Confidential Computing Requirements
System
Creating a confidential virtual machine currently requires the creation of an encrypted disk on a machine you trust. This machine must run Linux on x86_64 (64 bit CPU, most recent PCs but not Mac) and have IPv6 connectivity.
The documentation below assumes a Linux system based on Debian or Ubuntu, but the procedure can be adjusted to other distributions.
This requirement will be lifted in the future with confidential virtual machines that encrypt the filesystem themself.
Software required
- The aleph-client command-line tool
- The sevctl tool from AMD
- A OpenSSH keypair
- An IPFS Server
- Optional: Qemu to test your VM locally
aleph-client
The aleph-client
command line tool can be installed
following the documentation here.
sevctl
Installing Rust and Cargo:
Some packages may need to be installed on some systems (ex: Ubuntu) in order to build sevctl:
The sevctl tool can then be installed using cargo
:
ℹ️ On Windows, we recommend using WSL following the same previous steps.
guestmount
This tool is used to create the encrypted disk.
On systems based on Debian/Ubuntu, it can be installed using:
Note: Up to 119 dependencies and 178 MB of additional disk space will be used.
IPFS Server
The encrypted filesystem you will create is close to 4 GB.
In order to copy in on the aleph.im decentralized network, it is required to first make it available on IPFS.