Package: wireguard
Version: 0.0.20190702-1
Severity: important
The wireguard kernel module installed by wireguard-dkms doesn't appear to be
signed and is therefore unusable on a secureboot system (without me figuring
out how the whole mok key thing works and manually signing it myself). Since
debian is building and packaging a signed kernel, could you also do this for
this module?
error messages:
[ 18.375387] Lockdown: Loading of unsigned modules is restricted; see
https://wiki.debian.org/SecureBoot
# modprobe wireguard
modprobe: ERROR: could not insert 'wireguard': Required key not available
Thanks!
-- System Information:
Debian Release: 10.0
APT prefers testing
APT policy: (500, 'testing'), (90, 'unstable')
Architecture: amd64 (x86_64)
Kernel: Linux 4.19.0-5-amd64 (SMP w/32 CPU cores)
Locale: LANG=en_GB.utf8, LC_CTYPE=en_GB.utf8 (charmap=UTF-8), LANGUAGE=en_GB:en (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled
Versions of packages wireguard depends on:
ii wireguard-dkms 0.0.20190702-1
ii wireguard-tools 0.0.20190702-1
wireguard recommends no packages.
wireguard suggests no packages.
-- no debconf information