Skip to content
This repository has been archived by the owner on Jun 3, 2022. It is now read-only.

ostreedev/ostreefs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

53 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

NOTICE:

Work on ostreefs is now stopped, in favour of https://github.com/giuseppe/composefs/.

Ostreefs

ostreefs is a kernel filesystem that mounts ostree commits directly from an on-disk (bare format) ostree repository, with the goal of continuous verification of the ostree content. In other words, protect against any changes to the data in the filesystem as specified by the ostree commit id either online or offline.

Short background on ostree repos

A normal booted ostree system contains two parts, a repository and a checkout of a commit from the repository.

The repository has is a directory of "object files" which are indexed by the sha256 of their content and metadata. Some object files describe directories, and some regular files. There are also commit objects that contain a reference to the root directory. The regular file objects look just like the real files on disk (apart from the name), but the others are in a custom file format.

To be able to use such a repo ostree makes a checkout of the commit. This converts the directory metadata files to actual regular directories the kernel can understand, with the regular files in them being hard-links to the files in the repo.

All the object files in the repository are verified by comparing the actual checksum with the expected one during download. In addition the commit object can be verified against a gpg signature.

When the system is booted, the checkout for the commit we're booting is bind-mounted read-only as the root filesystem.

Verification issues with ostree

Once an ostree commit has been downloaded and checked out on disk, we never do any further verifications. This means that an attacker changing or adding files in the checkout (or accidental changes) will not be detected.

It is possible to enable fs-verity for the files in the repository, which will tell the kernel to make the repo files immutable and all further reads from them will be verified against the stored checksums. However, this does not prohibit adding or replacing files.

So, while the verification at deploy is nice, we would like to complete this with continuous verification, where every single I/O operation is verified against the ostree commit digest before being used.

Introducing ostreefs

Instead of using a checkout of the commit and hardlinks to the repostory we use a custom kernel-based filesystem somewhat similar to overlayfs. It mounts the commit directly from the ostree repo, and ensures that directory metadata is immutable and verified before used.

For example, suppose you have an ostree repo in /some/repo, and it contains a commit with id f163640407d292e262442ab76af6eca4e2722d54c081c7be6e005114a57057dd. Then you can mount this at /mnt/ostree by specifing the commit and the object directory from the repo as mount options, like this:

# mount ostreefs -t ostreefs -o commit=f163640407d292e262442ab76af6eca4e2722d54c081c7be6e005114a57057dd,objectdir=/some/repo/repo/objects /mnt/ostree
# ls -l /mnt/ostree
total 0
lrwxrwxrwx. 1 root root    0 Jan  1  1970 bin -> usr/bin
drwxr-xr-x. 1 root root 4096 Jan  1  1970 boot
drwxr-xr-x. 1 root root 4096 Jan  1  1970 dev
lrwxrwxrwx. 1 root root    0 Jan  1  1970 home -> var/home
lrwxrwxrwx. 1 root root    0 Jan  1  1970 lib -> usr/lib
lrwxrwxrwx. 1 root root    0 Jan  1  1970 lib64 -> usr/lib64
lrwxrwxrwx. 1 root root    0 Jan  1  1970 media -> run/media
lrwxrwxrwx. 1 root root    0 Jan  1  1970 mnt -> var/mnt
lrwxrwxrwx. 1 root root    0 Jan  1  1970 opt -> var/opt
lrwxrwxrwx. 1 root root    0 Jan  1  1970 ostree -> sysroot/ostree
drwxr-xr-x. 1 root root 4096 Jan  1  1970 proc
lrwxrwxrwx. 1 root root    0 Jan  1  1970 root -> var/roothome
drwxr-xr-x. 1 root root 4096 Jan  1  1970 run
lrwxrwxrwx. 1 root root    0 Jan  1  1970 sbin -> usr/sbin
lrwxrwxrwx. 1 root root    0 Jan  1  1970 srv -> var/srv
drwxr-xr-x. 1 root root 4096 Jan  1  1970 sys
drwxr-xr-x. 1 root root 4096 Jan  1  1970 sysroot
drwxrwxrwt. 1 root root 4096 Jan  1  1970 tmp
drwxr-xr-x. 1 root root 4096 Jan  1  1970 usr
drwxr-xr-x. 1 root root 4096 Jan  1  1970 var

By default ostreefs assumes ostree repos are in bare mode, but if you pass repomode=bare-user it also works with bare-user repositories.

Building ostreefs

Before using ostreefs you must build the ostreefs kernel module against the kernel sources matching the version you are running. On Fedora and CentOS this is available in the kernel-devel package as /usr/src/kernels/$kernelversion, other distributions may have a different location.

To build and load the ostreefs module, then run:

# make -C /usr/src/kernels/$(uname -r) modules M=$PWD
# insmod ostreefs.ko

SELinux issues

Ostreefs support xattrs natively, and selinux normally uses xattrs to store selinux file contexts. However, this only works if the local policy allows a particular filesystem type to use xattrs for selinux, and the default is to not allow it. So, until the default selinux contexts supports ostreefs, you need to manually install a local policy for this.

To enable ostreefs selinux support, run:

# semodule -i ostreefs.cli

And, to later revert it, run:

# semodule -r ostreefs

Verification status

Ostreefs currently verifies the sha256 checksum of the commit, dirmeta, dirtree and symbolic link object before using them, and keep the data in kernel memory after verification. This means that a any such metadata is guaranteed to correctly match what was in the original commit at all times.

However, content and metadata for regular files is a bit more complex. Verifying file contents requires a full sha256 checksum of the file contents, which is costly. And even if we do the checksum calculation once, there is no guarantees that the backing file isn't changed by some other process while ostreefs is using it.

There are three modes for file verification today, controlled by the fileverify mount option

  • none: (default) No verification of file content
  • once: The sha256 of the file metadata (uid, gid, mode, xattrs) and content is computed at inode lookup time and checked against the object id.
  • full: Same behaviour as once, however we verify that the backing file object has fs-verity enabled. This guarantees it is immutable, so the initial check is valid over time.

In the future we would like to have a mode that can rely on the actual fs-verify checksum, so that we can avoid having to run a sha256 over the file contents.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 3

  •  
  •  
  •