-
I'm working with integrating composefs into our distro (Torizon OS) and a question came up that I couldn't figure out by looking at the current docs/code/issues (including #2867) so I was hoping someone could help me here. Just to explain our use case, we use the Yocto/OpenEmbedded layer Later, a installer executed on a target device creates a partition on the storage device, formats it with the proper fs (and fs options) and populates it by unpacking the tarball from the installer image. In the composefs use case, I was wondering what would be the proper process for enabling fsverity on the composefs image belonging to this initial deployment that was produced on a build machine. For new deployments produced on the device, I see that ostree already carries out the enabling at deployment time which seems the best thing to do. But, for the initial deployment at least in our use case where the pack/unpack the sysroot the verity information would be lost anyway (even if it existed on the repo on the build machine). Considering the above I imagined some possibilities:
For me it seems option (3) would be the easiest for integrating ostree+composefs into our solution but checking the code it doesn't look like Finally my questions:
Thanks in advance for any help! |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
The #3094 command was motivated by this problem of a disk image building tool being unaware of fsverity. If you need to stick with the "unpack a tarball" flow, then you'll need to do something like that. Another option is to switch from tar to a custom format which is aware of fsverity. (I am not aware of one, but it wouldn't be really hard) I personally think the best option is to have the ostree CLI directly write to the disk image, but I understand why in some cross-compilation environments that may be difficult.
This one I think is just a bad idea, not just from a security PoV but also it would add nontrivial firstboot latency. |
Beta Was this translation helpful? Give feedback.
The #3094 command was motivated by this problem of a disk image building tool being unaware of fsverity. If you need to stick with the "unpack a tarball" flow, then you'll need to do something like that.
Another option is to switch from tar to a custom format which is aware of fsverity. (I am not aware of one, but it wouldn't be really hard)
I personally think the best option is to have the ostree CLI directly write to the disk image, but I understand why in some cross-compilation environments that may be difficult.
This one I think is just a bad idea, not just from a security PoV but also …