30-second install
Fastest path. Secure Boot is off; every binary runs without verification. Fine for lab, not for production.
# Download release tarball from GitHub
curl -L -o lamboot.tar.gz \
https://github.com/lamco-admin/lamboot/releases/download/v0.8.3/lamboot-0.8.3-x86_64.tar.gz
tar xzf lamboot.tar.gz && cd lamboot-0.8.3
# Install
sudo ./lamboot-install
# Reboot and pick "LamBoot" from the firmware boot menu
Trust log still writes to \loader\boot-trust.log with verified_via: sb_disabled entries. GRUB stays in place as a secondary UEFI entry.
Secure Boot with MOK enrollment
Standard Linux practice: signed binaries, MOK enrollment via MokManager. Works on Ubuntu, Debian, Fedora.
# Install with signed binaries and MOK enrollment
sudo ./lamboot-install --signed
# You will be prompted to set a MOK enrollment passphrase.
# Reboot; in MokManager (blue screen) → Enroll MOK → Continue
# → enter passphrase → Yes → Reboot.
What the installer does
- — Deploys the signed LamBoot binary to
\EFI\LamBoot\lambootx64-signed.efi - — Deploys the distro shim as
\EFI\LamBoot\shimx64.efi - — Installs the bundled
lamboot-signing.dercert for MOK enrollment - — Registers a UEFI boot entry that chains shim → LamBoot
- — Never touches GRUB — it remains a separate boot entry
VM template deployment
Custom OVMF_VARS_lamboot.fd ships with LamBoot’s db cert pre-enrolled. No MokManager dance. Every cloned VM boots LamBoot under Secure Boot from first boot.
# Apply LamBoot-enrolled OVMF_VARS to a VM
cp lamboot-0.8.3/OVMF_VARS_lamboot.fd /var/lib/vz/images/100/OVMF_VARS_100.fd
sudo ./lamboot-install --signed --no-mok # cert already in firmware DB
Convert VM to template. All clones boot LamBoot without MokManager. See the Proxmox integration page for the monitoring story on top of this.
Removal
Clean uninstall restores the previous default boot entry and removes LamBoot from the ESP.
sudo lamboot-install --remove
# Restores previous default boot entry, removes \EFI\LamBoot, cleans BLS entries
lamboot-install flags
| Flag | Meaning |
|---|---|
| (default) | Unsigned install, SB off path |
| --signed | Install signed binaries + shim, enroll MOK |
| --no-shim | Install signed binary directly; assumes firmware DB trusts LamBoot cert (Config 2) |
| --no-mok | Skip MokManager enrollment (for Config 4 Proxmox VMs with pre-enrolled OVMF) |
| --remove | Uninstall and restore previous default boot entry |
Release artefacts
v0.8.3 release assets come from the public GitHub repo.