Linux & DevOps

Exploring Sealed Bootable Container Images for Fedora Atomic Desktops

2026-05-14 15:07:11

Introduction

Fedora Atomic Desktops have taken a significant step forward with the introduction of sealed bootable container images. These images are now available for testing, promising enhanced security and streamlined disk unlocking. This article dives into what sealed images are, how they work, and how you can test them yourself.

Exploring Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

What Are Sealed Bootable Container Images?

Sealed bootable container images are pre-assembled system images that include every component needed for a fully verified boot chain—from the firmware all the way up to the operating system's composefs image. The sealing process relies on Secure Boot, meaning these images only support UEFI-based systems on x86_64 and aarch64 architectures. By integrating cryptographic signatures at each stage, the boot process becomes tamper-evident and verifiable.

Components of a Sealed Image

Each sealed image is composed of three key elements working in concert:

Both systemd-boot and the UKI are signed for Secure Boot. However, because these are test images, they are not signed with Fedora's official keys—so they carry an important caveat for production use.

Benefits of Sealed Images

The primary practical benefit is the ability to enable passwordless disk unlocking using the Trusted Platform Module (TPM) in a way that remains reasonably secure by default. With a sealed boot chain, the system can verify that the operating system hasn't been tampered with before releasing the disk encryption key to the TPM. This simplifies the user experience while maintaining strong security.

How to Test the Images

Ready to give sealed images a try? The getting-started guide is hosted on GitHub at github.com/travier/fedora-atomic-desktops-sealed. There you'll find instructions for downloading pre-built container and disk images, as well as guidance on building your own sealed images from source.

Before diving in, be aware of the following:

We welcome all testing and feedback! Please check the known issues list and report new bugs on the same repository. The development team will redirect issues to appropriate upstream projects as needed.

Exploring Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

Where to Learn More

If you're curious about the technical underpinnings—how bootable containers, UKIs, and composefs combine to create a verified boot chain—the following resources are excellent starting points:

These talks and documents explain the integration from both theoretical and practical perspectives.

Acknowledgments

This work would not have been possible without the contributions of many individuals across several projects: bootc & bcvk, composefs & composefs-rs, chunkah, podman & buildah, and systemd. The test images represent a collaborative effort to push bootable containers toward production-ready security.

Conclusion

Sealed bootable container images for Fedora Atomic Desktops mark an exciting milestone. They provide a verified boot chain that enables secure, passwordless TPM unlocking—without sacrificing usability. While still in testing, the infrastructure promises to bring enterprise-grade boot integrity to the Fedora ecosystem. Try them out, share your feedback, and help shape the future of bootable containers.

Explore

Googlebook Platform Leak Reveals Android-Powered Laptops Set to Replace Chromebook Building a Self-Improving Local AI Agent with Hermes and NVIDIA RTX 10 Critical npm Security Risks and How to Mitigate Them (Updated 2025) How Cloudflare Fortified Its Network by Mastering Controlled Failures Maximizing Go Performance with the Green Tea Garbage Collector: A Hands-On Tutorial