Users Guide

Table Of Contents
Validate OS10 image file on demand
You can validate an OS10 image file at any time using the image verify command in EXEC mode.
OS10 verifies the signature of the image files using hash-based authentication, GNU privacy guard (Gn uPG or GPG)-based
signatures, or digital signatures (PKI-signed).
image verify image://PKGS_OS10-Enterprise-10.4.9999EX.3342stretch-installer-x86_64.bin
pki signature tftp://10.16.127.7/users/PKGS_OS10-Enterprise-10.4.9999EX.3342stretch-
installer-x86_64.bin.sha256.base64 public-key tftp://10.16.127.7/users/DellOS10.cert.pem
The image package that is verified consists of:
PKGS_OS10-Enterprise-10.4.9999EX.3342stretch-installer-x86_64.binOS10 image binary
PKGS_OS10-Enterprise-10.4.9999EX.3342stretch-installer-x86_64.bin.sha256.base64PKI signature of the OS10 image
binary
PKGS_OS10-Enterprise-10.4.9999EX.3342stretch-installer-x86_64.bin.sha256The sha256 hash of the OS10 image binary
PKGS_OS10-Enterprise-10.4.9999EX.3342stretch-installer-x86_64.bin.gpgGNU privacy guard (GnuPG or GPG) signature
of the OS10 image binary
DellOS10.cert.pemDell public key certificate
Validate the OS10 kernel, system binaries, and startup configuration file
You can validate the OS10 kernel binary image, system binary files, and startup configuration file at system startup and CLI
execution using the secure-boot verify command in EXEC mode.
OS10# secure-boot verify {kernel | file-system-integrity | startup-config}
Validate and upgrade OS10 image
You can validate and upgrade the OS10 installer image files with digital signatures using the image secure-install
command in EXEC mode.
OS10# image secure-install image-filepath {sha256 signature signature-filepath | gpg
signature signature-filepath | pki signature signature-filepath public-key key-file}
The OS10 image installer verifies the signature of the image files using hash-based authentication, GNU privacy guard (Gn uPG
or GPG)-based signatures, or digital signatures (PKI-signed). Upgraded image files are installed after they are successfully
validated.
NOTE:
When secure boot is enabled and you install an OS10 image upgrade, the image install command is disabled. Use
the image secure-install command instead. For more information, see Install OS10 upgrade.
If secure boot is not enabled, you can validate an OS10 image using PKI after you manually install the image by using the
image verify command. PKI image validation occurs only once during the installation, not during each reload. After
you manually install the image using the image install command, the image is extracted. The original binary image is
not stored in the system.
Validate OS10 image before manual installation from ONIE
When you manually install an OS10 image using ONIE, you can validate the image using hash-based authentication (sha256) or
digital certificates (PKI-signed).
The signature for the OS10 installer image is provided with the downloaded OS10 .tar file. You can extract the OS10 binary file
image from the .tar file and install it from a local server. For more information, see Download OS10 image and Installation using
ONIE.
To validate and install an image using the X.509v3 certificate and OS10 image signature, use the onie-nos-install
command during a manual installation. For more information, see Manual installation; for example:
$ onie-nos-install image_url pki signature_filepath certificate_filepath
Security
1141