Linux & DevOps

Introducing Sealed Bootable Container Images for Fedora Atomic Desktops: Your Guide to Verified Boot Chains

2026-05-01 13:53:36

We are excited to announce the availability of sealed bootable container images for testing within the Fedora Atomic Desktops ecosystem. These images represent a significant step forward in security and convenience, enabling a fully verified boot chain from firmware through the operating system. By integrating Secure Boot, Unified Kernel Images (UKIs), and composefs with fs-verity, the sealed images provide a trustworthy foundation that unlocks new capabilities, such as passwordless disk unlocking via the TPM. Below, we answer common questions about how these images work, what they contain, and how you can start testing them today.

What are sealed bootable container images?

Sealed bootable container images are pre-built container images that contain all necessary components to create a fully verified boot chain. This means every step from the initial firmware to the final composefs image is cryptographically signed and verified. The verification relies on Secure Boot, which requires UEFI firmware on x86_64 and aarch64 architectures. By packaging everything in a sealed format, these images ensure that only authentic, untampered software runs during the boot process. This approach not only enhances security but also paves the way for features like passwordless disk encryption unlocking using the TPM, which becomes reasonably secure by default with a verified boot path.

Introducing Sealed Bootable Container Images for Fedora Atomic Desktops: Your Guide to Verified Boot Chains
Source: fedoramagazine.org

What are the key components of a sealed boot image?

A sealed bootable container image is composed of three main parts:

Both systemd-boot and the UKI are signed using test keys (not Fedora’s official keys) for these early testing images. This combination ensures that every layer of the boot process can be verified cryptographically.

What are the main benefits of sealed bootable images?

The primary benefit of sealed bootable images is the ability to establish a robust, verified boot chain without manual intervention. With this foundation, we can enable passwordless disk unlocking using the TPM. Since the boot components are signed and verified, the system can trust that it is running authentic software before presenting encryption keys to the TPM. This makes automatic disk unlocking both convenient and reasonably secure by default. Additionally, the sealed nature prevents unauthorized modifications to the boot chain, protecting against certain classes of attacks such as bootkits or firmware tampering. For users and administrators, it simplifies the process of maintaining a trustworthy system, especially in automated or remote environments.

How can I test these sealed bootable container images?

To start testing, follow the detailed instructions available on the fedora-atomic-desktops-sealed GitHub repository. There you will find pre-built container images and disk images that you can deploy on UEFI systems. The repository also includes guidance on how to build custom sealed images if you wish to modify the components. Feedback and bug reports are highly welcome. Please check the current list of known issues before reporting new problems. The development team will redirect relevant issues to the appropriate upstream projects.

Introducing Sealed Bootable Container Images for Fedora Atomic Desktops: Your Guide to Verified Boot Chains
Source: fedoramagazine.org

What should I be aware of when testing these images?

These are testing images and are not suitable for production use. Important caveats include:

Always test in isolated, non-critical environments. For more details on the specific security implications, refer to the repository’s README.

Where can I find more details about how sealed images work?

For an in-depth understanding of the technology behind sealed bootable container images, we recommend the following resources:

These resources explain how bootable containers, UKIs, and composefs collaborate to produce a verified boot chain.

Who contributed to making sealed bootable images possible?

This achievement is the result of collaborative work from numerous contributors across several open-source projects, including (but not limited to): bootc & bcvk, composefs & composefs-rs, chunkah, podman & buildah, and systemd. The integration of these tools and libraries enabled the creation of a sealed, verifiable boot path that is both practical and performant. We extend our sincere thanks to everyone who have invested time and expertise into this feature. Their efforts are helping to make Linux desktop and server systems more secure by default.

Explore

7 Key Insights into Building a Greener Web: Lessons from the Four-Minute Mile Exploring How I Get Free Traffic from ChatGPT in 2025 (AIO vs SEO) Crypto Markets Rally as Bitcoin Surges to Two-Month High Amid Regulatory Shifts and Institutional Moves How to Mark a Quarter Century of Mars Exploration: Crafting a Global Map Celebration 5 Key Updates About Google Wallet's Digital ID Expansion on Android