Bastian Bittorf <b...@npl.de> wrote:
    > * Michael Richardson <m...@sandelman.ca> [23.02.2017 07:57]:
    >> Yes, use an asymmetric key, and distribute the public part only.

    > thanks people, for all the input and your ideas. our approach is now
    > this: we hook into the 'usign' sourcecode and "hide" a secret there: 2
    > large random primenumbers. On the serverside, we store the product
    > (aka: solution) of these 2 numbers. This is repeated for each generated
    > image. (sorry, it breaks reproducable builds for now)

Anyone can multiply two large prime numbers to get the solution.
So I can't understand what you are doing.
You can't hide things in binaries.  That's total snake oil.

    > I'am not an expert in crypto, but as far as I understand the approach
    > is an asymetric key. I'am interested in feedback, see the patch
    > attached.

I am an expert.

I don't understand what your goals are here.
If you can explain them better, then I can help.

I thought from the subject line and explanation that it was to permit a
firmware image to be validated as being uncorrupted/tained.  One might do
this before flashing a device with it.

Now I get the impression that the idea for a user to be able to prove
which firmware image they actually used?

--
]               Never tell me the odds!                 | ipv6 mesh networks [
]   Michael Richardson, Sandelman Software Works        | network architect  [
]     m...@sandelman.ca  http://www.sandelman.ca/        |   ruby on rails    [

Attachment: signature.asc
Description: PGP signature

_______________________________________________
Lede-dev mailing list
Lede-dev@lists.infradead.org
http://lists.infradead.org/mailman/listinfo/lede-dev

Reply via email to