-
-
Notifications
You must be signed in to change notification settings - Fork 187
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement Automatic OEM Factory Reset with diceware secrets resulting in QR code to be scanned prior of rebooting/shipping #1827
Comments
Currently, we just flash Heads and the customer should do the re-ownership steps. What we want is a situation in which Heads has already been setup by us and once booted, the end user can verify the integrity and take over the ownership including reencryption of the LUKS header, completely automatically with as less prompts as possible. We don't do that yet because setting safe credentials and communicating them manually is time-consuming. So what we need is an automated OEM factory reset with the most secure options that generates credentials automatically and combines this in only one QR code that contains all the necessary information for the end user. In our production process, we split this content so that it will be partly communicated to the customer by paper with the order, and partly by email. We already do this for the LUKS disk encryption passphrase at the moment. We see a risk that the end user would forget his actual LUKS passphrase if it isn't necessary to type this during boot. Can we mitigate this risk somehow? I'm thinking about a statement on the Important notes document that we deliver with every laptop already. We have to keep things as simple as possible, especially for the end user, but also for our production process. That doesn't mean we cannot implement a solution on the product side to deliver credentials through two channels. @tlaurion I'm looking forward to your proposal how this can work. NovaCustom will take care of the funds after approval. |
Qrcode can be used to pack all the info, as seen under Kunzisoft/KeePassDX#1443 (comment) |
That's great! How to communicate these credentials to the client without manual intervention? The customer needs to store all security components separately, which sounds like a hassle to me. I see a lot of confusion of customers who don't know what password is for what component. |
I will explain how I see how this can work. So when pressing 'o' upon OEM factory reset, the employee will be asked to:
Then, a QR code will be generated with these contents sealed in it:
So this all sealed in ONE transition password (or passphrase). When customer boots the laptop for the first time, the laptop should automatically:
And that's it, boot process is normal as it is right now after all steps above. ¹ The process should fail if the DRK is incorrect. |
|
|
|
This is to discuss requirements, turning #1521 into actionnable plan.
@wessel-novacustom @jan23 @JonathonHall-Purism (tag anyone from support teams): if you have time to draft what you would like to see as an OEM to start discussing plan and see if I can do this prior of feature freeze (most probably going to be postponed after November 20th 2024 (#1821)
Also distinguish what you understand what UX needs to be streamlined for better UX (meaning User experience, reduce their frictions)
Thanks!
The text was updated successfully, but these errors were encountered: