<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>i.MX Processors中的主题 Re: Secure Boot</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1284981#M174779</link>
    <description>&lt;P&gt;Hi Alvaro&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;one can look at AN12812&amp;nbsp; &lt;A id="relatedDocsClick_19" href="https://www.nxp.com/webapp/Download?colCode=AN12812" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Using Code-Signing Tool with Hardware Security Module&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;</description>
    <pubDate>Tue, 01 Jun 2021 00:50:53 GMT</pubDate>
    <dc:creator>igorpadykov</dc:creator>
    <dc:date>2021-06-01T00:50:53Z</dc:date>
    <item>
      <title>Secure Boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1282358#M174543</link>
      <description>&lt;P&gt;Hi everyone,&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We are trying to implement a Secure boot on the NXP iMX8MP using a TPM ( SLB 9670VQ2.0).&lt;/P&gt;&lt;P&gt;I know that iMX8MP allows a secure boot using its HAB hw modules and also have explored that option but apart from that, we want to be able to verify a kernel before loading it.&amp;nbsp;&lt;/P&gt;&lt;P&gt;So, currently I've got an u-boot with TPM commands enabled, these are the commands it offers:&amp;nbsp;&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;STARTUP&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;SELF TEST&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;CLEAR&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;PCR EXTEND&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;PCR READ&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;GET CAPABILITY&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;DICTIONARY ATTACK LOCK RESET&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;DICTIONARY ATTACK CHANGE PARAMETERS&lt;/FONT&gt;&lt;/LI&gt;&lt;LI&gt;&lt;FONT face="arial black,avant garde" color="#000000"&gt;HIERARCHY CHANGE AUTH&lt;/FONT&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;H3&gt;&lt;FONT face="arial,helvetica,sans-serif" size="4" color="#000000"&gt;As far as I understand, to verify the kernel I need to decrypt a hash of the kernel that was previously encrypted with a private key.&amp;nbsp;&lt;/FONT&gt;&lt;/H3&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="4" color="#000000"&gt;When using a TPM I know how to create keys and use them to sign the kernel from linux.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="4" color="#000000"&gt;But, as long as the keys cannot leave the TPM I'm wondering how could the uboot verify the signed kernel. The first option that comes to my mind is that u-boot should ask the TPM to decrypt the hash of the kernel with its internal private key but from uboot and I don't have any commands to do that.&amp;nbsp;&lt;BR /&gt;The second option would be to ask the TPM for the private key, and this can't be done as the security of the TPM ( and the whole system ) would be compromised.&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="4" color="#000000"&gt;How can this step ( kernel verification ) of the secure boot be done? maybe by means of a measured boot ( PCRs)?&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif" size="4" color="#000000"&gt;Thanks in advance, any idea will be much appreciated&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 26 May 2021 07:48:06 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1282358#M174543</guid>
      <dc:creator>AlfTeleco</dc:creator>
      <dc:date>2021-05-26T07:48:06Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1284981#M174779</link>
      <description>&lt;P&gt;Hi Alvaro&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;one can look at AN12812&amp;nbsp; &lt;A id="relatedDocsClick_19" href="https://www.nxp.com/webapp/Download?colCode=AN12812" target="_blank" rel="noopener"&gt;&lt;STRONG&gt;Using Code-Signing Tool with Hardware Security Module&lt;/STRONG&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;</description>
      <pubDate>Tue, 01 Jun 2021 00:50:53 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1284981#M174779</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2021-06-01T00:50:53Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1299442#M176160</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/37066"&gt;@igorpadykov&lt;/a&gt;&amp;nbsp;the CST would run on the PC, right? But we're interested in interfacing the TPM with the target hardware (i.MX processor). How that can be done?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/186417"&gt;@AlfTeleco&lt;/a&gt;&amp;nbsp;Any updates on this one?&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 06:07:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1299442#M176160</guid>
      <dc:creator>kanimozhi_t</dc:creator>
      <dc:date>2021-06-29T06:07:44Z</dc:date>
    </item>
    <item>
      <title>Re: Secure Boot</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1299481#M176163</link>
      <description>&lt;P&gt;Hi Kanimozhi&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;for such case, as it is not supported in official BSPs may be recommended to proceed with&lt;/P&gt;
&lt;P&gt;help of NXP Professional Services:&lt;BR /&gt;&lt;A href="https://contact.nxp.com/new-prof-svcs-sw-tech" target="_blank"&gt;https://contact.nxp.com/new-prof-svcs-sw-tech&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards&lt;BR /&gt;igor&lt;/P&gt;</description>
      <pubDate>Tue, 29 Jun 2021 06:55:44 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/Secure-Boot/m-p/1299481#M176163</guid>
      <dc:creator>igorpadykov</dc:creator>
      <dc:date>2021-06-29T06:55:44Z</dc:date>
    </item>
  </channel>
</rss>

