Owner and partner RPMs
Owner RPMs are RPMs created by Cisco customers, or by other third parties. Cisco’s customer (also known as the Owner) is responsible for the content and GPG-based signing of these RPMs as needed.
Partner RPMs are RPMs created by Cisco partners. These are supplied by Cisco and are signed with Cisco-managed security keys.
The owner and partner RPMs are installed as docker container images that run on the router.
The following steps provide the high level overview of the end-to-end signed owner RPM secure onboarding:
-
Owner signed RPM (docker image) in GISO or standalone needs owner's GPG keys to validate the RPM packages.
-
Owner's GPG keys are onboarded through secure workflow using key packages (explained in later sections).
-
Validation of the said key packages needs owner's public keys installed on the device.
-
Owner's public keys are onboarded on to the device using the ownership certificate (OC) or ownership voucher (OV) workflow as part of device ownership.
-
The chain of trust resides with Cisco through Ownership Vouchers.
-
The owner and partner RPMs are managed as docker container images using Cisco App Manager that are then run on the router. For more information, see the Application Hosting Configuration Guide.
|
Feature Name |
Release Information |
Feature Description |
|---|---|---|
|
Signature verification for owner RPMs using owner public keys |
Release 26.1.1 |
This feature ensures integrity of owner RPMs and validates the authenticity of these RPMs by enabling the router to securely verify the owner RPM signatures using owner public keys onboarded on to the router. With this feature, you can now control whether or not to enable signature verification for owner RPMs based on defined security postures. When the signature verification for owner RPMs is enabled, all owner RPMs must be verified prior to IOS XR package installation. This feature introduces these changes: CLI:
|
|
Install Owner and Partner RPMs Using IOS XR Install Infrastructure |
Release 24.2.11 |
You can now use the existing IOS XR install infrastructure to install your proprietary Owner and Partner RPMs. This enhancement streamlines the process of integrating third-party software seamlessly into the IOS XR environment, including bundling the owner and partner RPMs into a GISO. In previous releases, you could only install Owner and Partner applications using the Application Manager interface. This feature introduces the keyword skip-implicit-owner-packages-checks in the following install commands:
|
Signature verification for owner RPMs
Starting from Cisco IOS XR Release 26.1.1, you can choose whether to enable signature verification for owner RPMs or not. When the signature verification for owner RPMs is enabled, all owner RPMs must be signed with GPG keys and the signatures are always verified. Owner RPM signatures are verified using owner public keys onboarded on to the router. Signature verification validates the authenticity and integrity of the RPMs, ensuring that they are correct and unmodified.
You can control whether or not owner RPM signatures are verified, by setting the security posture to Low, Medium, or High.
The supported security postures are:
-
High: Owner RPMs must always be signed. The owner RPMs are installed only after the signatures are verified.
-
Medium: Owner RPM signatures are not verified, but owner RPMs must be installed explicitly.
In an explicit installation, owner RPMs can either be named (install package add owner-foo) or the skip-implicit-owner-packages-checks option be added (install package add <iso> skip-implicit-owner-packages-checks) .
This is the default security posture.
-
Low: Owner RPMs signatures are not verified.
You can request the router to change from one security posture to another security posture. For more information, see Security posture transitions .
From Cisco IOS XR Release 26.1.1, a new command, show install rpmdb keys, has been introduced and a new keyword keys, has been added to the show install active and show install committed commands.
Limitations and Guidelines
General Limitations and Guidelines
-
Owner and partner RPMs can be installed only on route processors, and not on the line cards.
-
Owner and partner RPMs are managed by App Manager, which is responsible for running the docker containers and handling notifications from Install.
-
Owner and partner RPMs must install files only to the designated filesystem locations. These locations are
/opt/owner/and/opt/partner/respectively. -
When installing Owner and partner RPMs, the maximum size of a GISO that can be used for bootstrap or when using the install replace command is 4GB.
-
If you are upgrading from an IOS XR release that does not support installing the Owner or Partner RPMs (for example, upgrading from IOS XR Release 24.1.1 to IOS XR Release 24.2.11), owner and partner RPMs will not be installed automatically during the upgrade process. See the Two-Step Upgrade Process for Installing Owner or Partner RPMs section for more information.
Limitations and Guidelines for Owner RPMs
-
Names of all Owner RPMs must begin with the string “owner-”.
-
Owner RPMs can either be unsigned or signed with a non-Cisco key. Owner RPM signatures can either be verified or not verified during the installation of these RPMs.
-
Owner RPMs must not include any RPM scriptlets, including pre-install and post-install scripts.
-
You must request the installation of an Owner RPMs either by listing them explicitly or by including an additional parameter skip-implicit-owner-packages-checks in the install commands.
-
During the network boot process using PXE or when booting from a USB drive, Owner RPMs are not automatically installed. This limitation arises because in these scenarios, there is no mechanism for the owner (Cisco customer) to convey consent for the installation of Owner RPMs. That is, there is no way for the owner to provide the skip-implicit-owner-packages-checks parameter.
If you want to include Owner RPMs after booting from an ISO via PXE or USB, execute the install replace command with the ISO that contains the desired Owner RPM packages. This action incorporates the Owner RPM packages into your installation without affecting any other aspects of the system.
-
To onboard owner RPMs on a new RP, the router either requires a separate OV in the tar file or a separate MASA service to create an ownership voucher (OV), which can added to the router using XR interfaces.
Limitations and Guidelines for Partner RPMs
-
All Partner RPMs must be signed with a Cisco key; otherwise, they are treated as owner RPMs.
-
Names of all Partner RPMs must begin with the string “partner-”.
Security posture transitions
A security posture transition is the process of changing a system’s operational security mode for a feature from one predefined level to another. Security posture transitions ensure integrity and protection of the system throughout the change.
The router blocks the change from a Low or Medium security posture to a High security posture, if there are any unverifiable packages.
Security posture transitions are performed using ownership vouchers (OVs). For more informtion, see Security profiles for Cisco IOS XR software.
Installing owner and partner RPMs
This process provides the workflow to install the owner and partner RPMs.
Summary
Owner RPMs created by Cisco customers or by other third parties, and partner RPMs created by Cisco partners are installed as docker container images that run on the router.
Workflow
These are the stages of the owner and partner RPMs installation:
-
Create an RPM containing the application (in the form of a docker container image), according to the requirements for owner
and partner RPMs.
You can also include the RPMs in the GISO using the appropriate Cisco tools.
Note
Starting from Cisco IOS XR 26.1.1, prior to installing owner RPMs, owner RPMs must be signed and the owner RPM signatures must be verified if the security posture is set to High.
-
Install the RPMs using the XR Install infrastructure, that is, by using any of the install commands, similar to installing IOS XR RPMs.

Note
When installing an owner RPM and when the security posture is set to Medium, you must do one of the following:
-
Option 1: Specify the name of the owner RPM explicitly.
install package add owner-foo -
Option 2: Specify the skip-implicit-owner-packages-checks option.
install replace [iso] skip-implicit-owner-packages-checks
-
Option 1: Specify the name of the owner RPM explicitly.
- Activate the RPMs (or let the system do this automatically if requested in the install operation).
- Commit the transaction (or let the system do this automatically).
Install unsigned owner RPMs
This task helps you to install unsigned owner RPMs using different command options.
Procedure
|
Use one of the following options to install owner and partner RPMs:
|
The owner RPMs are installed successfully.
In addition to the commands used in this section, the install infrastructure also supports the following install operations to install owner RPMs – install package remove, install package deactivate, and install source .
For information about using the XR application manager to control the life cycle of installed owner or partner RPMs, see the Customize Docker Run Options Using Application Manager section in the Application Hosting Configuration Guide for Cisco 8000 Series Routers.
Install signed owner RPMs with or without signature verification
Before you begin
-
The signing keys must be installed. For more information, see Install key packages on the router. The owner keys or signing keys can also be included in a GISO.
-
Security posture is set to High, Medium, or Low.
This task provides the steps to install signed owner RPMs with or without verifying their signatures.
Procedure
|
Step 1 |
Create owner RPMs as per the owner RPM requirements. |
|
Step 2 |
Create a GPG key or owner key anchored to the ownership certificate (OC) and install the owner keys on the router. |
|
Step 3 |
Sign the owner RPMs with the GPG keys created in the previous step and install these keys on the router using the key package. For installing key packages on the router, see Install key packages on the router. |
|
Step 4 |
Install the owner RPMs using one of the installation commands used in Install unsigned owner RPMs. The router installs the signed owner RPMs based on the security postures:
|
Install signed owner RPMs using GISO
This task helps you to install signed owner RPMs using GISO.
Procedure
|
Step 1 |
Create a key package with GPG keys used to sign the owner RPM and sign it with a key anchored in the OC. For more information about key packages, OC, and OV, see Provision Third-party Key Packages and Device Ownership chapters in the System Security Configuration Guide |
||
|
Step 2 |
Create an owner RPM and sign it with the GPG key obtained using the key package. |
||
|
Step 3 |
Include both the owner RPM and the signed key package in a GISO. |
||
|
Step 4 |
Execute the install replace command to install the GISO image. Example:
|
||
|
Step 5 |
Starting from Cisco IOS XR Release 26.1.1, the router verifies the signature on the key package. On successful verification, the router temporarily installs the GPG keys on the router. |
||
|
Step 6 |
Starting from Cisco IOS XR Release 26.1.1, if the security posture is High, the router installs the RPMs from the GISO and verifies the signature for owner RPMs using the key installed earlier. |
||
|
Step 7 |
Activate the installed software. |
||
|
Step 8 |
Commit the changes.
|
The signed key packages and owner RPMs are installed and verified successfully. The router updates the file system with the new software.
For information about using the XR application manager to control the life cycle of installed owner or partner RPMs, see the Customize Docker Run Options Using Application Manager section in the Application Hosting Configuration Guide for Cisco 8000 Series Routers.
Install signed owner RPMs using USB or iPXE boot
This task helps you to install owner RPMs using USB or iPXE boot.
Procedure
|
Step 1 |
Create a key package with GPG keys used to sign the owner RPM and sign it with a key anchored in the OC. For more information about key packages, OC, and OV, see Provision Third-party Key Packages and Device Ownership chapters in the System Security Configuration Guide. |
|
Step 2 |
Create an owner RPM and sign it with the GPG key obtained using the key package. |
|
Step 3 |
Include the partner RPM, owner RPM, and the signed key package in a GISO. |
|
Step 4 |
Boot the router using USB or iPXE. |
|
Step 5 |
Starting from Cisco IOS XR Release 26.1.1, the bootstrap software from GISO verifies the signature on the key package. On successful verification, the bootstrap software temporarily installs the GPG keys on the router. |
|
Step 6 |
Starting from Cisco IOS XR Release 26.1.1, if the security posture is High, the bootstrap software from GISO installs the RPMs from GISO and verifies the signature for owner RPMs using the key installed earlier. |
|
Step 7 |
The router reloads and boots from the disk. |
The signed key packages and owner RPMs are installed and verified successfully. The router updates the file system with the new software.
For information about using the XR application manager to control the life cycle of installed owner or partner RPMs, see the Customize Docker Run Options Using Application Manager section in the Application Hosting Configuration Guide for Cisco 8000 Series Routers.
Two-step upgrade process for installing owner or partner RPMs
If you are upgrading from an IOS XR release that does not support installing the owner or partner RPMs (any release prior to IOS XR Release 24.2.11), these RPMs will not be installed automatically during the upgrade process.
This is because the installation process governed by the previous releases does not have the functionality to handle the new RPMs.
To install Owner or partner RPMs, you must perform the upgrade in two distinct steps:
-
Upgrade from the previous release to IOS XR Release 24.2.11 without the owner or partner RPMs.
-
Perform an additional upgrade using the same newer version, that is, IOS XR Release 24.2.11 to IOS XR Release 24.2.11. This time explicitly by including the owner or partner RPMs.
These upgrade steps can be accomplished using the same ISO that contains the new version (for example, IOS XR Release 24.2.11) and the additional Owner or Partner RPMs. This two-step process ensures that the new features are properly implemented and that the Owner or Partner RPMs are correctly installed on your system.
Starting from Cisco IOS XR Release 26.1.1, the initial upgrade is done without owner RPMs, partner RPMs, and their respective keys. In the subsequent upgrade to Cisco IOS XR Release 26.1.1 includes the signed owner RPMs, signed partner RPMs, and their respective keys. After the initial upgrade, the security posture defaults to Medium so that the unsigned owner RPMs are installed upon request. However, during the second upgrade where if the security posture is set to High, the router installs and verifies the owner RPMs implicitly. If the security posture is set to Low during the second upgrade, the router installs unsigned owner RPMs implicitly.
Feedback