New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 782444 link

Starred by 1 user

Issue metadata

Status: Untriaged
Owner: ----
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: ----
Pri: 3
Type: Feature



Sign in to add a comment

implement developer-verified mode

Project Member Reported by semenzato@chromium.org, Nov 7 2017

Issue description

Using the new firmware features described in go/cros-fwmp (pron: fwump, I think) it should be possible to do this:

1. Switch to developer mode.
2. Install your own build on the internal SSD, or make it available on a USB stick.
3. Set things up so that the new build is verified at boot (and later) against the user key pair, just like the Google-signed image in verified mode.

Returning to unverified developer mode should only be possible with physical presence, by first recovering to verified mode with a Google-signed recovery image.

This would give developer mode a similar level of security as verified mode, although without the convenience (ease of update).

Per discussion with RS (in cc: list), this can be added as a script to the official image, and may require simple modifications to the recovery image.
 
Returning to unverified user mode requires either

- Recovery to verified mode using a Google-signed recovery image (FWMP should be deleted during OOBE)

*or*

- Using the user key pair along with make_dev_ssd to remove rootfs verification again.  After which, the rootfs can be modified.

Components: OS>Firmware

Sign in to add a comment