#5680 HIGH Update.: G1G1 laptops are shipping with "security" enabled

Zarro Boogs per Child bugtracker at laptop.org
Mon Feb 4 20:06:56 EST 2008


#5680: G1G1 laptops are shipping with "security" enabled
-----------------------+----------------------------------------------------
  Reporter:  gnu       |       Owner:  jg                      
      Type:  defect    |      Status:  new                     
  Priority:  high      |   Milestone:  Update.1                
 Component:  security  |     Version:                          
Resolution:            |    Keywords:  firmware, security, G1G1
  Verified:  0         |    Blocking:                          
 Blockedby:            |  
-----------------------+----------------------------------------------------

Comment(by gnu):

 Replying to [comment:10 cscott]:
 > I don't know anything about whatever certificate bugs jg is complaining
 about in his item 1.

 The problem is that our https: site is signed only by our own cert, which
 nobody else's browsers
 (nor their wget) know the public key for.  We should consider also signing
 the site with a cert that has widespread acceptance.

 > jg's item 2 is presently infeasible, for a number of reasons.   A better
 solution is to use 'disable-security' if that is what you want to do,
 which is what gnu recommends in his reply.  Even better: keep using olpc-
 update, which has no problem preserving the key.

 When OFW first sees a valid developer key, it could copy it into the
 manufacturing area as a new tag (dk).  This would provide more permanent
 stability for the key, independent of changes to the NAND filesystem.  It
 already does something similar if it finds a signed firmware file in the
 NAND.

 Unfortunately, the support crew often encounters XO users whose symptoms
 indicate that the NAND filesystem seems to be fried for one reason or
 another.  The recommended advice (unless there's significant saved data
 that the user wants to keep) is to reflash from scratch using the
 "Activated Update" or "four-game-key" procedure.  This may be an infant
 mortality problem; it's too early to tell how often such a reflash will be
 the easiest recommended way to get your laptop back in the future.  But
 OLPC expects to be shipping millions of infant XO's every year.  We
 appreciate your olpc-update tool, Scott, but it's not the right hammer for
 every job.

 > No idea what jg means by item 3; we already protect against access to
 SPI flash access even with a dev key, which is what causes the reboot
 cycle gnu complains about.

 JG fried a motherboard on a white box PC by reflashing once, and has a
 visceral memory of that experience.  I had suggested an improvement to our
 SPI index gating strategy that would prevent host accesses via indexed-IO
 after Linux boots, even in WW-tagged machines.  This would restrict tag
 and firmware changes to ONLY ever be done from Forth.  However, Richard
 Smith might object to that; he has battery diagnosis and repair scripts
 that might suffer.  Also, this might mess up the process flow in
 manufacturing, if they have Linux code that's writing tags.  At any rate,
 it's a subject for a separate TRAC ticket.

-- 
Ticket URL: <http://dev.laptop.org/ticket/5680#comment:13>
One Laptop Per Child <http://dev.laptop.org>
OLPC bug tracking system



More information about the Bugs mailing list