Hi Johann,

On 31 July 2018 at 02:22, Johann Neuhauser <jneuhau...@dh-electronics.de> wrote:
> Dear U-Boot devs,
>
> I've setup verified boot on a imx6 board and want to protect my device 
> against the "mix and match" attacks mentioned in 
> "doc/uImage.FIT/signature.txt".
> That's why I have only implemented signed configurations and no signed images 
> as in doc/uImage.FIT/signed-configs.its.
> My public key in my embedded fdt has the property required = "conf";
>
> Booting a signed config with "bootm ${loadaddr}#conf@1" and an embedded 
> public key required for configurations does work as expected and do fail to 
> boot if I modify the config, image, hash, signature and so on.
>
> If I boot any fit image(signed and unsigned) for example with "bootm 
> ${loadaddr}:kernel@1 - fdt@1" to select the subimages directly, I could boot 
> every image combination without signature verification although a signature 
> is enforced for a configuration.
>
> Is this the expected behavior?
>
> I thought if I had set the public key in in the embedded fdt as required for 
> configurations, bootm does only boot signed configurations and no subimages 
> directly...
I don't think there is any restriction on that at the moment. You are
explicitly asking to boot particular images rather than a config. So I
suppose it would be odd if U-Boot tried to enforce a config. Are you
thinking it should try to find a config that has those images in it?
But why not just specify the config to bootm?

Bear in mind also that users don't have access to the U-Boot command
line when using verified boot, so they wouldn't be able to type this
command.

Regards,
Simon
_______________________________________________
U-Boot mailing list
U-Boot@lists.denx.de
https://lists.denx.de/listinfo/u-boot

Reply via email to