1 7.fb6250f- 0ubuntu2~ 18.04.1 7.fb6250f- 0ubuntu2~ 18.04.1 501 archive. ubuntu. com/ubuntu bionic- proposed/ main amd64 Packages dpkg/status archive. ubuntu. com/ubuntu bionic/main amd64 Packages
mokutil:
Installed: 0.3.0+153871043
Candidate: 0.3.0+153871043
Version table:
*** 0.3.0+153871043
-1 http://
100 /var/lib/
0.3.0-0ubuntu5 500
500 http://
ubuntu@ lucky-moth: ~$ sudo mokutil --export --kek lucky-moth: ~$ openssl x509 -inform DER -in KEK-0001.der -text -noout
94: cb:af:49: cd:56:a7: d8 cryption
Public- Key: (2048 bit)
Modulus:
ubuntu@
Certificate:
Data:
Version: 1 (0x0)
Serial Number:
Signature Algorithm: sha256WithRSAEn
Issuer: CN = Ubuntu OVMF Secure Boot (PK/KEK key), emailAddress = <email address hidden>
Validity
Not Before: Jun 20 21:48:46 2018 GMT
Not After : Jun 17 21:48:46 2028 GMT
Subject: CN = Ubuntu OVMF Secure Boot (PK/KEK key), emailAddress = <email address hidden>
Subject Public Key Info:
Public Key Algorithm: rsaEncryption
[...]