@foxpup wrote:
Why do you say so? Where do you read this? In this text or in another one?
It follows from the basic principle by which the chain of trust works. Nothing in the Wikipedia article contradicts this because it can't.
You are right for grub2, it can do that. I've checked their manual.
So it depends on the builder of the grub efi binary.
Any grub implementation that supports secure boot must work in accordance to basic principle by which the chain of trust works. Of course the shim or any other link in the chain can ignore its responsibility load and transfer control to an unsigned binary. But, the point is the shim isn't special as you have claimed. With respect to trustworthiness all links in the chain share an equal responsibility.
You could check if the kernel of Puppy is signed
Until two years ago I used Windows as my daily driver and although I have learned a lot about Puppy in two years in many ways I am still a noob. In particular, I don't know how to verify a digital signature of a binary. (This was easy in Windows as there is a GUI tool for doing this.) Please tell me the tool to use in Puppy?
or drop to the grub command line (c) and ask for the environment variables (set) and look what check_signatures says.
Thank-you for telling me about the variable check_signatures. I did not know about this variable. Unfortunately, I can no longer do this myself as just yesterday I installed MX Linux to the partition where FossaPup formerly lived and I don't have a spare partition to re-install FossaPup. Since, I can no longer do this myself to satisfy my curiosity please do me a favor and tell me the value of check_signatures for either FossaPup or frugalpup.
Why do you think this important?
To be honest I will be replacing Puppy with a more secure distro. Until two years ago Windows was my daily driver. Windows takes security extremely seriously. I was quite comfortable with Windows's security. (Unfortunately, Windows runs very slowly on the class of hardware that I can afford to buy.) I really am not comfortable with Puppy's security. The reality is Puppy is probably safe enough. But, is safety by obscurity - the market share of Puppy and Linux desktops in general is probably too small to make them a likely target for malware writers. But, the sense of security that you get from security by obscurity is not the same as the sense of security that you get from having real protection. Would you rather have your valuables hidden under a rock or locked in a safe? It is an emotional thing really. I am the type of person that out of proportion to the actual risk I am going to worry and not have peace of mind. Not having peace of mind is an unnecessary emotional toll that I can and will avoid by having a more secure OS.
My first impression of MX Linux is:
On the downside, I don't think it supports secure boot and the constellation of desktop tools and applications in my opinion is inferior to that of Puppy. Although, this may just be a matter of getting use to a new constellation.
Have you managed to dual boot Precise en BBpup?
For quite some time I have been using a very simple and fast procedure of my own design for creating multi-boot, EFI bootable disks. But, this procedure is probably known and used by many others as it is quite obvious if you think about it. If you read my original post carefully you will understand that I was not looking for any such procedure but a tweak to make my procedure work better. Further, if you read carefully you will see that I really only want a solution to a specialized multi-boot problem rather than a complete generic multi-boot problem. I would have gladly shared my procedure, but both you and bigpup were so adamant that you knew the best procedure and no other procedure could be better. Frankly, I am put off by that kind of arrogance. However, I will leave you with this hint. With respect to UEFI booting the end result of an installation is that certain files exists in certain locations in a FAT32 filesystem. Is there not another way to achieve this same result without going through bigpup's rather long and complicated procedure? N.B. Since, I am not using legacy booting the specialized tools needed to manipulate the MBR are not necessary.
As this may be my final post (or may not but as you can tell I am quite smitten with MX Linux) I wish to thank everyone that responded to my questions. I certainly learned a lot and am very grateful for what I have learned.