aleph-im / aleph-vm

Aleph.im VM execution engine
MIT License
43 stars 18 forks source link

Ensure that data authentication is enabled LUKS for confidential VMs #687

Open hoh opened 2 months ago

hoh commented 2 months ago

Is your feature request related to a problem? Please describe.

The current implementation on aleph.im using AMD-SEV confidential VMs is unlikely to leverage data authentication features of the file system encryption. While disk encryption is enabled, data integrity and authentication are likely not enforced by default, which could expose the system to unauthorized modifications from the host operating system.

Describe the solution you'd like Integrate LUKS/dm-crypt with data authentication enabled by default the scripts and documentation used to create confidential VM root filesystems. Looking at dm-verity and dm-integrity may be relevant.