STATUS: OPERATIONAL

Table of Contents

1. Property P2 — Integrity of the boot chain

Objective
The Xen hypervisor binary, as loaded into memory by the bootloader, must have its integrity cryptographically verified against a known-good hash derived from a reproducible, open-source build.
Key-result
Publish the SHA-256 of the Xen ELF binary that is fetched by the bootloader; provide a reproducible build that yields the same hash from published Debian sources.

Test:

xl dmesg | sed -n '/Xen version/s/.*: //p' | xargs -I{} \
       bash -c 'apt-get source xen-hypervisor-4.17 && cd xen-* && \
                dpkg-buildpackage -b -uc && sha256sum xen/xen.gz'

Compare with the hash:

sha256sum /boot/xen-*

Expected output:

Match

Tonight’s executable test bash Copy

apt-cache policy xen-hypervisor-4.17-amd64 dpkg-sig –verify /var/lib/dpkg/info/xen-hypervisor-4.17-amd64.list

sha256sum /boot/xen-4.17-amd64.gz Publish the hash; add a foot-note: “Full reproducible build pending – see GitHub issue #3.” This keeps the claim falsifiable without equipment you do not own.