Currently, it’s not possible to boot past the GRUB for Qubes OS when Secure Boot is enabled in the UEFI, even with self-signed EFI entries or manually enrolling their hashes in the Authorized Signatures database. This means that for systems without the hardware for Qubes AEM, Qubes doesn’t support any bootloader verification.
A Unified Kernel Image would allow users to use Secure Boot, as well as securely unlocking their system using the TPM with a PIN (which otherwise can’t ensure boot integrity before releasing the key).
I heard that a Unified Kernel Image can be built for Qubes, but I could not find documentation about it anywhere. Does anyone know how this can be done?
As long as one is aware this is not secure against sophisticated attackers. Regular LUKS2 encryption with long passphrase as QubesOS has today is way more secure, even if less convenient.
And how long you intend to keep your data secure if your device is taken, as pretty much any TPM or other security chip will get all their security broken within 5 years from initial release. Whereas LUKS2 with long passphrase can keep your data secure for much longer than that.
I tested the script. It turns out that it absolutely is possible to build a UKI, and I’m now able to boot Qubes with Secure Boot enabled via the self-signed EFI entry.
I plan to document how it was done, in case anybody else would like to use one themselves.