Ventoy Forums

Full Version: Questions regarding Secure Boot support. How to un-enrolled the key?
You're currently viewing a stripped down version of our content. View the full version with proper formatting.
Hello everybody,

first of all, thank you very much for this great tool!
I have a few questions about Secure Boot support - maybe someone can help me:

If I understand correctly, the "enrolled" key is saved in the EFI.
How can this be reversed?
I have reset the keys and all settings to default in the BIOS and even reflashed the BIOS - but the key remained.
With a Live Linux and mokutil --delete or --reset with subsequent confirmation in the "MOK Manager" worked - is that the right way?
An option for this in Ventoy might come in handy.

A Ventoy Stick with Secure Boot support also works perfectly on a device without (or with deactivated) Secure Boot.
Why then Secure Boot support is optional at all and not always automatically activated?

How do other Live CDs such as PartedMagic does this?
These boot with Secure Boot without having to import a key.

Thanks and happy holidays!
Martin
If Secure Boot is enabled in the UEFI BIOS, then only files which have been signed by Microsoft are valid and will run.
A UEFI BIOS can contain a 'whitelist' (DB) and a 'blacklist' (DBx) of keys.
Mok Manager will add the key for the Ventoy EFI boot file into the DB database (keys are usually stored in EEPROM flash memory on the motherboard).
Flashing the BIOS can also clear the stored keys but usually you have to specify an extra command line option (depends on the flash utility) - otherwise if you flashed a new BIOS you would lose all your keys and the operating system might not Secure Boot afterwards.
To get any UEFI boot file signed by Microsoft costs many $1000's.
The PartedMagic developers paid the $ to MS which is probably why PartedMagic is no longer free.
(12-23-2020, 05:19 AM)m.fessler Wrote: [ -> ]With a Live Linux and mokutil --delete or --reset with subsequent confirmation in the "MOK Manager" worked - is that the right way?

Yes, this is one of the methods.
You can remove the key from UEFI with KeyTool.efi (efitools Linux package). https://archlinux.org/packages/extra/x86.../download/