You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Is your feature request related to a problem? Please describe.
The current implementation on aleph.im using AMD-SEV confidential VMs is unlikely to leverage data authentication features of the file system encryption. While disk encryption is enabled, data integrity and authentication are likely not enforced by default, which could expose the system to unauthorized modifications from the host operating system.
Describe the solution you'd like
Integrate LUKS/dm-crypt with data authentication enabled by default the scripts and documentation used to create confidential VM root filesystems. Looking at dm-verity and dm-integrity may be relevant.
The text was updated successfully, but these errors were encountered:
Is your feature request related to a problem? Please describe.
The current implementation on aleph.im using AMD-SEV confidential VMs is unlikely to leverage data authentication features of the file system encryption. While disk encryption is enabled, data integrity and authentication are likely not enforced by default, which could expose the system to unauthorized modifications from the host operating system.
Describe the solution you'd like
Integrate LUKS/dm-crypt with data authentication enabled by default the scripts and documentation used to create confidential VM root filesystems. Looking at
dm-verity
anddm-integrity
may be relevant.The text was updated successfully, but these errors were encountered: