Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Document the need to disable Secure Boot prior to attempting Qubes installation #8941

Open
rjrizzuto opened this issue Feb 14, 2024 · 7 comments
Labels
C: doc P: default Priority: default. Default priority for new issues, to be replaced given sufficient information.

Comments

@rjrizzuto
Copy link

How to file a helpful issue

Qubes OS release (if applicable)

4.2, possibly earlier

Brief summary

I am NOT maintaining documentation, but am glad to point out errors and omissions.

I can find nowhere in the installation guide where it says to turn off secure boot. That is certainly not obvious to someone coming from Windows, or even Linux Mint, which do not have that requirement.

@rjrizzuto rjrizzuto added P: default Priority: default. Default priority for new issues, to be replaced given sufficient information. T: task labels Feb 14, 2024
@xaki23
Copy link

xaki23 commented Feb 14, 2024

there is a whole bunch of weird platform-specific things that can go sideways like that, and i am not sure whether it is a reasonable goal to document them, and in what form.
f.ex. a few months ago i tried to install on some random dell notebook, and ... any kind of linux refused to see that things internal nvme, at all. even a plain fedora was "there is no storage on this". took half an hour to figure out i had to disable some intel-rapid-storage option in bios before any linux would admit that yes, the machine has some nvme.

perhaps some FAQ or "collection of installation lore"?

@rjrizzuto
Copy link
Author

rjrizzuto commented Feb 14, 2024 via email

@andrewdavidwong andrewdavidwong changed the title add prerequisite to qubes installation Document the need to disable Secure Boot prior to attempting Qubes installation Feb 14, 2024
@andrewdavidwong
Copy link
Member

Related: #4371

@IOZZYS
Copy link

IOZZYS commented Feb 19, 2024

I think I'm running with secure boot... might check later.

@bi0shacker001
Copy link

I think disabling secure boot is a common requirement on modern computers. It goes back to Windows 10 at least. I don't think it is a big ask to document this requirement. Certainly easier than supporting secure boot ;-)

On Tuesday, February 13th, 2024 at 10:06 PM, xaki23 @.> wrote: there is a whole bunch of weird platform-specific things that can go sideways like that, and i am not sure whether it is a reasonable goal to document them, and in what form. f.ex. a few months ago i tried to install on some random dell notebook, and ... any kind of linux refused to see that things internal nvme, at all. even a plain fedora was "there is no storage on this". took half an hour to figure out i had to disable some intel-rapid-storage option in bios before any linux would admit that yes, the machine has some nvme. perhaps some FAQ or "collection of installation lore"? — Reply to this email directly, [view it on GitHub](#8941 (comment)), or unsubscribe. You are receiving this because you authored the thread.Message ID: @.>

Secureboot support has been standard in pretty much every modern linux distribution for years, and isn't particularly hard to implement, it just costs money, requires partnering with another project, or requires user implementation (see fedora, universal-blue, and archlinux, in that order, for examples)

That being said, the FAQ does say that secure boot is not supported, and the binaries are not signed. I believe that counts as it being documented.

@rjrizzuto
Copy link
Author

I think it would be helpful to add disabling secure boot as a step in the installation guide. While it is in the FAQ, a new user might not see it there, whereas they would definitely see it as one of the steps in the install guide.

@unman
Copy link
Member

unman commented Mar 19, 2024 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
C: doc P: default Priority: default. Default priority for new issues, to be replaced given sufficient information.
Projects
None yet
Development

No branches or pull requests

6 participants