LWN: Comments on "Adding fs-verity support for Fedora 36?" https://lwn.net/Articles/878281/ This is a special feed containing comments posted to the individual LWN article titled "Adding fs-verity support for Fedora 36?". en-us Wed, 15 Oct 2025 16:49:20 +0000 Wed, 15 Oct 2025 16:49:20 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net Adding fs-verity support for Fedora 36? https://lwn.net/Articles/880215/ https://lwn.net/Articles/880215/ Klavs <div class="FormattedComment"> TPM is the &quot;closest attempt&quot; - but again - if its a personal user device - I strongly dislike &quot;protecting&quot; against the user being able to exercise their rights<br> </div> Mon, 03 Jan 2022 12:27:17 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/880214/ https://lwn.net/Articles/880214/ Klavs <div class="FormattedComment"> you cannot in fact protect against physical attacks IMHO - and it sounds unlikely anyone would even bother trying for a &quot;personal user&quot;-device - and also - trying to do physical protection, sounds more like you&#x27;re trying to build a tivo device - ie. one thats protected against the owner actually using his rights to modify the software as he sees fit.. - not a good use case in my book.<br> </div> Mon, 03 Jan 2022 12:26:07 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/879180/ https://lwn.net/Articles/879180/ zuki <div class="FormattedComment"> <font class="QuotedText">&gt; Adding keys is a much noisier operation than swapping out binaries with modified versions.</font><br> <p> The point I was trying to make is that partial protection is very easy to circumvent without anyone noticing. My Fedora installation is 800k *files* under /usr, and 4500 files under /etc. With so many files, it&#x27;s just too easy to find thousands of files that can be modified to hide something nefarious without anyone ever noticing. Signing keys may be not be the best option for stealth, but they are an obvious example of how you can defeat the system if you can modify arbitrary files.<br> </div> Mon, 20 Dec 2021 12:14:43 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878966/ https://lwn.net/Articles/878966/ LtWorf <div class="FormattedComment"> But this doesn&#x27;t protect user data?<br> <p> Isn&#x27;t it better (actually safe instead of kinda safe in a few selected scenarios) to use a usb stick to boot and then an encrypted partition?<br> </div> Fri, 17 Dec 2021 07:07:15 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878950/ https://lwn.net/Articles/878950/ walters <div class="FormattedComment"> (upstream ostree developer here btw)<br> <p> One big problem with ostree and fs-verity that I was wrestling with is that by design, the data format is not extensible - extensibility is hard to mix with cryptographic checksums and reproducibility. There isn&#x27;t a place to put new per-file data in the current design; at least, not without doing some hacks.<br> <p> That said we have a big initiative going on recently around &quot;container native&quot; ostree where we encapsulate the updates inside a container image - see <a href="https://fedoraproject.org/wiki/Changes/OstreeNativeContainer">https://fedoraproject.org/wiki/Changes/OstreeNativeContainer</a> - and the tar format is much more flexible (which is both a benefit and a drawback, see e.g. <a href="https://github.com/vbatts/tar-split">https://github.com/vbatts/tar-split</a> )<br> <p> But basically I&#x27;ve been thinking it could make sense to embed fs-verity Merkle trees and signatures in the tar stream, and have the client know how to write those natively.<br> <p> <p> <p> <p> <p> </div> Thu, 16 Dec 2021 23:16:58 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878887/ https://lwn.net/Articles/878887/ mebrown <div class="FormattedComment"> Correct. The merkle trees and signatures would all be computed and signed by the build system in a secure manner.<br> <p> It looks to me like the RPM mechanism in discussion for Fedora actually &#x27;ships&#x27; only the signature with the RPM, and the merkle trees are re-constructed at installation time. We are likely to do something similar, but are still in early design phase so that&#x27;s not coded up yet.<br> <p> Personally, I am a big fan of the &quot;ship the signatures, reconstruct the merkle trees on install&quot; method. We did something similar in the past with DM-Verity and even re-construct the verity forward error correction codes on install. Saves a fair amount of download bandwidth.<br> </div> Thu, 16 Dec 2021 17:48:18 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878885/ https://lwn.net/Articles/878885/ mebrown <div class="FormattedComment"> The entire point of the stack (DM-Crypt+DM-Integrity) is to ensure there is no possible way to modify anything while the machine is off. This protects against several threat models: supply chain attacks where equipment is intercepted en-route and malicious firmware installed, attacks involving theft, possibly others.<br> <p> Most of the government purchasing contracts require robust protection against supply chain attacks.<br> </div> Thu, 16 Dec 2021 17:43:46 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878805/ https://lwn.net/Articles/878805/ draco <div class="FormattedComment"> Can&#x27;t be turned off even if I&#x27;m directly modifying the bits on the device?<br> </div> Thu, 16 Dec 2021 00:34:35 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878788/ https://lwn.net/Articles/878788/ walters <div class="FormattedComment"> Are you doing the ostree+fs-verity stuff out of band? This relates to <a href="https://github.com/ostreedev/ostree/pull/2269">https://github.com/ostreedev/ostree/pull/2269</a><br> </div> Wed, 15 Dec 2021 21:27:00 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878763/ https://lwn.net/Articles/878763/ bluca <div class="FormattedComment"> fsverity is a feature flag, you cannot disable it on a filesystem once it&#x27;s enabled<br> </div> Wed, 15 Dec 2021 18:22:56 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878760/ https://lwn.net/Articles/878760/ LtWorf <div class="FormattedComment"> but… if you change the files while the machine is off… why not also disable the fs check then as well?<br> <p> It seems the old problem of trying to make a root account less powerful by just adding extra steps to achieve the same things.<br> </div> Wed, 15 Dec 2021 18:05:22 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878752/ https://lwn.net/Articles/878752/ mebrown <div class="FormattedComment"> I ship an embedded linux device. That device has to adhere to various NIST and other governmental standards regarding robustness and reliability. We are very interested in using this stack of technologies to secure our device for our users. We have built in a way for the user to take control of their device and install their own stuff to handle the folks that want to do the open source management themselves, but the default device state is that it is verifiably secure with cryptographic checks up and down the stack. We cant sell into a huge segment of the marketplace without these controls in place.<br> <p> stack looks like: DM-Crypt + DM-Integrity, EXT or F2FS, FS-Verity, OSTree + Flatpack<br> <p> With the above plus SELinux and all internal daemons running as non-root, we have good protection against offline attacks (think desoldering EMMC chips) as well as protection against runtime hacks.<br> <p> The biggest hole I can see is we need a way to sign/seal directories to prevent executable replacement attacks.<br> <p> This stack enables us to provide more features over the older technologies, so there is distinct benefit to users even if they never crack it open themselves. The old stack was squashfs+dm-verity, so fundamentally everything was read-only. With the new stack, we can enable installation of application-level updates, installation of new applicaitons, and more.<br> </div> Wed, 15 Dec 2021 16:48:02 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878750/ https://lwn.net/Articles/878750/ LtWorf <div class="FormattedComment"> My suspicious nature is that there is a use case for this but it&#x27;s nothing the community would like.<br> <p> If there is not a use case I agree that it&#x27;s a complete waste of time since probably use cases will require different features to be implemented.<br> </div> Wed, 15 Dec 2021 16:07:47 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878718/ https://lwn.net/Articles/878718/ gray_-_wolf <div class="FormattedComment"> Then what *is* the actual use case for this? If someone can temper with the actual blocks on the device, what does this exactly prevent? I know that the article said that it&#x27;s supposed to be just plumbing with some use case (maybe) comming later, but should the use case be first?<br> </div> Wed, 15 Dec 2021 13:26:01 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878716/ https://lwn.net/Articles/878716/ Conan_Kudo It wouldn't work very well for them, since (if you are the administrator) you can just <i>turn it off</i> and do what you will. Wed, 15 Dec 2021 11:45:28 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878715/ https://lwn.net/Articles/878715/ atnot <div class="FormattedComment"> <font class="QuotedText">&gt; If the keys are loaded from the file system, can I just drop in a rogue key, similarly to what happens when new keys are distributed as part of distro upgrades?</font><br> <p> I don&#x27;t think that&#x27;s inherently disarming. Adding keys is a much noisier operation than swapping out binaries with modified versions. If attackers are forced to do easily detectable things to gain persistence on a system, I think that is a good thing. If you can&#x27;t have a lock it&#x27;s good to at least have a seal.<br> </div> Wed, 15 Dec 2021 11:26:47 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878714/ https://lwn.net/Articles/878714/ LtWorf <div class="FormattedComment"> Seems to me the actual users of the feature would be proprietary softwares that don&#x27;t want people to replace bad sections of code with NOP, edit scripts, and so on…<br> </div> Wed, 15 Dec 2021 11:15:51 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878711/ https://lwn.net/Articles/878711/ gray_-_wolf <div class="FormattedComment"> <font class="QuotedText">&gt; Not all filesystems are ZFS, with their own internal per-block checksums.</font><br> <p> Btrfs does that as well, so there is in-kernel support for this. You don&#x27;t need ZFS.<br> </div> Wed, 15 Dec 2021 09:52:10 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878710/ https://lwn.net/Articles/878710/ rahulsundaram <div class="FormattedComment"> Atleast partly answered by the following in the linked feature proposal<br> <p> <a href="https://fedoraproject.org/wiki/Changes/FsVerityRPM#Can_you_elaborate_on_the_threat_model.3F_How_is_RPM_able_to_update_files.3F">https://fedoraproject.org/wiki/Changes/FsVerityRPM#Can_yo...</a><br> <p> <a href="https://fedoraproject.org/wiki/Changes/FsVerityRPM#Can_the_user_modify_a_file_shipped_by_a_package_.28e.g._to_edit_a_script_while_debugging.29_.3F">https://fedoraproject.org/wiki/Changes/FsVerityRPM#Can_th...</a><br> </div> Wed, 15 Dec 2021 09:18:15 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878707/ https://lwn.net/Articles/878707/ taladar <div class="FormattedComment"> So what happens if we need to update the file on purpose, either via RPM, or, such as in the case of the recent log4j issues, through manual workarounds (e.g. adding a property to the shell script starting some Java application)?<br> </div> Wed, 15 Dec 2021 08:51:48 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878701/ https://lwn.net/Articles/878701/ Henning <div class="FormattedComment"> This seems more like a job for dm-integrity and it seems like systemd 250 will support it (at least according to the release notes).<br> </div> Wed, 15 Dec 2021 02:33:17 +0000 Adding fs-verity support for Fedora 36? https://lwn.net/Articles/878699/ https://lwn.net/Articles/878699/ developer122 <div class="FormattedComment"> The building block for larger security schemes is nice and all, but I&#x27;m not really even interested in it from the standpoint of security.<br> <p> This sounds like it could also be used to ensure the integrity of a file, like system libraries for example, against random corruption. It can be automatically detected if a file has been damaged since it was installed, and I suppose in later work damaged files could be automatically re-aquired.<br> <p> Not all filesystems are ZFS, with their own internal per-block checksums.<br> </div> Wed, 15 Dec 2021 00:15:42 +0000