OS Image Digestor/lang-es: Difference between revisions

From OLPC
Jump to navigation Jump to search
(New page: {{subst:requesttranslation}})
 
(intermediate translation)
Line 1: Line 1:
[[Image:deerislandeggs.jpg|300px|thumb|right|Cyclists visiting "egg" digesters on Deer Island]]
{{translation

| source = OS_Image_Digestor
El OS Image Digestor es una shellscript corta que se puede usar para crear [[OFW NAND FLASH Updater|OFW Placement Control Files]], que son usados por OpenFirmware durante de los procesos de reflashear el sistema. Por enviar tal archivos a la oficina de OLPC principal, es posible para despligues hacer imagenes del SO customizadas que pueden estar usadas en el [[Secure reflash|processo de reflashear seguro]] sin requerir que OLPC se tiene que manejar las imagenes de sistemas directamente. Este elimina un punto de latencia crítica en el desarollo de imagenes customizadas que se pueden usar en el proceso de reflashear seguro.
| lang = es

| status = {{translation/wanted/{{SUBPAGENAME}}}}
== OLPC OS Image Digestor ==
}}

* mantenador: Erik Garrison <erik@laptop.org>
* repositorio: [http://dev.laptop.org/git/users/erik/image-digestor]

git clone git://dev.laptop.org/users/erik/image-digestor


=== Objectivo ===

Simplificar el proceso de producir una imagen de SO usable en el proceso de reflashear con seguridad. Dar un metodo de compartir solamente los datos de una imagen de SO que son importantes en el proceso de firmar una imagen para uso en el proceso de reflashear seguro, para que ...


=== Summary ===

[[Secure reflash]] is the process of copying a system image onto a laptop with the
OLPC security system enabled. The scripts in this repository can be used to
create [[OpenFirmware]] (OFW) update scripts from images which are destined for use
during the secure reflash of OLPC XO laptops. These scripts are signed using
OLPC infrastructure to produce a file (fs.zip) which must be included alongside
any OS image during the secure reflash process.


=== Usage ===

Given an [[OS_images|OS image file]] which contains a jffs2
filesystem:

$ ./image-digestor.sh <image_file_name>

This produces <image_file_name>.ofw_update_script. For use in secure reflash,
the resulting update script must be included as data.img in an OLPC-signed
fs.zip. At present this requires contact with OLPC's main office.

The common Linux utilities dd and sha256sum are required. These are present in
the 'coreutils' package in Fedora, Ubuntu, and Debian, so this should be no
issue on most systems.


=== Background and definitions ===

* [[OFW NAND FLASH Updater|OFW Placement Control File]]

A reflash script, the bulk of which is a list of sha256sums (digests) for each
erase block (128KiB chunk) of the image to be flashed. During the update
process OFW uses the shasums to check the validity of each block as it is
copied onto the internal memory (NAND flash) of the XO.

* [[Secure reflash|Secure update procedure]]

Secure reflash requires that the OFW update script be signed with a secure
private key. The results are stored in a file called fs.zip, which contains the
update script (data.img), a signature dependent on OLPC's private key and the
update script (data.sig), and a file indicating the build version name
(version.txt). This file is then placed alongside the image to be flashed on
USB flash media, and is read during the reflash process to validate the build.
The firmware only continues with the reflash if the signature file matches the
update script.

Note that post-boot security is independent from the secure reflash system. On a
security-enabled XO, separate checks occur at boot to verify that the kernel and
initramfs are valid. Boot will proceed provided the image which has been built
contains both the kernel and initramfs signatures (/boot/{runos.zip,runrd.zip}).

Further documentation of firmware-level security systems on the XO can be found
at [[Firmware security]].

Revision as of 21:41, 17 December 2008

Cyclists visiting "egg" digesters on Deer Island

El OS Image Digestor es una shellscript corta que se puede usar para crear OFW Placement Control Files, que son usados por OpenFirmware durante de los procesos de reflashear el sistema. Por enviar tal archivos a la oficina de OLPC principal, es posible para despligues hacer imagenes del SO customizadas que pueden estar usadas en el processo de reflashear seguro sin requerir que OLPC se tiene que manejar las imagenes de sistemas directamente. Este elimina un punto de latencia crítica en el desarollo de imagenes customizadas que se pueden usar en el proceso de reflashear seguro.

OLPC OS Image Digestor

  • mantenador: Erik Garrison <erik@laptop.org>
  • repositorio: [1]
 git clone git://dev.laptop.org/users/erik/image-digestor


Objectivo

Simplificar el proceso de producir una imagen de SO usable en el proceso de reflashear con seguridad. Dar un metodo de compartir solamente los datos de una imagen de SO que son importantes en el proceso de firmar una imagen para uso en el proceso de reflashear seguro, para que ...


Summary

Secure reflash is the process of copying a system image onto a laptop with the OLPC security system enabled. The scripts in this repository can be used to create OpenFirmware (OFW) update scripts from images which are destined for use during the secure reflash of OLPC XO laptops. These scripts are signed using OLPC infrastructure to produce a file (fs.zip) which must be included alongside any OS image during the secure reflash process.


Usage

Given an OS image file which contains a jffs2 filesystem:

 $ ./image-digestor.sh <image_file_name>

This produces <image_file_name>.ofw_update_script. For use in secure reflash, the resulting update script must be included as data.img in an OLPC-signed fs.zip. At present this requires contact with OLPC's main office.

The common Linux utilities dd and sha256sum are required. These are present in the 'coreutils' package in Fedora, Ubuntu, and Debian, so this should be no issue on most systems.


Background and definitions

A reflash script, the bulk of which is a list of sha256sums (digests) for each erase block (128KiB chunk) of the image to be flashed. During the update process OFW uses the shasums to check the validity of each block as it is copied onto the internal memory (NAND flash) of the XO.

Secure reflash requires that the OFW update script be signed with a secure private key. The results are stored in a file called fs.zip, which contains the update script (data.img), a signature dependent on OLPC's private key and the update script (data.sig), and a file indicating the build version name (version.txt). This file is then placed alongside the image to be flashed on USB flash media, and is read during the reflash process to validate the build. The firmware only continues with the reflash if the signature file matches the update script.

Note that post-boot security is independent from the secure reflash system. On a security-enabled XO, separate checks occur at boot to verify that the kernel and initramfs are valid. Boot will proceed provided the image which has been built contains both the kernel and initramfs signatures (/boot/{runos.zip,runrd.zip}).

Further documentation of firmware-level security systems on the XO can be found at Firmware security.