| multi-signed shim test day | |
|---|---|
| Date | 2026-01-12 to 2026-01-16 |
| Time | all week |
| Website | QA/Test Days |
| Matrix | #test-day:fedoraproject.org(other clients|?) |
| Mailing list | test |
What to test?[edit]
This Test Day will focus on booting shims that are signed by different Microsoft certificates.
UEFI Secure Boot is a chain of trust that originates in firmware, goes through the boot loaders, and to the kernel and kernel modules, ensuring that only signed, trusted components are loaded and malicious code is not executed. It is realized using asymmetric cryptography such that private keys are used to sign executable programs and public certificates are used to verify proper signatures. Microsoft acts as the Signing Authority, signing a primitive boot loader, called the shim, whose purpose is to verify and load further trusted components.
In June 2026, Microsoft will no longer be signing shim with the 2011 key, which is the key they have always used. As a result, firmware is being updated to also include the new 2023 certificate, and shim is currently being signed with both the 2011 and the 2023 keys.
The point of the test days is to find out how various hardware and firmware will deal with a shim that is signed with multiple signatures in order to make this transition as smooth as possible.
Who's available[edit]
The following cast of characters will be available testing, workarounds, bug fixes, and general discussion:
- Development - Peter Jones (pjones), Nicolas Frayer (@nfrayer:fedora.im), Marta Lewandowska (@marta-lewandowska:matrix.org)
- Quality - Lukáš Růžička (lruzicka), Kamil Paral (kparal), Adam Williamson (adamw), Petr Sklenář (psklenar), Jaroslav Groman (jgroman)
You can chat with us on Matrix. See the infobox on top of the page to learn where to join.
Prerequisite for Test Day[edit]
- A virtual machine or [preferably] a bare metal machine on which you are able and willing to toggle the Secure Boot state. Secure Boot needs to be enabled for test results to be relevant. (Use a test machine if possible.)
- There are two ways to test, so choose whichever one seems simplest or most comfortable.
- Fresh boot test: If you don't have fedora installed or you don't want to install additional packages, you can download these installer images, write them to a USB stick and try to boot each one:
- signed by the 2023 key only: Fedora-Server-netinst-x86_64-43-1.6.msft2023.img
- signed first by the 2011 and then by the 2023 key: Fedora-Server-netinst-x86_64-43-1.6.msft2011.msft2023.img
- signed first by the 2023 and then by the 2011 key: Fedora-Server-netinst-x86_64-43-1.6.msft2023.msft2011.img
- Boot from rpm: If you have a recent fedora installed, you can install the following rpms and try to boot each of them:
- signed by the 2023 key only: shimx64.msft2023-1-1.x86_64.rpm
- signed first by the 2011 and then by the 2023 key: shimx64.msft2011.msft2023-1-1.x86_64.rpm
- signed first by the 2023 and then by the 2011 key: shimx64.msft2023.msft2011-1-1.x86_64.rpm
- Fresh boot test: If you don't have fedora installed or you don't want to install additional packages, you can download these installer images, write them to a USB stick and try to boot each one:
How to test?[edit]
Visit the results page and click on the column title links to see the tests that need to be run: most column titles are links to a specific test case. Follow the instructions there, then enter your results by clicking the ➕ (plus) button for that test case.
Please also try to experiment and explore and perform tasks not mentioned in any of the pre-defined test cases.
Test cases[edit]
Make sure you've read the prerequisites section.
There are two possible ways to test. Please choose the method that is most comfortable for you. In both cases, please make sure that Secure Boot is enabled and make sure the option Allow Microsoft 3rd Party UEFI CA is enabled if present.
Fresh boot test[edit]
- Download each installation image, write it to a USB stick and try to boot your machine
- If you see the GRUB menu, the test succeeded.
- If you don't see the GRUB menu and instead see a Security Violation, the test has failed.
- Enter the results of each test on the results page.
- Boot to your installed OS
- Download and run show-trusted.sh:
bash show-trusted.sh - Install lshw:
sudo dnf install -y lshw - Run
sudo lshw -short - Post the results of the above commands to pastebin with Paste Expiration set to Never. Copy the final URL to the Comments column on the results page.
- Download and run show-trusted.sh:
Boot from rpm[edit]
- Download the three rpms and install them:
sudo rpm -Uvh shimx64.msft*.rpm- They will install themselves in /boot/efi/EFI/shimx64.msft* and copy grubx64.efi and grub.cfg from /boot/efi/EFI/fedora so that the system can boot.
- EFI boot entries will also be created for them:
efibootmgr, please see the screenshot below - Set the first entry you want to test to BootNext:
sudo efibootmgr -n 0003 - Reboot your machine
- When your machine comes back up, check if the correct entry actually booted:
sudo efibootmgr | grep BootCurrent - Enter your results on the results page.
- Boot to your installed OS
- Download and run show-trusted.sh:
source show-trusted.sh - Install lshw:
sudo dnf install -y lshw - Run
sudo lshw -short - Post the results of the above commands to pastebin with Paste Expiration set to Never. Copy the final URL to the Comments column on the results page.
- Download and run show-trusted.sh:
Reporting bugs[edit]
All new bugs should be reported into Red Hat Bugzilla, in most cases against the shim component.
When filing the bug, it's very helpful to include:
- exact steps you've performed (and whether you can reproduce it again)
- screenshots or videos, if applicable
- system journal (log), which you can retrieve by
journalctl -b > journal.txt - your system description
If you are unsure about exactly how to file the report or what other information to include, just ask us.
Please make sure to link to the bug when submitting your test result, thanks!
Test Results[edit]
Basic Tests[edit]
| User | Short system description, e.g. a desktop motherboard name, or laptop manufacturer + model name | 2023 only | first 2011 then 2023 | first 2023 then 2011 | References |
|---|---|---|---|---|---|
| Brandon Nielsen | Dell XPS 9360 | ||||
| Brandon Nielsen | Gigabyte B550 Eagle | ||||
| develux | TECNO MEGABOOK K16SDA (Ryzen 5 5625U model) |
| |||
| Frank Liang | AWS EC2 t3.small with UEFI DB CA 2011 and 2023 enrolled | ||||
| Frank Liang | AWS EC2 t3.small with UEFI DB CA 2011 enrolled | ||||
| Frank Liang | AWS EC2 t3.small with UEFI DB CA 2023 enrolled | ||||
| Geraldo S. Simião Kutz | F43 KDE on ACER Aspire A515-45 AMD Ryzen 7 5700U with Radeon Graphics + MEDIATEK MT7921 802.11ax | ||||
| Insyde | Intel ADL CRB + Insyde BIOS with CA 2011 | ||||
| Insyde | Intel ADL CRB + Insyde BIOS with CA 2011 and 2023 | ||||
| Insyde | Intel ADL CRB + Insyde BIOS with CA 2023 | ||||
| Jaroslav Groman | Beelink SER7 MiniPC (Ryzen 7 Pro, 32 GB RAM) |
| |||
| Jaroslav Groman | Fujitsu D5344-Sx (Celeron J4105. 8 GB RAM) |
| |||
| Jaroslav Groman | Gigabyte J3455N-D3H (Celeron J3455, 16 GB RAM) |
| |||
| Jaroslav Groman | Lenovo Thinkpad P16v Gen 1 | ||||
| Kamil Páral | Gigabyte X870 AORUS ELITE WIFI7 | ||||
| Kamil Páral | Lenovo Thinkpad P1 Gen3 |
| |||
| Kamil Páral | Lenovo Thinkpad P1 Gen4 | ||||
| Kamil Páral | Lenovo Thinkpad T14 Gen5 | ||||
| Leo Sandoval | ThinkPad Lenovo P16s Gen1 - CPU 12th Gen Intel Core i7-1260p - SB on | ||||
| Marta Lewandowska | Dell PowerEdge R640 |
| |||
| Marta Lewandowska | Dell PowerEdge R7425 |
| |||
| Marta Lewandowska | HP ml150gen9 |
| |||
| Marta Lewandowska | HPE DL120 gen10 |
| |||
| Marta Lewandowska | HPE ProLiant BL460c Gen9 |
| |||
| Marta Lewandowska | HPE Proliant BL660Gen9 |
| |||
| Marta Lewandowska | HPE ProLiant DL20 Gen9 |
| |||
| Marta Lewandowska | HPE TM200, Kaby Lake |
| |||
| Marta Lewandowska | Intel Whitley, Wilson City 2S, Ice Lake (ICX), D1, QS, 36c, 2.40Ghz |
| |||
| Nicolas Frayer | Dell XPS 15 9570 |
| |||
| Nicolas Frayer | Dell XPS 8910 | ||||
| Nicolas Frayer | Lenovo ThinkPad P1 Gen 3 | ||||
| Nicolas Frayer | PRIME H310M-A R2.0 |
| |||
| Nie Lili | ThinkPad P1 Gen 7 | ||||
| Nie Lili | ThinkPad T14s Gen 2i | ||||
| Nie Lili | ThinkPad T490s |
| |||
| norbertj | Lenovo Ideapad V110-15ISK | ||||
| norbertj | MoBo Asus Prime B450M-A | ||||
| Peter Jones | ASUS Prime TRX40-PRO no 2023 cert | ||||
| Peter Jones | Dell Inc. XPS 13 9320 | ||||
| Peter Jones | Dell Inc. XPS 13 9380 | ||||
| Peter Jones | Dell Inc. XPS 13 9380 no 2023 cert | ||||
| Petr Janda | Lenovo T430s |
| |||
| Petr Janda | T14s gen1 |
| |||
| Petr Sklenar | Lenovo X1 Carbon | ||||
| Petr Sklenar | thinkpad P16V GEN1 |
| |||
| Rob Kraker | Dell Optiplex XE2 i5-4570S 16GB DDR3 Fedora 43 Workstation GNOME | ||||
| Sherif Nagy | Dell Inc. XPS 15 9510 | ||||
| Sherif Nagy | Penguin Computing Relion XE2112GT GPU |

