Skip to main content

Flash Nexus7 like a rock star

Are you tired of typing a hostname, username, password and WiFi password every time you flash Nexus7 with Ubuntu Core images?

Do you wish to automate those boring steps?

Do you wish you could reboot into fastboot mode over ssh without reaching and fiddling with volume down and power keys?

Now you can!

$ bzr branch lp:~ubuntu-nexus7/ubuntu-nexus7/preseed

Has a nifty command called

$ ./prepare-preseed

By default it takes preseed.cfg, attempts to copy wifi.cfg or fetch current active WiFi connection settings from Network Manager's /etc/NetworkManager/system-connections/* downloads latest bootimg and twiddles it to include all of the above.

After that you can fastboot flash standard user-data image + this cusom bootimg and voila, upon fastboot reboot ubiquity will come up and will automatically answer all the questions for you and boot into desktop with wifi connected.

If you want to customize settings simply edit the sample preseed.cfg.
If you do not want to always type in sudo password to get the network password you can run:

$ ./get-network-info > wifi.cfg

After that each reflash will be a breeze and not require root password. (Note that I uploaded udev rules in fastboot a while a go to allow using fastboot as a non-privileged user, if you need to support more devices please file bugs against android-tools with the output of lsusb when your device is connected).

So what about rebooting back into fastboot mode?

Well, I recently uploaded upstart 1.6.1-1ubuntu3 into Raring that supports:

$ sudo reboot -f bootloader

That will get you back into fastboot mode.

Happy Hacking everyone!

Comments

Popular posts from this blog

How to disable TLS 1.0 and TLS 1.1 on Ubuntu

Example of website that only supports TLS v1.0, which is rejected by the client Overivew TLS v1.3 is the latest standard for secure communication over the internet. It is widely supported by desktops, servers and mobile phones. Recently Ubuntu 18.04 LTS received OpenSSL 1.1.1 update bringing the ability to potentially establish TLS v1.3 connections on the latest Ubuntu LTS release. Qualys SSL Labs Pulse report shows more than 15% adoption of TLS v1.3. It really is time to migrate from TLS v1.0 and TLS v1.1. As announced on the 15th of October 2018 Apple , Google , and Microsoft will disable TLS v1.0 and TLS v1.1 support by default and thus require TLS v1.2 to be supported by all clients and servers. Similarly, Ubuntu 20.04 LTS will also require TLS v1.2 as the minimum TLS version as well. To prepare for the move to TLS v1.2, it is a good idea to disable TLS v1.0 and TLS v1.1 on your local systems and start observing and reporting any websites, systems and applications that...

Achieving actually full disk encryption of UEFI ESP at rest with TCG OPAL, FIPS, LUKS

Achieving full disk encryption using FIPS, TCG OPAL and LUKS to encrypt UEFI ESP on bare-metal and in VMs Many security standards such as CIS and STIG require to protect information at rest. For example, NIST SP 800-53r5 SC-28 advocate to use cryptographic protection, offline storage and TPMs to enhance protection of information confidentiality and/or integrity. Traditionally to satisfy such controls on portable devices such as laptops one would utilize software based Full Disk Encryption - Mac OS X FileVault , Windows Bitlocker , Linux cryptsetup LUKS2 . In cases when FIPS cryptography is required, additional burden would be placed onto these systems to operate their kernels in FIPS mode. Trusted Computing Group  works on establishing many industry standards and specifications, which are widely adopted to improve safety and security of computing whilst keeping it easy to use. One of their most famous specifications them is TCG  TPM 2.0 (Trusted Platform Module). TPMs are now...

Ubuntu Livepatch service now supports over 60 different kernels

Linux kernel getting a livepatch whilst running a marathon. Generated with AI. Livepatch service eliminates the need for unplanned maintenance windows for high and critical severity kernel vulnerabilities by patching the Linux kernel while the system runs. Originally the service launched in 2016 with just a single kernel flavour supported. Over the years, additional kernels were added: new LTS releases, ESM kernels, Public Cloud kernels, and most recently HWE kernels too. Recently livepatch support was expanded for FIPS compliant kernels, Public cloud FIPS compliant kernels, and as well IBM Z (mainframe) kernels. Bringing the total of kernel flavours support to over 60 distinct kernel flavours supported in parallel. The table of supported kernels in the documentation lists the supported kernel flavours ABIs, the duration of individual build's support window, supported architectures, and the Ubuntu release. This work was only possible thanks to the collaboration with the Ubuntu C...