How to Install and Uninstall sicherboot Package on Ubuntu 21.10 (Impish Indri)
Last updated: November 25,2024
1. Install "sicherboot" package
This guide covers the steps necessary to install sicherboot on Ubuntu 21.10 (Impish Indri)
$
sudo apt update
Copied
$
sudo apt install
sicherboot
Copied
2. Uninstall "sicherboot" package
This is a short guide on how to uninstall sicherboot on Ubuntu 21.10 (Impish Indri):
$
sudo apt remove
sicherboot
Copied
$
sudo apt autoclean && sudo apt autoremove
Copied
3. Information about the sicherboot package on Ubuntu 21.10 (Impish Indri)
Package: sicherboot
Architecture: all
Version: 0.1.5
Priority: optional
Section: universe/utils
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Julian Andres Klode
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 44
Depends: efitools, binutils, systemd, uuid-runtime
Enhances: dracut, initramfs-tools, systemd
Filename: pool/universe/s/sicherboot/sicherboot_0.1.5_all.deb
Size: 9036
MD5sum: 575464ec0d3811039384f1846b901931
SHA1: 04789731ce05d5eca07c60de364f4360ee6952dd
SHA256: 944a303ce2bed2ac2b780ef580608079256053522dd9a3be1ac364854ca211cb
SHA512: d418a73e53ec2139bdd3eab86644f13d4b902b0897a92bb49d8a1d2a7464283e3cfe5ede97811280d2647fc5c2a95fa3bbfad1c8314677c76304da8377c1bcfb
Homepage: https://github.com/julian-klode/sicherboot
Description-en: systemd-boot integration with UEFI secure boot support
sicher*boot manages kernels and systemd-boot on a secure boot
machine. It installs kernels and systemd-boot, generates signing keys to
enroll in the machine, and signs the kernels and the bootloader with it.
.
Keys are generated in /etc/sicherboot/keys, readable only to root. The private
keys are unencrypted in the default configuration, but that can be changed,
see /etc/sicherboot/sicherboot.conf after installing.
.
This package diverts the /etc/kernel/postinst.d/dracut file and replace it
with its own file that calls the diverted one before running sicherboot,
as dracut does not support any form of hooks. dpkg is not entirely happy
with that and asks you if you want to replace a "deleted" dracut conffile -
answer yes.
Description-md5: 83f973597e619298203a0e0e92468457
Architecture: all
Version: 0.1.5
Priority: optional
Section: universe/utils
Origin: Ubuntu
Maintainer: Ubuntu Developers
Original-Maintainer: Julian Andres Klode
Bugs: https://bugs.launchpad.net/ubuntu/+filebug
Installed-Size: 44
Depends: efitools, binutils, systemd, uuid-runtime
Enhances: dracut, initramfs-tools, systemd
Filename: pool/universe/s/sicherboot/sicherboot_0.1.5_all.deb
Size: 9036
MD5sum: 575464ec0d3811039384f1846b901931
SHA1: 04789731ce05d5eca07c60de364f4360ee6952dd
SHA256: 944a303ce2bed2ac2b780ef580608079256053522dd9a3be1ac364854ca211cb
SHA512: d418a73e53ec2139bdd3eab86644f13d4b902b0897a92bb49d8a1d2a7464283e3cfe5ede97811280d2647fc5c2a95fa3bbfad1c8314677c76304da8377c1bcfb
Homepage: https://github.com/julian-klode/sicherboot
Description-en: systemd-boot integration with UEFI secure boot support
sicher*boot manages kernels and systemd-boot on a secure boot
machine. It installs kernels and systemd-boot, generates signing keys to
enroll in the machine, and signs the kernels and the bootloader with it.
.
Keys are generated in /etc/sicherboot/keys, readable only to root. The private
keys are unencrypted in the default configuration, but that can be changed,
see /etc/sicherboot/sicherboot.conf after installing.
.
This package diverts the /etc/kernel/postinst.d/dracut file and replace it
with its own file that calls the diverted one before running sicherboot,
as dracut does not support any form of hooks. dpkg is not entirely happy
with that and asks you if you want to replace a "deleted" dracut conffile -
answer yes.
Description-md5: 83f973597e619298203a0e0e92468457