This is an old revision of the document!
- people can fully use Chromium OS without needing a Google login (fine);
- plan to give SSO experience at OpenID relying parties;
- user name will be hashd HASH(firstname.lastname@example.org). Web-based user name may contain characters that are not safe for use on the file system (nice side effect for the security).
- cgroups http://www.kernel.org/doc/Documentation/cgroups/cgroups.txt Actually Chromium runs Linux 2.6.35;
- Suspending to RAM works already quite well with dm-crypt:
- according to Google no concrete solutions against sophisticated attacks like Cold Boot Attacks on Encryption Keys http://www.chromium.org/chromium-os/chromiumos-design-docs/protecting-cached-user-data#TOC-Suspending-to-RAM, http://citp.princeton.edu/memory/
- verified boot crypto specification:
- developer builds do not use a verified boot;
- the TPM is used as secure non-volatile storage for preventing key rollback attacks (not for the encryption);
- Google plan is to use a 8192-bit RSA key with SHA-512 for the root key signatures (NIST recommends the use of RSA 2048/SHA-256 or higher as the signature algorithm for use after 12/31/2010);
- signin keys will change offently (Google plan to use 1024-bit RSA keys which provides a good speed/performance trade-off);
- Google Chromium OS applications for maximum security;
- possible to install applications from external sources (like Android)
- all HTML5-enabled web applications.
chromium-os.1291675705.txt.gz · Last modified: 2010/12/06 23:48 by cedric