public inbox for dm-crypt@saout.de
 help / color / mirror / Atom feed
* [dm-crypt] [DM-Verity][HELP] Unlock Verity Target during runtime
@ 2021-03-17 23:09 Aditya Prakash
  2021-03-18  3:11 ` [dm-crypt] " Eric Biggers
  0 siblings, 1 reply; 2+ messages in thread
From: Aditya Prakash @ 2021-03-17 23:09 UTC (permalink / raw)
  To: dm-crypt


[-- Attachment #1.1: Type: text/plain, Size: 499 bytes --]

Hi,
I am trying to implement DM-Verity for the rootfs. However, I am not sure
what the scope of DM Verity. I can see that given a root/sudo user, I can
unload the verity target, write to rootfs and format and load it again, is
it possible that this is normal that can be carried out using rootkits or
any privileged app?
Also, how can DM-Verity ensure that the system boots to correct rootfs if
rootfs was changed after an OTA?
Please help me to understand the actual scope of DM Verity

Thanks,
AP

[-- Attachment #1.2: Type: text/html, Size: 646 bytes --]

[-- Attachment #2: Type: text/plain, Size: 147 bytes --]

_______________________________________________
dm-crypt mailing list -- dm-crypt@saout.de
To unsubscribe send an email to dm-crypt-leave@saout.de

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2021-03-18  3:21 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2021-03-17 23:09 [dm-crypt] [DM-Verity][HELP] Unlock Verity Target during runtime Aditya Prakash
2021-03-18  3:11 ` [dm-crypt] " Eric Biggers

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox