-
Notifications
You must be signed in to change notification settings - Fork 519
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot hibernate bottlerocket instance in AWS #2964
Comments
Thank you for bringing this up @gilbahat. We are aware that Bottlerocket is currently not working with AWS hibernation, but we have plans to work towards enabling hibernation this year. Due to the nature of Bottlerocket this unfortunately is not as straight forward as is on a general purpose distribution as you have pointed out. Especially the situation around encryption and attribution of the hibernation image at resume is something that is an interesting discussion. This point becomes even more interesting once we enable SecureBoot, which we are also working towards in #2501 As I am either way already working on scoping this I will take this one on. Unfortunately we currently do not have a more precise timeline than this year. I will update here with more details and a better timeline whenever I have more information. I will, however, convert the |
Bottlerocket doesn't allow hibernation because it uses kernel lockdown which prohibits hibernation. I think it can be a secure option to do the following: |
Thanks for your interest in this issue Isaak. While I had something similar in mind I was not aware of that patch you linked. For the long run, however, I was tracking the more elaborate efforts that are being discussed upstream for "Encrypted Hibernation". But given the discussion it will probably take a bit more until that arrives in its final form. Until then I am looking at solutions like the one sketched out by you, and maybe limiting usage to scenarios where we can reason about the implications of softening the lockdown rules, like you have made the case for above. |
Is there any security problem with hibernating into a KMS encrpyted volume? |
Sorry for the long pause here. Priorities have shifted around a bit and Hibernation functionality as the team within AWS was working on got de-prioritized. However, we are happy to take contributions, if they do work universally without breaching the security boundaries we have set. Let me elaborate a bit on this and try to answer the question @isaacdorfman posed: Yes, from a security standpoint we would be fine hibernating into a KMS encrypted volume. However, as far as I know we can not tell from within a running instance if an EBS volume is encrypted. AWS handles that encryption transparently. So for now I am putting this issue in |
What I expected to happen:
I expected bottlerocket to be configurable to allow hibernation as per AWS standards
What actually happened:
bottlerocket ships with kernel_lockdown enabled. while prudent, it has a hibernation policy that requires encrypted swapfiles:
[ 1872.560443] Lockdown: grep: hibernation is restricted; see man kernel_lockdown.7
this policy makes a lot of sense on physical machines but very little sense on cloud instances, where at-rest encryption is done by the cloud provider itself.
How to reproduce the problem:
(* while AWS requirements call for hibernation space to be in the root volume, these instructions skip this part because the failure is unrelated. if you want to be prudent about it, change the block device mapping to increase the root volume size and you will get an extra ext4 partition which qualifies)
The text was updated successfully, but these errors were encountered: