-
-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Root filesystem should be read only and verified #6
Comments
Discussion on qubes mailing list: https://groups.google.com/forum/#!topic/qubes-devel/hG93VcwWtRY Somewhat working, but needs a way to automate the setup. |
Any documentation draft for this for Qubes 3/4? |
Documentation is non-existent, scripts are cryptic. Anyone using that feature that could give basic guidelines? Would gladly help. |
I haven't looked into updating the patches for Qubes 4, nor have I been successful in convincing the Qubes team to make it an option (or better, the default!). Qubes 3.2 has problems with templates mounted from RO drives if they are re-mounted RW while the template is running. This made it difficult to use this on a live system if the templates were ever updated while things were in use. |
@osresearch Looking forward to replicate dm-verity setup :) If you need help with documentation, just shoot technical stuff, i'm planning on helping documenting everything missing :). |
@osresearch With QubesOS 4 being out. Any update? |
@osresearch : ping :) |
- Removed dm-verity section and hardware hardening sections (see #26 and originally linuxboot/heads#6) - Removed recommended partition scheme in link to dm-verity for which changes were never merged into QubesOS (see #28), leaving the user with a unusable partition scheme ( 48Gb / used by QubesOS, the rest given but unused by /home)
@osresearch could be done by merging kernel changes for thin-provisioning support and #676 if some help was given. Another interesting path would be to bundle wyng inside of Heads, so the user could actually check his deployment integrity and emergency recover from those backups, which I think is more interesting then simply have dm-verity on TemplateVMs, which would be possible between TemplateVMs upgrades with dm-verity alone. Thoughts welcome. |
Fixes t430 color banding display issues
Qubesos has no plan on seperaring rootfs from configs, logs or as of now. Feel free to reopen when upstream OSes (eg Silverblue) static rootfs needs to be verified by Heads, or when qubesos changed their view and are going in a direction where that is possible to implement. |
dm-verity can be used to sign the root filesystem image with the user's key (stored in the ROM).
The text was updated successfully, but these errors were encountered: