Open
Description
We currently read the container config JSON without any sort of validation of the content. We can know the fsverity hash of the stream from when we create it, but assuming we don't make note of that, then when we go to open the config via its sha256 ID, we perform no checking at all.
We could fix this by adding an optional sha256 verification layer to the reader similar to the one we have in the writer. We could also read the entire (small) json document into a vec and checksum it there. We could also try to think about a reasonable way to make use of fsverity, but this seems to cut a little bit against how containers work today...
Solving this is important to the "mount verified container rootfs" goal.
Metadata
Assignees
Labels
No labels
Activity