LWN: Comments on "A report from the 2022 Image-Based Linux Summit" https://lwn.net/Articles/912774/ This is a special feed containing comments posted to the individual LWN article titled "A report from the 2022 Image-Based Linux Summit". en-us Wed, 15 Oct 2025 22:09:21 +0000 Wed, 15 Oct 2025 22:09:21 +0000 https://www.rssboard.org/rss-specification lwn@lwn.net A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914594/ https://lwn.net/Articles/914594/ bluca <div class="FormattedComment"> Best solution is probably to use U-Boot on such machines, to get a UEFI interface. Otherwise, there's a patch being prepared for Grub by RH: <a href="https://github.com/osteffenrh/grub2/commit/d0c402c96159423242cf7b612773126ccc11a83b">https://github.com/osteffenrh/grub2/commit/d0c402c9615942...</a><br> </div> Fri, 11 Nov 2022 15:00:21 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914510/ https://lwn.net/Articles/914510/ pabs <div class="FormattedComment"> Will there be a way to launch UKIs on BIOS based machines? Lots of cloud vendors still use it and lots of folks could be stuck on old computers they can't afford to upgrade.<br> </div> Fri, 11 Nov 2022 08:50:36 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914353/ https://lwn.net/Articles/914353/ bluca <div class="FormattedComment"> Shim is orthogonal to this - it's the second stage loader that runs the UKI (systemd-boot or grub - yes there's a WIP patch for that). Of course if you enroll your own keys, you can self-sign the UKI and load it directly from the UEFI menu.<br> </div> Thu, 10 Nov 2022 14:41:14 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914338/ https://lwn.net/Articles/914338/ smitty_one_each <div class="FormattedComment"> <span class="QuotedText">&gt; By ... Lennart Poettering ...</span><br> <p> <span class="QuotedText">&gt; ... our employer, Microsoft ...</span><br> <p> I remember seeing neither the TPS Report, nor hearing the conspiracy theory covering this event.<br> <p> Nonetheless: cheers. I think your work has been a big win for the world in general, Lennart.<br> </div> Thu, 10 Nov 2022 14:05:16 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914304/ https://lwn.net/Articles/914304/ mjg59 <div class="FormattedComment"> The turnaround time for review wouldn't be viable even in the event of a policy change. The point of Shim wasn't primarily to deal with licensing issues, it was to ensure that distros could handle their own updates for the components that were more likely to change quickly. You don't want to wait a month to be able to release a kernel update.<br> </div> Thu, 10 Nov 2022 05:28:29 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914302/ https://lwn.net/Articles/914302/ pabs <div class="FormattedComment"> I see no mention of shim in this post but the UKI images are to be secure-boot signed, does that mean Microsoft is now willing to sign GPLed UEFI stuff?<br> </div> Thu, 10 Nov 2022 04:55:02 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914255/ https://lwn.net/Articles/914255/ amacater <div class="FormattedComment"> BoF - Birds of a feather (flock together). Often used for a small informal meet up, gathering or lecture.<br> <p> See, for example Debconf which has large plenary sessions, individual talks and then semi-formal BoFs to get people together on a small topic.<br> <p> </div> Wed, 09 Nov 2022 17:56:56 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914254/ https://lwn.net/Articles/914254/ Wol <div class="FormattedComment"> Birds of a Feather, I believe ... (ie a small bunch of like-minded people).<br> <p> Cheers,<br> Wol<br> </div> Wed, 09 Nov 2022 17:54:29 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914253/ https://lwn.net/Articles/914253/ calumapplepie <div class="FormattedComment"> Word, yo. <br> </div> Wed, 09 Nov 2022 17:46:55 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/914252/ https://lwn.net/Articles/914252/ calumapplepie <div class="FormattedComment"> <span class="QuotedText">&gt; The summit was intentionally kept small, as it was meant to be a series of conversations and brainstorming sessions, with no fixed agenda or presentations — a BoF-style event</span><br> <p> What does "BoF" stand for in this context?<br> </div> Wed, 09 Nov 2022 17:39:33 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913984/ https://lwn.net/Articles/913984/ hsiangkao <div class="FormattedComment"> IMHO, in short, it's much easier to do vendor signing, data verification, device (e.g. LBA-based) write-protection, reproducible builds, corrupted data online recovery, and more by doing image-based deployment.<br> </div> Mon, 07 Nov 2022 06:39:26 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913966/ https://lwn.net/Articles/913966/ willy <div class="FormattedComment"> You make a Powerful Point<br> </div> Sun, 06 Nov 2022 18:10:31 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913911/ https://lwn.net/Articles/913911/ champtar <div class="FormattedComment"> <span class="QuotedText">&gt; I can maybe see about trying to write some sort of docs for this there also in the uapi group?</span><br> <p> I would love to see such doc, so I have something to send to vendors so they might improve their RPMs (even if I don't have high hopes).<br> </div> Sat, 05 Nov 2022 02:06:28 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913889/ https://lwn.net/Articles/913889/ bluca <div class="FormattedComment"> What's been produced is a set of features and specifications, anything can provide and implement those. There's no reason something else could not implement them, "just" that someone has to do the work, and it's _a lot_ of work.<br> </div> Fri, 04 Nov 2022 18:17:13 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913881/ https://lwn.net/Articles/913881/ ale2018 <div class="FormattedComment"> Much of the discussion appears to assume systemd by default. I'm wondering whether the project is actually focused on that kind of distributions —thereby enlarging the gap between those ones and the ones without systemd— or not.<br> </div> Fri, 04 Nov 2022 16:38:41 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913873/ https://lwn.net/Articles/913873/ aszs <div class="FormattedComment"> I've been intrigued for a while about possibilities afforded from combining open-source reproducible builds with remote attestation. <br> <p> Imagine a certificate authority like Let's Encrypt but the challenge it requires for signing the request isn't only to prove the server answers to the cert's domain but also a remote attestation that the server is running the reproducible workload whose digest is in the cert. Then as a user I can have some assurance that the server I'm connecting to is running the code I'm expecting it to just by checking that digest. <br> <p> Sounds like we're getting closer but how far away is the state-of-the-art from having the necessary building blocks to enabling something like this? What is missing? <br> <p> </div> Fri, 04 Nov 2022 15:57:42 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913850/ https://lwn.net/Articles/913850/ walters <div class="FormattedComment"> <span class="QuotedText">&gt; ima/fs-verity do not fulfill the same role due to very important differences: they do not cover the whole filesystem hierarchy </span><br> <p> (Yes, I know this - and I'm pretty sure you know I know too ;) But, I know we're also conversing with an audience so some repetition is needed unfortunately)<br> <p> <span class="QuotedText">&gt; it simply means that they sit in a different place on the wide spectrum of image-based Linux, with significant enough differences to be meaningfully distinguishable.</span><br> <p> Yes! We're in agreement. There's lots of nuances between different points on that spectrum. And a lot of space to share knowledge and approaches across them.<br> <p> Security is also (as you know) not a binary thing. Personally, I think one of the biggest problems in our industry in general is people *not updating the operating system at all*. Switching to "the operating system auto-updates by default" was one of the big changes from the original Container Linux - and we've carried that forward in both Flatcar and Fedora CoreOS. It's actually a pretty profound difference in practice - I blogged about this but basically I think there's a strong sense of "responsibility" for updates that shifts from "I typed apt|dnf|whatever update and it broke, so it's my fault" to "the system just fell over, it's $OS's fault".<br> <p> On this topic, I think "unlocked" image based systems (like pulling btrfs snapshots, snap and ostree, etc.) having the properties of e.g. transactionality and offline updates (not disrupting the running system) provide a very meaningful improvement to security from *this* aspect. Not to mention the "we tested the update image server side and you are bit for bit reproducing it". <br> <p> Another way to say it is, these properties are also very meaningfully distinguishable from traditional package based systems. <br> <p> What I'm arguing at the core is: s/image based/dm-verity based/ in the original sentence. I also would tend to use the term "locked" or "sealed" when talking about this because honestly "image" means too many things already.<br> <p> </div> Fri, 04 Nov 2022 13:42:57 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913836/ https://lwn.net/Articles/913836/ bluca <div class="FormattedComment"> No, there's an option in that bios to turn the 3rd party UEFI cert back on, and the usual option to wipe the lists of certs and enroll your own.<br> Of course the user experience given by the default settings sucks, and it is being worked on. But it has nothing to do with this.<br> </div> Fri, 04 Nov 2022 11:42:22 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913834/ https://lwn.net/Articles/913834/ aragilar <div class="FormattedComment"> I may have misunderstood something, but is not <a href="https://mjg59.dreamwidth.org/59931.html">https://mjg59.dreamwidth.org/59931.html</a> an example?<br> </div> Fri, 04 Nov 2022 11:34:40 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913829/ https://lwn.net/Articles/913829/ bluca <div class="FormattedComment"> Yup, trying to get it in xdg-specs as well: <a href="https://gitlab.freedesktop.org/xdg/xdg-specs/-/merge_requests/59">https://gitlab.freedesktop.org/xdg/xdg-specs/-/merge_requ...</a><br> </div> Fri, 04 Nov 2022 10:26:55 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913828/ https://lwn.net/Articles/913828/ pothos <div class="FormattedComment"> Actually we discussed how rpm-ostree does a 3-way merge (even though not line by line) when updating /etc.<br> The outcome of this discussion was that we want to push applications to install their default configs to /usr instead and allow drop in files under /etc, which is written down in https://uapi-group.org/specifications/specs/base_directory_specification/<br> </div> Fri, 04 Nov 2022 10:23:30 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913825/ https://lwn.net/Articles/913825/ bluca <div class="FormattedComment"> It was an Excel-lent conference too! Thank you, I'm here all week.<br> </div> Fri, 04 Nov 2022 09:53:39 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913823/ https://lwn.net/Articles/913823/ bluca <div class="FormattedComment"> systemd-cryptsetup/cryptenroll support recovery keys (even as a QR code! It's really cool, you should try it out) that can be used as additional slots in LUKS, so offline recovery is possible and as easy as it can be made.<br> <p> There is no such "legal problem", this scare story has been around for 20 years since UEFI first arrived, and guess what, it never happened, because it does not make any sense. The UEFI spec mandates that the machine owner, with verified physical presence at the keyboard, can swap the keys.<br> </div> Fri, 04 Nov 2022 09:52:34 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913818/ https://lwn.net/Articles/913818/ smurf <div class="FormattedComment"> Presumably the home partition is encrypted with LUKS. LUKS can store more than one key, so one is in your TPM, one is a passphrase encrypted by a secret on an USB stick, and one is on a MicroSD card that's hidden in your safe.<br> <p> Not to mention your encrypted backups.<br> <p> </div> Fri, 04 Nov 2022 07:51:53 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913817/ https://lwn.net/Articles/913817/ zdzichu <div class="FormattedComment"> Well, restore from backup, of course!<br> </div> Fri, 04 Nov 2022 06:50:34 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913815/ https://lwn.net/Articles/913815/ NHO <div class="FormattedComment"> This solves technical problem of security from third party, in cool way.<br> What happens if motherboard in my laptop died from coffee-related accident and I need to extract data from my SSD that was automatically encrypted without asking me on installation, with keys stored in dead motherboard?<br> Proposal also does nothing to even address the fairly important legal problem: what if vendor decides that I am also third party, not permitted to meddle with software on my personal computer, and their ownership of root keys entitles them to extract wealth from me for the right to use hardware I own with software I own, until they decide that my hardware is not worth supporting and disable all software on it by the means of short-lived crypto cert?<br> </div> Fri, 04 Nov 2022 06:06:29 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913809/ https://lwn.net/Articles/913809/ jake <div class="FormattedComment"> <span class="QuotedText">&gt; "met in the Microsoft Office" --- for one second I thought this was a virtual conference.</span><br> <p> heh, that's an unfortunate typo, isn't it? :)<br> <p> fixed now ...<br> <p> jake<br> </div> Fri, 04 Nov 2022 01:29:28 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913808/ https://lwn.net/Articles/913808/ xecycle <div class="FormattedComment"> "met in the Microsoft Office" --- for one second I thought this was a virtual conference.<br> </div> Fri, 04 Nov 2022 01:26:42 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913805/ https://lwn.net/Articles/913805/ bluca <div class="FormattedComment"> Even with sysexts, there is still the single root of trust as it's signed dm-verity all the way down. ima/fs-verity do not fulfill the same role due to very important differences: they do not cover the whole filesystem hierarchy (you can create new files, delete existing files and recreate them, create directories, etc), and most important they do not cover the filesystem itself. The kernel is vulnerable to rogue filesystems, it is not a use case that it is hardened against. Signed dm-verity allows you to verify the integrity and trust of the filesystem before opening it, which is crucial for this threat model. In use cases where these properties are needed, it's very important to be fully covered: close enough is not good enough.<br> When adding the IPE LSM on top (<a href="https://microsoft.github.io/ipe/">https://microsoft.github.io/ipe/</a>) this allows a pretty neat and hardened system with full code integrity (well, it's at least getting there: still working on enlightening interpreters for scripts).<br> <p> Of course this does not mean that other systems like ostree and btrfs are bad or that they should not be used, it simply means that they sit in a different place on the wide spectrum of image-based Linux, with significant enough differences to be meaningfully distinguishable.<br> </div> Thu, 03 Nov 2022 23:35:36 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913783/ https://lwn.net/Articles/913783/ walters <div class="FormattedComment"> <span class="QuotedText">&gt; The key differentiator is support for full integrity protection at the block layer via dm-verity. Locally mutable systems like os-tree cannot provide that by definition. In many settings this is not a minor thing, but a fundamental design goal if not table stakes.</span><br> <p> IMO, the definition of "locally mutable" gets fuzzy here when one adds things like 3rd party sysexts into the mix. There's also the opposite case of using IMA or fs-verity underneath file-based systems (like ostree, but not exclusively - the old OLPC model of "let's use rsync to hardlinked filesystem trees" was another variant). Sure, it's not as strong as dm-verity, but it absolutely will (particularly in combination with other mechanisms like dm-crypt and other LSMs) stop many attacks. My classic example is the runc exploit. <a href="https://lwn.net/Articles/842164/">https://lwn.net/Articles/842164/</a><br> <p> But I think we're in agreement here to say that the cases are "dm-verity", "file based", and "btrfs snapshot" right? The original phrasing of excluding ostree from "image based" seems contradictory from having us under a shared discussion group. Not to mention, while rauc supports dm-verity it also seems to support non-dm-verity (e.g. plain squashfs) and I hope you'd agree that it's still an image based update system, it just doesn't have the dm-verity properties (in that setup) either.<br> <p> <p> </div> Thu, 03 Nov 2022 21:56:09 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913781/ https://lwn.net/Articles/913781/ bluca <div class="FormattedComment"> <span class="QuotedText">&gt; Hmm, I still think of ostree as an image system. I'd tend to say "block device image" perhaps versus "file based"? I would imagine that the people doing btrfs snapshots also think of them as image systems? In the end, the filesystem tree you're booting into is exactly reproducing the server, plus support for offline updates. To me those are two key differentiators versus the opposite end of the spectrum - traditional package based systems.</span><br> <p> The key differentiator is support for full integrity protection at the block layer via dm-verity. Locally mutable systems like os-tree cannot provide that by definition. In many settings this is not a minor thing, but a fundamental design goal if not table stakes.<br> <p> <span class="QuotedText">&gt; Finally, one thing I'd really hoped that could be discussed, but I'm not seeing here is a common push for filesystem compatibility changes across both distribution and 3rd party software. Specifically around things like installing files to /opt and best practices around building image systems and where state is stored - look at all the stuff in e.g. <a href="https://documentation.suse.com/sles/15-SP1/html/SLES-all/cha-transactional-updates.html">https://documentation.suse.com/sles/15-SP1/html/SLES-all/...</a> and e.g. <a href="https://bugzilla.redhat.com/show_bug.cgi?id=1900691">https://bugzilla.redhat.com/show_bug.cgi?id=1900691</a></span><br> I can maybe see about trying to write some sort of docs for this there also in the uapi group? I think this is relevant for e.g. systemd-sysext too. Ah, though interesting I see sysext merges /opt too. In the ostree model that's /var/opt to be always part of machine-local state.<br> <p> The specs repo is on Github and contributions are welcome. There is already a fork of the XDG-Base spec for handling of configuration files (that I'm trying to get merged upstream). In general we do not want to deviate excessively from the FHS, but enhancements are good.<br> </div> Thu, 03 Nov 2022 21:26:44 +0000 A report from the 2022 Image-Based Linux Summit https://lwn.net/Articles/913710/ https://lwn.net/Articles/913710/ walters <p>Thanks so much for starting this and writing it up! Looking forward to collaborating with others in this space. And hopefully I'll be able to make the next one of these in person!</p> <p>Some comments:</p> <blockquote>Others, like those based on OSTree, ship defaults in /usr/etc/ and then copy them over to /etc/ on instantiation.</blockquote> No, actually the configuration is merged across updates too. It means you get new default config files. To me, this is a key aspect that keeps ostree based systems feeling like a Unix system. First, running <tt>vi /etc/fstab</tt> will continue to Just Work. If you only instantiate <tt>/etc</tt> on firstboot/install time, then your system has <a href="https://blog.verbum.org/2020/08/22/immutable-%e2%86%92-reprovisionable-anti-hysteresis/">hysteresis</a> - its state depends on the installation version. Such a model I think can work at a small scale for custom, targeted operating systems - but for general purpose scale, people who maintain software that installs files in /etc are just going to say "it's your problem" if it doesn't work for them to add new files in /etc over time.<br> <blockquote>So far, initrds have always been built locally</blockquote> I think you mean for "package native" systems - several other image based update systems (including rpm-ostree and I'm pretty sure <a href="https://github.com/rauc/rauc">rauc</a> have been doing it for a long time. You are right about the integrity aspect though.<br> <blockquote>The projects represented at the summit can be divided in three camps: image-based deployments, ostree-based deployments, and Btrfs-based deployments. </blockquote> Hmm, I still think of ostree as an image system. I'd tend to say "block device image" perhaps versus "file based"? I would imagine that the people doing btrfs snapshots also think of them as image systems? In the end, the filesystem tree you're booting into is exactly reproducing the server, plus support for offline updates. To me those are two key differentiators versus the opposite end of the spectrum - traditional package based systems. <br> <p>Finally, one thing I'd really hoped that could be discussed, but I'm not seeing here is a common push for filesystem compatibility changes across both distribution and 3rd party software. Specifically around things like installing files to <tt>/opt</tt> and best practices around building image systems and where state is stored - look at all the stuff in e.g. https://documentation.suse.com/sles/15-SP1/html/SLES-all/cha-transactional-updates.html and e.g. https://bugzilla.redhat.com/show_bug.cgi?id=1900691<br> I can maybe see about trying to write some sort of docs for this there also in the uapi group? I think this is relevant for e.g. systemd-sysext too. Ah, though interesting I see sysext merges <tt>/opt</tt> too. In the ostree model that's <tt>/var/opt</tt> to be always part of machine-local state. </p> Thu, 03 Nov 2022 20:18:32 +0000