RAUC v0.2 Released

Enrico Jörns | | RAUC
Download

Download v0.2 release of RAUC

We proudly just sent out a new release of the RAUC update framework.

With 171 individual changes since v0.1.1 we have put much effort in enhancing both the usability and the stability of RAUC while adding a set of useful features making RAUC applicable for even more use cases.

Scroll through the following list to get an overview of the most significant changes for this release:

  • For those who use RAUC from the command line, the tool now provides an output of the installation progress as well as improved error reporting to ease quickly finding configuration or runtime issues.

  • RAUC now supports splitting up the installation and the actual activation of an update. This can be quite useful for scenarios where you first want to roll out updates to all devices in the field and then enable it for all devices together at a defined point in time.

    Therefor both the system configuration option activate-installed as well as new D-Bus method mark along with the new rauc status mark-active sub command were introduced.

    The changes not only allow to handle delayed activation but also enable you to use the RAUC bootloader abstraction to modify the target to boot, e.g. for testing.

  • When dealing with certificates, you might have asked yourself often in the past if you signed your update correctly, if the verification works as expected, etc.

    Now, the RAUC commandline tool provides features and options to ease dealing with certificate debugging:

    • A newly introduced --keyring argument allows you to directly define the keyring to use for verification without the need to have a system.conf file. This is especially useful for inspecting bundles on your build host.

    • The output of rauc info now dumps the trust chain (with subject, issuer, and calculated SPKI (SubjectPublicKeyInfo) hash) successfully verify the inspected bundle.

      If passing the newly introduced --dump-cert argument, you will also get the full signer cert of the bundle printed.

  • But, debug printout is not the only improvement targeting certificate support:

    When scrolling through the help text of the RAUC tool, you may encounter a fully new command rauc resign. We finally added (after we've already mentioned it in the documentation) support for resigning bundles. This can be quite useful when changing a bundle (after having tested it successfully) from development/testing state to production state without actually having to touch its well-proven content anymore.

    RAUC resign allows you to verify the bundle on your build host, remove the signature and add a new one created from a different key.

  • Last but not least, a significant effort we've put in enhancing the documentation, as you could already read in this blog post.

For an extended list of all changes (especially the bugfixes) contained in the v0.2 release, see the CHANGES file.

For the next release we already have a bunch of new features planned or already prepared, including a central comprehensive status file for storing slot checksum and metadata, support for placing and honoring intermediate certificates in bundles, streaming support based on casync and much more.


Further Readings

rauc-hawkbit-updater v1.0 Released

Back in 2018, rauc-hawkbit-updater was started by Prevas A/S as a C/GLib port of our rauc-hawkbit Python prototype (also called RAUC hawkBit Client) that was mainly developed for showcases and to serve as a demonstration and evaluation platform for others.


Showcase: Fail-Safe (OTA) Field Updating

Enrico Jörns | | didyouknow, rauc

Being able to robustly and securely update embedded systems and IoT devices in the field is a key requirement of every product today. The update framework RAUC is the basis for a modern and future-proof solution. In this showcase we present the basic principles of a fail-safe update system and how Pengutronix can support you with implement this for your platform.


RAUC v1.5 Released

Jan Lübbe, Enrico Jörns | | RAUC

This release fixes a vulnerability in RAUC that can be exploited under certain circumstances to achieve a local privilege escalation. It provides both a mitigation for the vulnerability when using the existing bundle format as well as a new bundle format that uses dm-verity to continuously authenticate the update data while it is installed.