<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX ProcessorsのトピックHigh Availability Boot processes and only using code-signing certificates</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960874#M143372</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;(I asked the same question on the security&amp;nbsp;stack exchange website.&amp;nbsp; I'm doing what is largely and cut and paste here with a few more things)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;High Availability Boot (HAB) is a technique described&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN4581.pdf" rel="nofollow noreferrer" style="color: rgba(61, 133, 176, 0.8); border: 0px; font-weight: inherit; text-decoration: underline;"&gt;here&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in an NxP application note.&amp;nbsp;The procedure burns Super Root Key (SRK) fuses using a software tool called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;srktool&lt;/STRONG&gt;&lt;/SPAN&gt;. In it's proper use, I would use an SSL certificate with the OID set for code-signing. This would have an oid of 1.3.6.1.5.5.7.3.3.&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;However, there doesn't appear to be anything that stops me from using a certificate that is created for other purposes, e.g. for client authentication with the OID of 1.3.6.1.5.5.7.3.2.&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;The problem is that if I have two certificates from the same CA:&lt;/P&gt;&lt;OL style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em 30px;"&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0px 0px 0.5em;"&gt;Code-signing certificate&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit;"&gt;Client certificate&lt;/LI&gt;&lt;/OL&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;I could sign the image with the code-signing certificate. If I could update the public key on the target device, then it would be possible to sign it with the client certificate and it would be accepted as valid.&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;The only option is use different CAs for both code-signing and client certs. I'm wondering if there's some way to check the OIDs?&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;From this&amp;nbsp;&lt;A href="https://blog.quarkslab.com/vulnerabilities-in-high-assurance-boot-of-nxp-imx-microprocessors.html"&gt;blog post&lt;/A&gt;&amp;nbsp;it suggests that entire certificate is parsed.&amp;nbsp; Can I enforce the KeyUsage check in the INSTALL_KEY CSF Command?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Wed, 23 Oct 2019 23:58:23 GMT</pubDate>
    <dc:creator>simonboland</dc:creator>
    <dc:date>2019-10-23T23:58:23Z</dc:date>
    <item>
      <title>High Availability Boot processes and only using code-signing certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960874#M143372</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;(I asked the same question on the security&amp;nbsp;stack exchange website.&amp;nbsp; I'm doing what is largely and cut and paste here with a few more things)&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;High Availability Boot (HAB) is a technique described&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN4581.pdf" rel="nofollow noreferrer" style="color: rgba(61, 133, 176, 0.8); border: 0px; font-weight: inherit; text-decoration: underline;"&gt;here&lt;/A&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;in an NxP application note.&amp;nbsp;The procedure burns Super Root Key (SRK) fuses using a software tool called&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;SPAN style="border: 0px; font-weight: bold;"&gt;&lt;STRONG&gt;srktool&lt;/STRONG&gt;&lt;/SPAN&gt;. In it's proper use, I would use an SSL certificate with the OID set for code-signing. This would have an oid of 1.3.6.1.5.5.7.3.3.&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;However, there doesn't appear to be anything that stops me from using a certificate that is created for other purposes, e.g. for client authentication with the OID of 1.3.6.1.5.5.7.3.2.&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;The problem is that if I have two certificates from the same CA:&lt;/P&gt;&lt;OL style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em 30px;"&gt;&lt;LI style="border: 0px; font-weight: inherit; margin: 0px 0px 0.5em;"&gt;Code-signing certificate&lt;/LI&gt;&lt;LI style="border: 0px; font-weight: inherit;"&gt;Client certificate&lt;/LI&gt;&lt;/OL&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;I could sign the image with the code-signing certificate. If I could update the public key on the target device, then it would be possible to sign it with the client certificate and it would be accepted as valid.&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;The only option is use different CAs for both code-signing and client certs. I'm wondering if there's some way to check the OIDs?&lt;/P&gt;&lt;P style="color: #242729; background-color: #ffffff; border: 0px; margin: 0px 0px 1em;"&gt;From this&amp;nbsp;&lt;A href="https://blog.quarkslab.com/vulnerabilities-in-high-assurance-boot-of-nxp-imx-microprocessors.html"&gt;blog post&lt;/A&gt;&amp;nbsp;it suggests that entire certificate is parsed.&amp;nbsp; Can I enforce the KeyUsage check in the INSTALL_KEY CSF Command?&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 23 Oct 2019 23:58:23 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960874#M143372</guid>
      <dc:creator>simonboland</dc:creator>
      <dc:date>2019-10-23T23:58:23Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability Boot processes and only using code-signing certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960875#M143373</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Hello,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp; Customers can use CST sources, provided with the recent CST 3.2.0,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;in order to clarify CST using details.&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;A class="link-titled" href="https://www.nxp.com/webapp/Download?colCode=IMX_CST3.2.0_TOOL&amp;amp;location=null" title="https://www.nxp.com/webapp/Download?colCode=IMX_CST3.2.0_TOOL&amp;amp;location=null"&gt;https://www.nxp.com/webapp/Download?colCode=IMX_CST3.2.0_TOOL&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Have a great day,&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Yuri&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;-------------------------------------------------------------------------------&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Note:&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;- If this post answers your question, please click the "Mark Correct" button. Thank you!&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;- We are following threads for 7 weeks after the last post, later replies are ignored&lt;/SPAN&gt;&lt;/P&gt;&lt;P class=""&gt;&lt;SPAN class=""&gt;Please open a new thread and refer to the closed one, if you have a related question at a later point in time.&lt;/SPAN&gt;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2019 06:06:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960875#M143373</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2019-10-28T06:06:02Z</dc:date>
    </item>
    <item>
      <title>Re: High Availability Boot processes and only using code-signing certificates</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960876#M143374</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Yuri,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Does it mean that I can modify the CST tool to customise it to support a check of the OIDs?&amp;nbsp;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I was looking at this but wasn't sure where to make the necessary change.&amp;nbsp; If you can point me to the specific area or give me more details that would be great.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards,&lt;/P&gt;&lt;P&gt;Simon&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Mon, 28 Oct 2019 06:33:15 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/High-Availability-Boot-processes-and-only-using-code-signing/m-p/960876#M143374</guid>
      <dc:creator>simonboland</dc:creator>
      <dc:date>2019-10-28T06:33:15Z</dc:date>
    </item>
  </channel>
</rss>

