Forrest logo
back to the mokutil tool

mokutil:tldr:a3e11

mokutil: Enable Secure Boot.
$ mokutil --enable-validation
try on your machine

The mokutil --enable-validation command is used to enable the validation of Secure Boot keys in Unified Extensible Firmware Interface (UEFI) systems.

Secure Boot is a security feature implemented in UEFI firmware that ensures only trusted firmware, drivers, and operating systems are loaded during the boot process. It prevents the execution of malicious or unauthorized software that could compromise system security.

However, there may be cases where users need to load unsigned or self-signed kernel modules or drivers that are not recognized as trusted by Secure Boot. To support this, UEFI systems provide a feature called Machine Owner Key (MOK). MOK allows individuals or organizations to sign their own modules with their keys, so they can be loaded despite not being signed by the system's trusted keys.

The mokutil command is a utility that manages MOKs. The --enable-validation option, when used with mokutil, allows the system to validate the MOK signatures during the boot process and load the signed modules accordingly.

By running mokutil --enable-validation, you are activating the MOK validation mechanism, ensuring that only properly signed modules are loaded during the Secure Boot process. This helps maintain the system's security while still allowing the use of signed modules that are authorized by the user or organization.

This explanation was created by an AI. In most cases those are correct. But please always be careful and never run a command you are not sure if it is safe.
back to the mokutil tool