Testing Sealed Bootable Container Images for Fedora Atomic Desktops

Fedora Atomic Desktop enthusiasts now have a new experimental feature to explore: sealed bootable container images. These images are designed to establish a fully verified boot chain, from the firmware all the way through to the operating system's composefs image, enhancing security and enabling features like passwordless disk unlocking via the Trusted Platform Module (TPM). Below, we break down what these images are, how to test them, and where you can dive deeper into the technology.

What Are Sealed Bootable Container Images?

Sealed bootable container images integrate all necessary components for a complete, verified boot process. This relies on Secure Boot, so it only functions on systems booting with UEFI on x86_64 and aarch64 architectures. The key components included are:

Testing Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

Both systemd-boot and the UKI are signed for Secure Boot, though because these are testing images, the signatures use test keys rather than official Fedora keys.

Benefits: Passwordless Disk Unlocking with TPM

The primary advantage of this sealed boot chain is the ability to enable passwordless disk unlocking using the TPM in a way that is reasonably secure by default. With a verified boot chain, the system can trust that the disk encryption key is released only to the correct, unmodified operating system, streamlining the boot process without sacrificing security.

How to Test the Images

To try out the pre-built container and disk images, or to build your own, follow the instructions available on the dedicated GitHub repository: github.com/travier/fedora-atomic-desktops-sealed. The repository provides clear steps for getting started, whether you want to run the sealed image as a container or create a bootable disk image.

Feedback and Known Issues

Testing and feedback are highly encouraged. Before reporting an issue, please check the list of known issues on the same repository. New issues can be filed there, and the maintainers will redirect them to the appropriate upstream projects as needed. Your input helps refine this feature for broader adoption.

Testing Sealed Bootable Container Images for Fedora Atomic Desktops
Source: fedoramagazine.org

Important Caveats for Test Images

These are testing images, not production-ready. Please be aware of the following:

Where to Learn More

If you want to understand how sealed images work—how bootable containers, UKIs, and composefs combine to create a verified boot chain—the following resources provide detailed explanations:

Acknowledgments

This work would not have been possible without the contributions of many individuals across several projects, including (but not limited to):

We extend our gratitude to all contributors for making sealed bootable container images a reality.

Recommended

Discover More

10 Key Improvements in the April 2026 Python Environments Extension UpdateFBI Alert: Cyber-Criminal Cartels Driving Record $725M Cargo Theft Surge in North AmericaTech CEO Out-of-Touch Quotes Quiz: Can You Spot the Speaker?Microsoft Unveils Layered Security Blueprint for Azure IaaS: Defense in Depth RedefinedHow to Secure a Record-Breaking AI Infrastructure Deal: Lessons from Akamai's 27% Stock Surge