[uefi-secure-boot-guide] master: Add typical UEFI Secure Boot error message (0a84817)

sparks at fedoraproject.org sparks at fedoraproject.org
Wed Feb 13 17:58:04 UTC 2013


Repository : http://git.fedorahosted.org/git/?p=docs/uefi-secure-boot-guide.git

On branch  : master

>---------------------------------------------------------------

commit 0a848170a9893a56c32d8559c8da28f6002bc7f6
Author: Florian Weimer <fweimer at redhat.com>
Date:   Wed Feb 13 18:06:34 2013 +0100

    Add typical UEFI Secure Boot error message
    
    Signed-off-by: Eric Christensen <sparks at redhat.com>


>---------------------------------------------------------------

 en-US/What_is_Secure_Boot.xml |   19 ++++++++++++++++++-
 1 files changed, 18 insertions(+), 1 deletions(-)

diff --git a/en-US/What_is_Secure_Boot.xml b/en-US/What_is_Secure_Boot.xml
index eed2357..3293933 100644
--- a/en-US/What_is_Secure_Boot.xml
+++ b/en-US/What_is_Secure_Boot.xml
@@ -67,7 +67,10 @@ store).
 From a user point of view, a system which has enabled UEFI Secure Boot and which
 is confronted with a tampered boot path simply stops working until UEFI Secure
 Boot is disabled or a signed next-stage boot loader is available on boot
-media. Similarly, operating system installers
+media.
+(<xref linkend="fig-Secure_Boot-Error_Message"/> shows a typical
+error message.)
+Similarly, operating system installers
 without a cryptographically valid signature
 do not run and result in an
 error message. Users are not offered a way to override the boot loader
@@ -75,6 +78,20 @@ decision to reject the signature, unlike the similar scenario with web
 server certificates. No certificate issuer information is provided to the
 user.
 </para>
+<figure id="fig-Secure_Boot-Error_Message">
+  <title>Typical error message from UEFI Secure Boot</title>
+<literallayout class="monospaced">
+┌────────── Secure Boot Violation ──────────┐
+│                                           │
+├───────────────────────────────────────────┤
+│ Invalid signature detected. Check Secure  │
+│          Boot Policy in Setup             │
+│                                           │
+│                                           │
+│                   [OK]                    │
+└───────────────────────────────────────────┘
+</literallayout>
+</figure>
 <para>
 UEFI Secure Boot does not prevent the installation or removal of
 second-stage boot loaders or require explicit user confirmation of such



More information about the docs-commits mailing list