Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Root filesystem should be read only and verified #6

Closed
osresearch opened this issue Aug 3, 2016 · 9 comments
Closed

Root filesystem should be read only and verified #6

osresearch opened this issue Aug 3, 2016 · 9 comments
Milestone

Comments

@osresearch
Copy link
Collaborator

dm-verity can be used to sign the root filesystem image with the user's key (stored in the ROM).

@osresearch osresearch added this to the verifiedboot milestone Aug 3, 2016
@osresearch
Copy link
Collaborator Author

Discussion on qubes mailing list: https://groups.google.com/forum/#!topic/qubes-devel/hG93VcwWtRY

Somewhat working, but needs a way to automate the setup.

@tlaurion
Copy link
Collaborator

tlaurion commented Oct 3, 2017

Any documentation draft for this for Qubes 3/4?

@tlaurion
Copy link
Collaborator

Documentation is non-existent, scripts are cryptic. Anyone using that feature that could give basic guidelines? Would gladly help.

@osresearch
Copy link
Collaborator Author

I haven't looked into updating the patches for Qubes 4, nor have I been successful in convincing the Qubes team to make it an option (or better, the default!).

Qubes 3.2 has problems with templates mounted from RO drives if they are re-mounted RW while the template is running. This made it difficult to use this on a live system if the templates were ever updated while things were in use.

@tlaurion
Copy link
Collaborator

@osresearch Looking forward to replicate dm-verity setup :) If you need help with documentation, just shoot technical stuff, i'm planning on helping documenting everything missing :).

@tlaurion
Copy link
Collaborator

@osresearch With QubesOS 4 being out. Any update?

@tlaurion
Copy link
Collaborator

tlaurion commented Nov 8, 2018

@osresearch : ping :)

tlaurion added a commit to linuxboot/heads-wiki that referenced this issue May 21, 2019
- Removed dm-verity section and hardware hardening sections (see #26 and originally linuxboot/heads#6)
- Removed recommended partition scheme in link to dm-verity for which changes were never merged into QubesOS (see #28), leaving the user with a unusable partition scheme ( 48Gb / used by QubesOS, the rest given but unused by /home)
@tlaurion
Copy link
Collaborator

tlaurion commented Mar 9, 2020

@osresearch could be done by merging kernel changes for thin-provisioning support and #676 if some help was given.

Another interesting path would be to bundle wyng inside of Heads, so the user could actually check his deployment integrity and emergency recover from those backups, which I think is more interesting then simply have dm-verity on TemplateVMs, which would be possible between TemplateVMs upgrades with dm-verity alone.

Thoughts welcome.

@tlaurion
Copy link
Collaborator

Qubesos has no plan on seperaring rootfs from configs, logs or as of now.

Feel free to reopen when upstream OSes (eg Silverblue) static rootfs needs to be verified by Heads, or when qubesos changed their view and are going in a direction where that is possible to implement.

@tlaurion tlaurion closed this as not planned Won't fix, can't repro, duplicate, stale Apr 16, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants