Skip to content

docs/composefs: Note semantics with Secure Boot disabled#2036

Merged
cgwalters merged 1 commit intobootc-dev:mainfrom
cgwalters:bootc.secureboot
Mar 3, 2026
Merged

docs/composefs: Note semantics with Secure Boot disabled#2036
cgwalters merged 1 commit intobootc-dev:mainfrom
cgwalters:bootc.secureboot

Conversation

@cgwalters
Copy link
Collaborator

Came up in chat.

Came up in chat.

Signed-off-by: Colin Walters <walters@verbum.org>
@github-actions github-actions bot added the area/documentation Updates to the documentation label Mar 3, 2026
@bootc-bot bootc-bot bot requested a review from gursewak1997 March 3, 2026 14:20
Copy link
Contributor

@gemini-code-assist gemini-code-assist bot left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Code Review

The pull request adds a new section to the experimental-composefs.md documentation, detailing the semantics of using sealed Unified Kernel Images (UKIs) when Secure Boot is disabled. This new section clarifies that while composefs still provides integrity validation for the root filesystem, the root digest itself is not validated, posing a security risk if local code is compromised. It also explains the intentional support for this mode for local testing and notes the current lack of streamlined local UKI regeneration.

Note: Security Review has been skipped due to the limited scope of the PR.

@jeckersb
Copy link
Collaborator

jeckersb commented Mar 3, 2026

On a related note (maybe tag onto this, maybe a followup?) what if a user very specifically wants the image to fail when run with secure boot disabled?

Probably more of a followup because I could see that being a somewhat common case where for compliance reasons you'd want to bake "allow_insecure_boot = false" into the config in your image and we would check that very early in the boot process and panic if necessary. It would give image authors reasonable (not absolute) guarantees that their image couldn't accidentally be deployed without secureboot. More guardrails than anything, if you wanted to be really sure you'd have to pre-measure and check PCR values I guess.

@cgwalters
Copy link
Collaborator Author

One can already today add a systemd unit with ConditionSecurity=!uefi-secureboot that performs any desired action, whether in the initramfs or real root.

I think you raise a valid point, but it's probably best addressed in a different doc; could be a midstream/downstream OS focused one, but could be tips&tricks here?

if you wanted to be really sure you'd have to pre-measure and check PCR values I guess.

Yes this gets into "attestation" in the general case really.

That said I did see https://mjg59.dreamwidth.org/54203.html go by a while ago and there's probably some cool stuff possible there even for standalone desktop/single-node-home-server cases.

@cgwalters cgwalters enabled auto-merge (rebase) March 3, 2026 14:57
@mrguitar
Copy link
Contributor

mrguitar commented Mar 3, 2026

Thanks for adding this. I've never once spoken with a user who likes/enjoys adding secure boot keys. We should assume X% won't mess with it and defaulting to a degraded security state is the right answer IMO. I think if users want something more strict as @jeckersb mentions they should opt into it, not the default. $0.02

Copy link
Contributor

@jmarrero jmarrero left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@cgwalters cgwalters merged commit 217cd24 into bootc-dev:main Mar 3, 2026
47 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

area/documentation Updates to the documentation

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants