<div dir="ltr">Sorry, didn't see this reply in the sea of unread emails! Thanks, I'll look into those this weekend.</div><div class="gmail_extra"><br><div class="gmail_quote">On Sat, Apr 23, 2016 at 12:23 PM, Tom H <span dir="ltr"><<a href="mailto:tomh0665@gmail.com" target="_blank">tomh0665@gmail.com</a>></span> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><span class="">On Sat, Apr 23, 2016 at 6:13 AM, Ashish Kansara<br>
<<a href="mailto:ashishnkansara@gmail.com">ashishnkansara@gmail.com</a>> wrote:<br>
><br>
> I was looking at doing a clean install of 16.04, this time with block device<br>
> encryption using dm_crypt and LUKS, and was wondering if Ubuntu does any<br>
> kernel integrity check on boot.<br>
><br>
> From what I understand, secureboot will only perform an integrity check on<br>
> the bootloader; the bootloader itself does not check the kernel hash. This<br>
> seems sort of counter-intuitive since /boot is not encrypted. Of course,<br>
> this is solved if a kernel integrity check is performed on boot.<br>
<br>
</span>For secure boot:<br>
shim-signed<br>
grub-efi-amd64-signed<br>
linux-signed-image<br>
<span class="HOEnZb"><font color="#888888"><br>
--<br>
ubuntu-users mailing list<br>
<a href="mailto:ubuntu-users@lists.ubuntu.com">ubuntu-users@lists.ubuntu.com</a><br>
Modify settings or unsubscribe at: <a href="https://lists.ubuntu.com/mailman/listinfo/ubuntu-users" rel="noreferrer" target="_blank">https://lists.ubuntu.com/mailman/listinfo/ubuntu-users</a><br>
</font></span></blockquote></div><br></div>