Skip to content

Commit c56edc5

Browse files
authored
Merge pull request #206854 from fcabrera23/eflow-diagnose-nw
Thank you for these fixes. This has been merged.
2 parents a97f510 + a31c577 commit c56edc5

File tree

3 files changed

+197
-6
lines changed

3 files changed

+197
-6
lines changed

articles/iot-edge/TOC.yml

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,8 @@
231231
items:
232232
- name: Diagnose virtual machine
233233
href: troubleshoot-iot-edge-for-linux-on-windows.md
234+
- name: Diagnose virtual machine networking
235+
href: troubleshoot-iot-edge-for-linux-on-windows-networking.md
234236
- name: Resolve common errors
235237
href: troubleshoot-iot-edge-for-linux-on-windows-common-errors.md
236238
- name: Develop custom modules

articles/iot-edge/iot-edge-for-linux-on-windows-security.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,21 +4,21 @@ description: Security framework - Azure IoT Edge for Linux on Windows
44
keywords:
55
author: PatAltimore
66
ms.author: fcabrera
7-
ms.date: 03/14/2022
7+
ms.date: 08/03/2022
88
ms.topic: conceptual
99
ms.service: iot-edge
1010
services: iot-edge
1111
---
1212

13-
# Security
13+
# IoT Edge for Linux on Windows security
1414

1515
[!INCLUDE [iot-edge-version-201806-or-202011](../../includes/iot-edge-version-201806-or-202011.md)]
1616

1717
Azure IoT Edge for Linux on Windows benefits from all the security offerings from running on a Windows Client/Server host and ensures all the extra components keep the same security premises. This article provides information about the different security premises that are enabled by default, and some of the optional premises the user may enable.
1818

1919
## Virtual machine security
2020

21-
The IoT Edge for Linux (EFLOW) curated virtual machine is based on [Microsoft CBL-Mariner](https://github.com/microsoft/CBL-Mariner). CBL-Mariner is an internal Linux distribution for Microsofts cloud infrastructure and edge products and services. CBL-Mariner is designed to provide a consistent platform for these devices and services and enhances Microsofts ability to stay current on Linux updates. For more information, see [CBL-Mariner security](https://github.com/microsoft/CBL-Mariner/blob/1.0/SECURITY.md).
21+
The IoT Edge for Linux (EFLOW) curated virtual machine is based on [Microsoft CBL-Mariner](https://github.com/microsoft/CBL-Mariner). CBL-Mariner is an internal Linux distribution for Microsoft's cloud infrastructure and edge products and services. CBL-Mariner is designed to provide a consistent platform for these devices and services and enhances Microsoft's ability to stay current on Linux updates. For more information, see [CBL-Mariner security](https://github.com/microsoft/CBL-Mariner/blob/1.0/SECURITY.md).
2222

2323
<!-- 1.1 -->
2424
:::moniker range="iotedge-2018-06"
@@ -44,7 +44,7 @@ The EFLOW virtual machine is built on a four-point comprehensive security platfo
4444
When security vulnerabilities arise, CBL-Mariner makes the latest security patches and fixes available for being serviced through ELOW monthly updates. The virtual machine has no package manager, so it's not possible to manually download and install RPM packages. All updates to the virtual machine are installed using EFLOW A/B update mechanism. For more information on EFLOW updates, see [Update IoT Edge for Linux on Windows](./iot-edge-for-linux-on-windows-updates.md)
4545

4646
### Read-only root filesystem
47-
The EFLOW virtual machine is made up of two main partitions *rootfs*, and *data*. The rootFS-A or rootFS-B partitions are interchangeable and one of the two is mounted as a read-only filesystem at `/`, which means that no changes are allowed on files stored inside this partition. On the other hand, the *data* partition mounted under `/var` is readable and writeable, allowing the user to modify the content inside the partition. The data stored on this partition isnt manipulated by the update process and hence won't be modified across updates.
47+
The EFLOW virtual machine is made up of two main partitions *rootfs*, and *data*. The rootFS-A or rootFS-B partitions are interchangeable and one of the two is mounted as a read-only filesystem at `/`, which means that no changes are allowed on files stored inside this partition. On the other hand, the *data* partition mounted under `/var` is readable and writeable, allowing the user to modify the content inside the partition. The data stored on this partition isn't manipulated by the update process and hence won't be modified across updates.
4848

4949
Because you may need write access to `/etc`, `/home`, `/root`, `/var` for specific use cases, write access for these directories is done by overlaying them onto our data partition specifically to the directory `/var/.eflow/overlays`. The end result of this is that users can write anything to the previous mentioned directories. For more information about overlays, see [*overlayfs*](https://docs.kernel.org/filesystems/overlayfs.html).
5050

@@ -107,9 +107,9 @@ By default, the EFLOW virtual machine uses [*iptables*](https://git.netfilter.or
107107
:::moniker range=">=iotedge-2020-11"
108108
### Verified boot
109109
110-
The EFLOW virtual machine supports **Verified boot** through the included *device-mapper-verity (dm-verity)* kernel feature, which provides transparent integrity checking of block devices. *dm-verity* helps prevent persistent rootkits that can hold onto root privileges and compromise devices. This feature assures the virtual machine base fotware image it's the same and it wasn't altered. The virtual machine uses the *dm-verity* feature to check specific block device, the underlying storage layer of the file system, and determine if it matches its expected configuration.
110+
The EFLOW virtual machine supports **Verified boot** through the included *device-mapper-verity (dm-verity)* kernel feature, which provides transparent integrity checking of block devices. *dm-verity* helps prevent persistent rootkits that can hold onto root privileges and compromise devices. This feature assures the virtual machine base software image it's the same and it wasn't altered. The virtual machine uses the *dm-verity* feature to check specific block device, the underlying storage layer of the file system, and determine if it matches its expected configuration.
111111
112-
By default, this feature is enabled in the virtual machine, and can't be turned off. For more information, see [dm-verity](https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/verity.html#).
112+
By default, this feature is disabled in the virtual machine, and can be turned on or off. For more information, see [dm-verity](https://www.kernel.org/doc/html/latest/admin-guide/device-mapper/verity.html#).
113113
114114
:::moniker-end
115115
<!-- end iotedge-2020-11 -->

0 commit comments

Comments
 (0)