-
Notifications
You must be signed in to change notification settings - Fork 334
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Extend Verity= to support hash-only verity and deferred verity-sig #3466
Conversation
@septatrix I've reverted the changes to use |
3802a96
to
b225cc9
Compare
b225cc9
to
1dc6000
Compare
I think that's fair and fine by me. One could even justify this by saying that this uses the names from sd-image-policy and "hash = verity - signed" ;) |
1dc6000
to
f2addd5
Compare
Building an unsigned extension image with verity hashes provides data integrity without needing a certificate on the target machine. Note that systemd-dissect and systemd-sysext doesn't automatically use the verity data has partition for validation. Both tools enables validation if the user.verity.roothash xattr is set for the image. For systemd-dissect, one can use the --root-hash option to enable the validation. The root hash can be obtained by concatenating the partition uuid's for the root and the root-verity partitions.
This defers the creation of the verity-sig partition which is useful when doing offline signing.
f2addd5
to
1f60496
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Tested this change in OBS for the deferred option and works nicely
@DaanDeMeyer Thanks for finishing this. I was back late from FOSDEM, and then had to overcome the flu I picked up while there... |
@hundeboll No worries, thanks for doing the initial work. You should have come say hi at FOSDEM, we (mkosi/systemd maintainers) were there as well. |
No description provided.