<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic PKI HABv4 CA flag set in i.MX Processors</title>
    <link>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1291980#M175495</link>
    <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;regarding HABv4 on imx8M-mini,&amp;nbsp;&lt;/P&gt;&lt;P&gt;we read on&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN4581.pdf" target="_blank"&gt;https://www.nxp.com/docs/en/application-note/AN4581.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;at paragraph "5.1.1 Generating PKI tree for fast authentication"&lt;/P&gt;&lt;P&gt;that&amp;nbsp;&lt;/P&gt;&lt;P&gt;“Unless boot time is critical, it is recommended that the SRK have the CA flag, and the CSF and IMG keys used to validate their respective data. The fast authentication feature supplies the user with a faster boot time, at the cost of a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;less robust signature&lt;/STRONG&gt;.”&lt;/P&gt;&lt;P&gt;why the signature is less robust when not using CSF and IMG keys ( when in fast authentication mode ) ?&lt;/P&gt;&lt;P&gt;could you explain this comment ? we can't find a real reason why using fast authentication mode would lead to a less robust signature , does this mean less secure for some reason or in some cases ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Mon, 14 Jun 2021 14:20:29 GMT</pubDate>
    <dc:creator>antonio_santagi</dc:creator>
    <dc:date>2021-06-14T14:20:29Z</dc:date>
    <item>
      <title>PKI HABv4 CA flag set</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1291980#M175495</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;regarding HABv4 on imx8M-mini,&amp;nbsp;&lt;/P&gt;&lt;P&gt;we read on&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.nxp.com/docs/en/application-note/AN4581.pdf" target="_blank"&gt;https://www.nxp.com/docs/en/application-note/AN4581.pdf&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;at paragraph "5.1.1 Generating PKI tree for fast authentication"&lt;/P&gt;&lt;P&gt;that&amp;nbsp;&lt;/P&gt;&lt;P&gt;“Unless boot time is critical, it is recommended that the SRK have the CA flag, and the CSF and IMG keys used to validate their respective data. The fast authentication feature supplies the user with a faster boot time, at the cost of a&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;STRONG&gt;less robust signature&lt;/STRONG&gt;.”&lt;/P&gt;&lt;P&gt;why the signature is less robust when not using CSF and IMG keys ( when in fast authentication mode ) ?&lt;/P&gt;&lt;P&gt;could you explain this comment ? we can't find a real reason why using fast authentication mode would lead to a less robust signature , does this mean less secure for some reason or in some cases ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;thank you&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 14 Jun 2021 14:20:29 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1291980#M175495</guid>
      <dc:creator>antonio_santagi</dc:creator>
      <dc:date>2021-06-14T14:20:29Z</dc:date>
    </item>
    <item>
      <title>Re: PKI HABv4 CA flag set</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1292304#M175523</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/120713"&gt;@antonio_santagi&lt;/a&gt;&lt;BR /&gt;Hello,&lt;STRONG&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;&amp;nbsp;&amp;nbsp; for standard scheme the SRK is stored by one person / organization, but&amp;nbsp; the CSF and IMG&lt;BR /&gt;keys may be used by other person / organization. Under such approach even if the CSF and IMG&lt;BR /&gt;keys are compromised - the SRK does not.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Yuri.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 05:58:02 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1292304#M175523</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2021-06-15T05:58:02Z</dc:date>
    </item>
    <item>
      <title>Re: PKI HABv4 CA flag set</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1292364#M175529</link>
      <description>&lt;P&gt;Yes, but if then you want to revoke compromised keys you need to revoke the correspondent SRK key, you can't revoke the IMG and CSF keys.&lt;/P&gt;</description>
      <pubDate>Tue, 15 Jun 2021 07:21:52 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1292364#M175529</guid>
      <dc:creator>antonio_santagi</dc:creator>
      <dc:date>2021-06-15T07:21:52Z</dc:date>
    </item>
    <item>
      <title>Re: PKI HABv4 CA flag set</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1292908#M175571</link>
      <description>&lt;P&gt;&lt;a href="https://community.nxp.com/t5/user/viewprofilepage/user-id/120713"&gt;@antonio_santagi&lt;/a&gt;&amp;nbsp;&lt;BR /&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp; It is possible to use new IMG and CSF keys instead of compromised and &lt;BR /&gt;sign image again without revoking the SRK.&lt;/P&gt;
&lt;P&gt;Regards,&lt;BR /&gt;Yuri.&lt;/P&gt;</description>
      <pubDate>Wed, 16 Jun 2021 03:28:31 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1292908#M175571</guid>
      <dc:creator>Yuri</dc:creator>
      <dc:date>2021-06-16T03:28:31Z</dc:date>
    </item>
    <item>
      <title>Re: PKI HABv4 CA flag set</title>
      <link>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1696916#M210063</link>
      <description>&lt;P&gt;&amp;gt;&amp;nbsp;&lt;SPAN&gt;It is possible to use new IMG and CSF keys instead of compromised and&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;sign image again without revoking the SRK.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;I don't understand what is the value of using new IMG and CSF keys in this case, since the old compromised IMG and CSF keys will still be able to sign valid software, as they are (both old and new IMG and CSF) generated from the same SRK.&lt;/P&gt;&lt;P&gt;And in this case - due to the fact that&amp;nbsp;only SRK hashes are burned to eFuses, while IMG and CSF fuses are not - to revoke the old compromised IMG and CSF keys, one would need to revoke the SRK, thus also revoking any new IMG and CSF keys as well.&lt;/P&gt;</description>
      <pubDate>Tue, 01 Aug 2023 18:36:21 GMT</pubDate>
      <guid>https://community.nxp.com/t5/i-MX-Processors/PKI-HABv4-CA-flag-set/m-p/1696916#M210063</guid>
      <dc:creator>leonardoveiga</dc:creator>
      <dc:date>2023-08-01T18:36:21Z</dc:date>
    </item>
  </channel>
</rss>

