Up to now, I have only ended up in the MOK management interface after upgrading from one version of LEAP to another, but recently I was dropped into it after a kernel update. Like many people these days, I work a lot from home, as do my users, and we only travel into the office occasionally. We access our workstations (running openSUSE LEAP) using ssh and X2Go. This has made me wonder whether MOK management might interfere with remote administration of openSUSE.
I generally advise users to apply updates when prompted, rebooting if necessary. However, if MOK management is needed at boot time, this is only visible at the system console. Are there any strategies for dealing with this situation? The recent kernel update marked a key for deletion, so I guess that nothing will actually break if it isn’t deleted, but what happens if a new key needs enrolling? Or can I be certain that this won’t happen except when upgrading (which I would normally do from the console using a USB drive).
I would like to avoid the heavyweight possibilities that I have read about, for example:
- installing KVM-over-IP kit
- setting up IPMI (if our workstation hardware even supports it)
- deploying ASUS Control Center (and not all of our workstation motherboards are ASUS anyway)
OTOH, if SLED offers anything that openSUSE doesn’t for this kind of situation, I would certainly consider paying for that. For a small outfit like us it wouldn’t be a huge financial outlay.
I have looked through the documentation without finding any answer to this. IIUC mokutil doesn’t allow a key to be auto-enrolled during boot, but maybe I’m wrong? (I’m not an expert in this area.)
I guess that the last resort is to disable secure boot, but that smells like admitting defeat to me.