Users can build a secure, confidential container environment by encrypting the root file system.
In {Singularity} >= v3.4.0 a new feature to build and run encrypted containers has been added to allow users to encrypt the file system image within a SIF. This encryption can be performed using either a passphrase or asymmetrically via an RSA key pair in Privacy Enhanced Mail (PEM/PKCS1) format. The container is encrypted in transit, at rest, and even while running. In other words, there is no intermediate, decrypted version of the container on disk. Container decryption occurs at runtime completely within kernel space.
Note
This feature utilizes the Linux dm-crypt
library and cryptsetup
utility and requires cryptsetup version of >= 2.0.0. This version
should be standard with recent Linux versions such as Ubuntu 18.04,
Debian 10 and CentOS/RHEL 7, but users of older Linux versions may have
to update.
A container can be encrypted either by supplying a plaintext passphrase or a PEM file containing an asymmetric RSA public key. Of these two methods the PEM file is more secure and is therefore recommended for production use.
Note
In {Singularity} 3.4, the definition file stored with the container will
not be encrypted. If it contains sensitive information you should remove
it before encryption via singularity sif del 1 myimage.sif
. Metadata
encryption will be addressed in a future release.
An -e|--encrypt
flag to singularity build
is used to indicate that the container needs to
be encrypted.
A passphrase or a key-file used to perform the encryption is supplied at build time via an environment variable or a command line option.
Encryption Method | Environment Variable | Commandline Option |
Passphrase | SINGULARITY_ENCRYPTION_PASSPHRASE |
--passphrase |
Asymmetric Key (PEM) | SINGULARITY_ENCRYPTION_PEM_PATH |
--pem-path |
The -e|--encrypt
flag is implicitly set when the --passphrase
or
--pem-path
flags are passed with the build command. If multiple encryption
related flags and/or environment variables are set, the following precedence is
respected.
--pem-path
--passphrase
SINGULARITY_ENCRYPTION_PEM_PATH
SINGULARITY_ENCRYPTION_PASSPHRASE
Note
Passphrase encryption is less secure than encrypting containers using an RSA key pair (detailed below). Passphrase encryption is provided as a convenience, and as a way for users to familiarize themselves with the encrypted container workflow, but users running encrypted containers in production are encouraged to use asymmetric keys.
In case of plaintext passphrase encryption, a passphrase is supplied by one of the following methods.
$ sudo singularity build --passphrase encrypted.sif encrypted.def
Enter encryption passphrase: <secret>
INFO: Starting build...
$ sudo SINGULARITY_ENCRYPTION_PASSPHRASE=<secret> singularity build --encrypt encrypted.sif encrypted.def
Starting build...
In this case it is necessary to use the --encrypt
flag since the presence of
an environment variable alone will not trigger the encrypted build workflow.
While this example shows how an environment variable can be used to set a
passphrase, you should set the environment variable in a way that will not
record your passphrase on the command line. For instance, you could save a
plain text passphrase in a file (e.g. secret.txt
) and use it like so.
$ export SINGULARITY_ENCRYPTION_PASSPHRASE=$(cat secret.txt)
$ sudo -E singularity build --encrypt encrypted.sif encrypted.def
Starting build...
{Singularity} currently supports RSA encryption using a public/private key-pair. Keys are supplied in PEM format. The public key is used to encrypt containers that can be decrypted on a host that has access to the secret private key.
You can create a pair of RSA keys suitable for encrypting your container with
the ssh-keygen
command, and then create a PEM file with a few specific flags
like so:
# Generate a key pair
$ ssh-keygen -t rsa -b 2048
Generating public/private rsa key pair.
Enter file in which to save the key (/home/vagrant/.ssh/id_rsa): rsa
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
[snip...]
# Convert the public key to PEM PKCS1 format
$ ssh-keygen -f ./rsa.pub -e -m pem >rsa_pub.pem
# Rename the private key (already PEM PKCS1) to a nice name
$ mv rsa rsa_pri.pem
You would use the rsa_pub.pem
file to encrypt your container and the rsa_pri.pem
file to run it.
$ sudo singularity build --pem-path=rsa_pub.pem encrypted.sif encrypted.def
Starting build...
$ sudo SINGULARITY_ENCRYPTION_PEM_PATH=rsa_pub.pem singularity build --encrypt encrypted.sif encrypted.def
Starting build...
In this case it is necessary to use the --encrypt
flag since the presence of
an environment variable alone will not trigger the encrypted build workflow.
To run
, shell
, or exec
an encrypted image, credentials to decrypt
the image need to be supplied at runtime either in a key-file or a plaintext
passphrase.
A passphrase can be supplied at runtime by either of the ways listed in the sections above.
$ singularity run --passphrase encrypted.sif
Enter passphrase for encrypted container: <secret>
$ SINGULARITY_ENCRYPTION_PASSPHRASE="secret" singularity run encrypted.sif
While this example shows how an environment variable can be used to set a
passphrase, you should set the environment variable in a way that will not
record your passphrase on the command line. For instance, you could save a
plain text passphrase in a file (e.g. secret.txt
) and use it like so.
$ export SINGULARITY_ENCRYPTION_PASSPHRASE=$(cat secret.txt)
$ singularity run encrypted.sif
A private key is supplied using either of the methods listed in the Encryption section above.
$ singularity run --pem-path=rsa_pri.pem encrypted.sif
$ SINGULARITY_ENCRYPTION_PEM_PATH=rsa_pri.pem singularity run encrypted.sif