X-Git-Url: https://git.grml.org/?p=grml-live.git;a=blobdiff_plain;f=etc%2Fgrml%2Fgrml-live.conf;fp=etc%2Fgrml%2Fgrml-live.conf;h=06e1e6c5f7fc7db46964f8472217ac6b468629f0;hp=c0695631b88ac33a492af88c2eed2f330e7a0cc8;hb=518eb395d8652ccf260e4fe6fc15af7946fc7c49;hpb=4b6fd81a229ade6a863452ec978eec6b9015d993 diff --git a/etc/grml/grml-live.conf b/etc/grml/grml-live.conf index c069563..06e1e6c 100644 --- a/etc/grml/grml-live.conf +++ b/etc/grml/grml-live.conf @@ -157,12 +157,17 @@ # HYBRID_METHOD='grub2' # use manifold with GRUB 2 # HYBRID_METHOD='manifold' # use manifold with ISOLINUX (default) -# By default Secure Boot is enabled using the approach from Ubuntu. -# Currently only the Ubuntu approach is supported, which is restricted -# to loading Linux kernels and using a minimal version of GRUB. -# If unset defaults to "ubuntu" -# SECURE_BOOT='disable' # do not enable Secure Boot -# SECURE_BOOT="ubuntu" # use approach from Ubuntu +# Secure Boot method that should be used (amd64 only). +# If unset defaults to "disabled" (which means no Secure Boot will be present) +# The following approaches are supported: +# debian: use the Debian GRUB version which requires a signed kernel, +# this is the recommended way to use Secure Boot with Grml +# ubuntu: use an older Ubuntu GRUB version which doesn't require a signed kernel, +# though has a limited feature set only and requires customized GRUB +# templates (the files shipped templates/boot/grub/ don't work as such) +# SECURE_BOOT='disable' # do not enable Secure Boot (default) +# SECURE_BOOT='debian' # use approach from Debian +# SECURE_BOOT='ubuntu' # use approach from Ubuntu # Binary that should be used for creating the squashfs file. # Defaults to the executable matching the kernel version, falls back to mksquashfs.