But it can! That’s what I’m saying, it can now finally understand LUKS2 with argon2 encryption (the default when using ‘cryptsetup format’)… version 2.14 is in 26.04 LTS right now, it’s just that the signed version needs resigning with that module included!
Ultimately it boils down to whether you (or anyone reading this) thinks…
a) The “line” should be drawn where your UEFI or non-UEFI based bootloader is mostly a static thing where it reads any customisation/options/config via another filesystem which stores that stuff (which may or may not be encrypted)… and when it comes to booting a Linux kernel (or anything else like memtest) it should read that off another (or same) filesystem also (again possibly encrypted).
b) The “line” should be drawn where your UEFI or non-UEFI based bootloader is again a mostly static thing but has little (if any) need to read any customisation files (e.g. jpg/png images) from other filesystems, but it would still need to read its config/options from another filesystem anyway (which again may or may not be encrypted)… but also still needs to find the Linux kernel on another filesystem (also possibly encrypted) and boot it.
c) The “line” should be that if you have UEFI then essentially don’t bother with a real bootloader at all… just boots the kernel as directly as possible by using a UKI. Then if you’re non-UEFI then err… you use GRUB anyway or maybe load the UKI using Limine!? Either way it’s not as consistent between non-UEFI and UEFI.
Ultimately I think anyone who says “just turn off Secure Boot” isn’t really acting in good faith in this discussion… the whole point is to keep this turned on (as it is turned on for the vast majority of new hardware… and asking new users to fiddle with that is just counterintuitive).
As a distribution… Ubuntu has by default always been option a) since it’s inception with GRUB. But there has never been anything to stop people from reworking this into any alternative they like (like another bootloader or a UKI) which I’m all in favour of… until Secure Boot came along and limited the choices that is!
It sounds like the op prefers option b)… but unless they say which modules were causing a problem, it just seems heavy handed… and doesn’t really change that GRUB needs to access other filesystems anyway! Is there some kind of security bug involving GRUB reading a JPEG or something?
Like it or not… I am in the “camp” that says I prefer my GRUB bootloader to be… a) slim enough to work and be customisable… b) read as much customisation/config data from another filesystem (even if encrypted) to keep what is in the ESP or MBR at a minimum… c) be able to boot kernels from another/same filesystem (again even if encrypted).
But that’s essentially the status quo as it is now… it’s just that signed GRUB needs to be signed with whatever unsigned GRUB has… and if unsigned GRUB has stuff in it which is problematic (from a security perspective), then tell us what those issues are and it’ll make sense to remove them.
I believe signed GRUB can already read from encrypted filesystems now (just not LUKS 2 and argon2)… so it’s not like it can’t do this in some respects already. This feels like it’ll be a massive downgrade… and basically a precursor to getting people off GRUB.