@jarkko I have set it up in a way that does not need to reseal the key on every kernel update. I use a combination of secure boot with kernel signed with my custom keys and tpm revealing luks secret only if bios or bios options haven't been tampered with. With this setup I only need to reseal the key on bios upgrades and on changed bios options.
It's quite trivial to get Secure Boot working, in general, without MS keys.
https://github.com/Foxboron/sbctl
But admittedly we (as in Arch) should really get the SB situation sorted.
@jarkko the urge to repartition my drive and switch to systemd-boot is strong, but I will resist. Sounds super interesting though!