Skip to content

How to trust the verification anchor #3

@oherrala

Description

@oherrala

Comment by @arikauppi in commit a38050d

Image is verified but how to trust the verification anchor (root of trust)?
In embedded world, some kind of root of trust (public key, public key hash etc) is stored in HW. eFUSEs or other OTP (one-time programmable memory) is typically used. However if root of trust is "burned" to HW, then key revocation and renewal become issues.
This then leads to trusted execution environment + trusted applications which could aid in storing the root of trust in a secure way. (TCG / trusted computing group, http://www.trustedcomputinggroup.org/, OP-TEE, https://wiki.linaro.org/WorkingGroups/Security/OP-TEE etc)

Also, it is not typically enough to verify the image during boot but in some applications also run-time integrity needs to be ensured. This then opens totally different can of worms.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions