Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ensure that data authentication is enabled LUKS for confidential VMs #687

Open
hoh opened this issue Sep 2, 2024 · 0 comments
Open

Ensure that data authentication is enabled LUKS for confidential VMs #687

hoh opened this issue Sep 2, 2024 · 0 comments
Labels
enhancement New feature or request

Comments

@hoh
Copy link
Member

hoh commented Sep 2, 2024

Is your feature request related to a problem? Please describe.

The current implementation on aleph.im using AMD-SEV confidential VMs is unlikely to leverage data authentication features of the file system encryption. While disk encryption is enabled, data integrity and authentication are likely not enforced by default, which could expose the system to unauthorized modifications from the host operating system.

Describe the solution you'd like
Integrate LUKS/dm-crypt with data authentication enabled by default the scripts and documentation used to create confidential VM root filesystems. Looking at dm-verity and dm-integrity may be relevant.

@hoh hoh added the enhancement New feature or request label Sep 2, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
None yet
Development

No branches or pull requests

1 participant