Linux & DevOps

Achieving Secure Boot Chains: Testing Sealed Bootable Container Images for Fedora Atomic Desktops

2026-05-02 02:08:01

Introduction

The Fedora Atomic Desktops team has reached an exciting milestone: sealed bootable container images are now available for testing. These images bring a fully verified boot chain to your system, from firmware to operating system, leveraging Secure Boot and modern Linux technologies. This article explains what sealed images are, how they work, and how you can test them yourself.

Achieving Secure Boot Chains: Testing Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

What Are Sealed Bootable Container Images?

Sealed bootable container images are complete operating system images that include all components required to establish a trusted, verified boot sequence. The verification starts at the firmware level and extends to the composefs image layer. Because this relies on Secure Boot, it only supports UEFI-based systems on x86_64 and aarch64 architectures.

Components of the Verified Boot Chain

Both the systemd-boot and UKI are signed for Secure Boot. Note that these test images are signed with temporary keys, not the official Fedora signing keys.

Key Benefit: Passwordless Disk Unlocking

The most immediate advantage of this sealed boot chain is the ability to enable passwordless disk unlocking via the Trusted Platform Module (TPM). Because the boot process is fully verified, the TPM can securely release the disk encryption key without requiring a password, offering a reasonable level of security by default.

Testing the Pre-built Images

Ready to give sealed container images a try? Step-by-step instructions for downloading and running pre-built disk images (or building your own) are available in the fedora-atomic-desktops-sealed repository. The guide covers both container-based and traditional disk image usage.

How to Get Started

  1. Clone or visit the repository
  2. Follow the instructions to obtain a pre-built image or build from source
  3. Boot the image on a UEFI system (x86_64 or aarch64)
  4. Test features like passwordless disk unlocking and verified boot

Important Considerations for Test Images

These are testing images only. They are not intended for production use. Please note the following:

Achieving Secure Boot Chains: Testing Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

If you encounter any issues, check the known issues list and report new bugs there. The maintainers will redirect relevant reports to the appropriate upstream projects.

Additional Resources

To dive deeper into how sealed bootable container images work (combining bootable containers, UKIs, and composefs for a verified chain), consult these presentations and documentation:

Thanks to all contributors from projects including bootc & bcvk, composefs & composefs-rs, chunkah, podman & buildah, and systemd.

Conclusion

Sealed bootable container images represent a significant step toward fully verified boot chains for Fedora Atomic Desktops. By testing these images, you help improve the feature and pave the way for secure, passwordless disk encryption. Get your hands on the pre-built images today and share your feedback.

Explore

Mozilla Upgrades Firefox's Free VPN with User-Selectable Server Locations Apple Q2 2026 Earnings: How to Tune In and What to Expect Python Insider Blog Relocated to GitHub: New Features and How to Contribute Linux 7.2 Kernel Update: 'Fair' DRM Scheduler and AMD AIE4 Hardware Integration Coming Linux Firmware Service Cuts Access for Non-Contributing Vendors Amid Sustainability Crisis