Linux & DevOps

5 Key Things You Need to Know About Fedora’s Sealed Bootable Container Images

2026-05-01 05:46:21

Fedora’s Atomic Desktop team has just released sealed bootable container images for testing. These images create a fully verified boot chain from firmware to the operating system, leveraging Secure Boot and modern container technology. If you’re curious about how this works, how to test it, or what it means for security, this list covers the essentials.

1. What Are Sealed Bootable Container Images?

Sealed bootable container images are pre-built system images that contain every component needed to verify the entire boot process. Starting from the firmware, each step is cryptographically signed and checked, ensuring that only trusted code runs on your machine. This approach uses Secure Boot and is designed for UEFI systems on x86_64 and aarch64. The main benefit? It enables passwordless disk unlocking via the Trusted Platform Module (TPM) in a reasonably secure way by default. Instead of typing a passphrase at every boot, the TPM verifies the boot chain and automatically unlocks the disk, streamlining the user experience while maintaining strong security guarantees.

5 Key Things You Need to Know About Fedora’s Sealed Bootable Container Images
Source: fedoramagazine.org

2. The Core Components Behind the Verified Boot Chain

Three key pieces work together to create the sealed environment:

Both systemd-boot and the UKI are signed with test keys for Secure Boot—not the official Fedora keys. This allows early testing without final production signing. The result is a chain where the firmware verifies the bootloader, which verifies the UKI, which then mounts the verified composefs image, creating an unbroken trust path.

3. How to Test the Pre-Built Images

Getting started is straightforward. The project provides both container images and disk images you can deploy directly. Detailed instructions live on the Fedora Atomic Desktops Sealed GitHub repository. You can also build your own customized sealed images using the provided tooling. The test images include SSH enabled and no root password set by default—this is intentional for debugging. Evaluate the process on a non-production machine first. For any issues or feedback, the repository has a list of known problems and a place to report new ones; the maintainers will redirect relevant bugs to upstream projects like bootc, composefs, or systemd as needed.

4. Important Caveats for Testers

These images are strictly in the testing phase. Do not use them on production systems. Key points to remember:

5 Key Things You Need to Know About Fedora’s Sealed Bootable Container Images
Source: fedoramagazine.org

By understanding these limitations, you can test effectively without risking your main workstation.

5. Where to Learn More and Contribute

The sealed bootable container effort builds on work from multiple upstream projects. For a deeper dive, check out these resources:

Contributors from bootc, bcvk, composefs and composefs-rs, chunkah, podman, buildah, and systemd have made this possible. You can join the fedora-atomic-desktops-sealed repository to report bugs, submit patches, or simply ask questions. Your testing helps harden the solution before it becomes a default option in future Fedora releases.

Sealed bootable container images represent a significant step toward more secure, container-native operating systems. By combining modern boot tooling with verified filesystems, Fedora is laying the groundwork for passwordless, tamper-proof disk encryption. Start testing today and help shape the next generation of Atomic Desktops.

Explore

Breaking: Microsoft Launches Full-Screen Xbox Mode for All Windows 11 PCs DNA Folding Dynamics: How Active Genes Influence Neighbors Through Physical Changes How to Build a Tooltip with the Native Popover API (No Library Needed) Understanding Stack Allocation for Slices in Go 7 Key Developments in the OnePlus-Realme Merger: What It Means for the Brand's Future