Skip to content
This repository was archived by the owner on Aug 11, 2023. It is now read-only.

Commit

Permalink
Clarify ESP security aspects (#36)
Browse files Browse the repository at this point in the history
  • Loading branch information
andreyv committed May 13, 2022
1 parent 8da495f commit 2e4d58c
Showing 1 changed file with 7 additions and 3 deletions.
10 changes: 7 additions & 3 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -87,9 +87,13 @@ the boot may fail. See [#4](https://github.com/andreyv/sbupdate/issues/4).

## ESP mount point

Typically ESP is mounted on `/boot` and contains also the original, unsigned
files such as the Linux kernel image and initramfs. You may choose to mount ESP
on a different directory (for example, [`/efi`](https://www.freedesktop.org/software/systemd/man/bootctl.html#--esp-path=))
Typically [ESP](https://wiki.archlinux.org/title/EFI_system_partition) is
mounted on `/boot` and contains also the original, unsigned files such as the
Linux kernel image and initramfs. These files are susceptible to offline
tampering.

It is recommended to mount ESP on a different directory, such as
[`/efi`](https://www.freedesktop.org/software/systemd/man/bootctl.html#--esp-path=),
and keep `/boot` itself on the secure root file system. This way ESP will only
contain signed images which cannot be tampered with.

Expand Down

0 comments on commit 2e4d58c

Please sign in to comment.