Policy key validation fails with fetched policy after the cache file is lost |
|
Issue descriptionWhat steps will reproduce the problem? (1) Sign in under a managed user on Chrome OS. (2) Clobber the user policy cache file (e.g. delete it). Note: the file with the cached *key* should be kept. (3) Try to sign into the user via the online sign-in flow. What is the expected result? The new policy is fetched and applied, the user session starts. What happens instead? The user session doesn't start (the device returns to the login screen after a couple of seconds on black screen). Two key messages in the logs: [ERROR:cloud_policy_validator.cc(342)] New public key rotation signature verification failed [ERROR:user_cloud_policy_manager_chromeos.cc(550)] Policy fetch failed for the user. Aborting profile initialization
,
Apr 9 2018
Yes, if we've lost the policy, we probably should also ignore the cached key (allow any new key to be provisioned). In a world where signing keys are *themselves* signed by DMServer, there's not really any way to inject a bad signing key any more so not interested in validating vs the old key if policy is gone. |
|
►
Sign in to add a comment |
|
Comment 1 by emaxx@chromium.org
, Apr 9 2018