Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 1 | U-Boot FIT Signature Verification |
| 2 | ================================= |
| 3 | |
| 4 | Introduction |
| 5 | ------------ |
| 6 | FIT supports hashing of images so that these hashes can be checked on |
| 7 | loading. This protects against corruption of the image. However it does not |
| 8 | prevent the substitution of one image for another. |
| 9 | |
| 10 | The signature feature allows the hash to be signed with a private key such |
| 11 | that it can be verified using a public key later. Provided that the private |
| 12 | key is kept secret and the public key is stored in a non-volatile place, |
| 13 | any image can be verified in this way. |
| 14 | |
| 15 | See verified-boot.txt for more general information on verified boot. |
| 16 | |
| 17 | |
| 18 | Concepts |
| 19 | -------- |
| 20 | Some familiarity with public key cryptography is assumed in this section. |
| 21 | |
| 22 | The procedure for signing is as follows: |
| 23 | |
| 24 | - hash an image in the FIT |
| 25 | - sign the hash with a private key to produce a signature |
| 26 | - store the resulting signature in the FIT |
| 27 | |
| 28 | The procedure for verification is: |
| 29 | |
| 30 | - read the FIT |
| 31 | - obtain the public key |
| 32 | - extract the signature from the FIT |
| 33 | - hash the image from the FIT |
| 34 | - verify (with the public key) that the extracted signature matches the |
| 35 | hash |
| 36 | |
| 37 | The signing is generally performed by mkimage, as part of making a firmware |
| 38 | image for the device. The verification is normally done in U-Boot on the |
| 39 | device. |
| 40 | |
| 41 | |
| 42 | Algorithms |
| 43 | ---------- |
| 44 | In principle any suitable algorithm can be used to sign and verify a hash. |
| 45 | At present only one class of algorithms is supported: SHA1 hashing with RSA. |
| 46 | This works by hashing the image to produce a 20-byte hash. |
| 47 | |
| 48 | While it is acceptable to bring in large cryptographic libraries such as |
| 49 | openssl on the host side (e.g. mkimage), it is not desirable for U-Boot. |
| 50 | For the run-time verification side, it is important to keep code and data |
| 51 | size as small as possible. |
| 52 | |
| 53 | For this reason the RSA image verification uses pre-processed public keys |
| 54 | which can be used with a very small amount of code - just some extraction |
| 55 | of data from the FDT and exponentiation mod n. Code size impact is a little |
| 56 | under 5KB on Tegra Seaboard, for example. |
| 57 | |
| 58 | It is relatively straightforward to add new algorithms if required. If |
| 59 | another RSA variant is needed, then it can be added to the table in |
| 60 | image-sig.c. If another algorithm is needed (such as DSA) then it can be |
| 61 | placed alongside rsa.c, and its functions added to the table in image-sig.c |
| 62 | also. |
| 63 | |
| 64 | |
Andreas Dannenberg | ce53ceb | 2016-03-23 18:24:10 -0500 | [diff] [blame] | 65 | Creating an RSA key pair and certificate |
| 66 | ---------------------------------------- |
| 67 | To create a new public/private key pair, size 2048 bits: |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 68 | |
Michael van der Westhuizen | 89f4ed1 | 2014-07-02 10:17:26 +0200 | [diff] [blame] | 69 | $ openssl genpkey -algorithm RSA -out keys/dev.key \ |
| 70 | -pkeyopt rsa_keygen_bits:2048 -pkeyopt rsa_keygen_pubexp:65537 |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 71 | |
Andreas Dannenberg | ce53ceb | 2016-03-23 18:24:10 -0500 | [diff] [blame] | 72 | To create a certificate for this containing the public key: |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 73 | |
| 74 | $ openssl req -batch -new -x509 -key keys/dev.key -out keys/dev.crt |
| 75 | |
| 76 | If you like you can look at the public key also: |
| 77 | |
| 78 | $ openssl rsa -in keys/dev.key -pubout |
| 79 | |
| 80 | |
| 81 | Device Tree Bindings |
| 82 | -------------------- |
| 83 | The following properties are required in the FIT's signature node(s) to |
Masahiro Yamada | 65aff48 | 2017-08-22 15:19:20 +0900 | [diff] [blame] | 84 | allow the signer to operate. These should be added to the .its file. |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 85 | Signature nodes sit at the same level as hash nodes and are called |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 86 | signature-1, signature-2, etc. |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 87 | |
Masahiro Yamada | e63e386 | 2017-10-19 19:37:59 +0900 | [diff] [blame] | 88 | - algo: Algorithm name (e.g. "sha1,rsa2048") |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 89 | |
| 90 | - key-name-hint: Name of key to use for signing. The keys will normally be in |
| 91 | a single directory (parameter -k to mkimage). For a given key <name>, its |
| 92 | private key is stored in <name>.key and the certificate is stored in |
| 93 | <name>.crt. |
| 94 | |
| 95 | When the image is signed, the following properties are added (mandatory): |
| 96 | |
| 97 | - value: The signature data (e.g. 256 bytes for 2048-bit RSA) |
| 98 | |
| 99 | When the image is signed, the following properties are optional: |
| 100 | |
| 101 | - timestamp: Time when image was signed (standard Unix time_t format) |
| 102 | |
| 103 | - signer-name: Name of the signer (e.g. "mkimage") |
| 104 | |
| 105 | - signer-version: Version string of the signer (e.g. "2013.01") |
| 106 | |
| 107 | - comment: Additional information about the signer or image |
| 108 | |
Philippe Reynes | a89345e | 2018-11-14 13:51:02 +0100 | [diff] [blame] | 109 | - padding: The padding algorithm, it may be pkcs-1.5 or pss, |
| 110 | if no value is provided we assume pkcs-1.5 |
| 111 | |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 112 | For config bindings (see Signed Configurations below), the following |
| 113 | additional properties are optional: |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 114 | |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 115 | - sign-images: A list of images to sign, each being a property of the conf |
| 116 | node that contains then. The default is "kernel,fdt" which means that these |
| 117 | two images will be looked up in the config and signed if present. |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 118 | |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 119 | For config bindings, these properties are added by the signer: |
| 120 | |
| 121 | - hashed-nodes: A list of nodes which were hashed by the signer. Each is |
| 122 | a string - the full path to node. A typical value might be: |
| 123 | |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 124 | hashed-nodes = "/", "/configurations/conf-1", "/images/kernel", |
| 125 | "/images/kernel/hash-1", "/images/fdt-1", |
| 126 | "/images/fdt-1/hash-1"; |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 127 | |
| 128 | - hashed-strings: The start and size of the string region of the FIT that |
| 129 | was hashed |
| 130 | |
| 131 | Example: See sign-images.its for an example image tree source file and |
| 132 | sign-configs.its for config signing. |
| 133 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 134 | |
| 135 | Public Key Storage |
| 136 | ------------------ |
| 137 | In order to verify an image that has been signed with a public key we need to |
| 138 | have a trusted public key. This cannot be stored in the signed image, since |
| 139 | it would be easy to alter. For this implementation we choose to store the |
| 140 | public key in U-Boot's control FDT (using CONFIG_OF_CONTROL). |
| 141 | |
| 142 | Public keys should be stored as sub-nodes in a /signature node. Required |
| 143 | properties are: |
| 144 | |
Alexandru Gagniuc | d1b3f7d | 2021-02-19 12:45:13 -0600 | [diff] [blame] | 145 | - algo: Algorithm name (e.g. "sha1,rsa2048" or "sha256,ecdsa256") |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 146 | |
| 147 | Optional properties are: |
| 148 | |
| 149 | - key-name-hint: Name of key used for signing. This is only a hint since it |
| 150 | is possible for the name to be changed. Verification can proceed by checking |
| 151 | all available signing keys until one matches. |
| 152 | |
| 153 | - required: If present this indicates that the key must be verified for the |
| 154 | image / configuration to be considered valid. Only required keys are |
| 155 | normally verified by the FIT image booting algorithm. Valid values are |
Masahiro Yamada | 65aff48 | 2017-08-22 15:19:20 +0900 | [diff] [blame] | 156 | "image" to force verification of all images, and "conf" to force verification |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 157 | of the selected configuration (which then relies on hashes in the images to |
| 158 | verify those). |
| 159 | |
| 160 | Each signing algorithm has its own additional properties. |
| 161 | |
| 162 | For RSA the following are mandatory: |
| 163 | |
| 164 | - rsa,num-bits: Number of key bits (e.g. 2048) |
| 165 | - rsa,modulus: Modulus (N) as a big-endian multi-word integer |
Michael van der Westhuizen | 89f4ed1 | 2014-07-02 10:17:26 +0200 | [diff] [blame] | 166 | - rsa,exponent: Public exponent (E) as a 64 bit unsigned integer |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 167 | - rsa,r-squared: (2^num-bits)^2 as a big-endian multi-word integer |
| 168 | - rsa,n0-inverse: -1 / modulus[0] mod 2^32 |
| 169 | |
Alexandru Gagniuc | d1b3f7d | 2021-02-19 12:45:13 -0600 | [diff] [blame] | 170 | For ECDSA the following are mandatory: |
| 171 | - ecdsa,curve: Name of ECDSA curve (e.g. "prime256v1") |
| 172 | - ecdsa,x-point: Public key X coordinate as a big-endian multi-word integer |
| 173 | - ecdsa,y-point: Public key Y coordinate as a big-endian multi-word integer |
| 174 | |
Heinrich Schuchardt | 9cd84d2 | 2019-12-11 10:45:50 +0100 | [diff] [blame] | 175 | These parameters can be added to a binary device tree using parameter -K of the |
| 176 | mkimage command:: |
| 177 | |
| 178 | tools/mkimage -f fit.its -K control.dtb -k keys -r image.fit |
| 179 | |
| 180 | Here is an example of a generated device tree node:: |
| 181 | |
| 182 | signature { |
| 183 | key-dev { |
| 184 | required = "conf"; |
| 185 | algo = "sha256,rsa2048"; |
| 186 | rsa,r-squared = <0xb76d1acf 0xa1763ca5 0xeb2f126 |
| 187 | 0x742edc80 0xd3f42177 0x9741d9d9 |
| 188 | 0x35bb476e 0xff41c718 0xd3801430 |
| 189 | 0xf22537cb 0xa7e79960 0xae32a043 |
| 190 | 0x7da1427a 0x341d6492 0x3c2762f5 |
| 191 | 0xaac04726 0x5b262d96 0xf984e86d |
| 192 | 0xb99443c7 0x17080c33 0x940f6892 |
| 193 | 0xd57a95d1 0x6ea7b691 0xc5038fa8 |
| 194 | 0x6bb48a6e 0x73f1b1ea 0x37160841 |
| 195 | 0xe05715ce 0xa7c45bbd 0x690d82d5 |
| 196 | 0x99c2454c 0x6ff117b3 0xd830683b |
| 197 | 0x3f81c9cf 0x1ca38a91 0x0c3392e4 |
| 198 | 0xd817c625 0x7b8e9a24 0x175b89ea |
| 199 | 0xad79f3dc 0x4d50d7b4 0x9d4e90f8 |
| 200 | 0xad9e2939 0xc165d6a4 0x0ada7e1b |
| 201 | 0xfb1bf495 0xfc3131c2 0xb8c6e604 |
| 202 | 0xc2761124 0xf63de4a6 0x0e9565f9 |
| 203 | 0xc8e53761 0x7e7a37a5 0xe99dcdae |
| 204 | 0x9aff7e1e 0xbd44b13d 0x6b0e6aa4 |
| 205 | 0x038907e4 0x8e0d6850 0xef51bc20 |
| 206 | 0xf73c94af 0x88bea7b1 0xcbbb1b30 |
| 207 | 0xd024b7f3>; |
| 208 | rsa,modulus = <0xc0711d6cb 0x9e86db7f 0x45986dbe |
| 209 | 0x023f1e8c9 0xe1a4c4d0 0x8a0dfdc9 |
| 210 | 0x023ba0c48 0x06815f6a 0x5caa0654 |
| 211 | 0x07078c4b7 0x3d154853 0x40729023 |
| 212 | 0x0b007c8fe 0x5a3647e5 0x23b41e20 |
| 213 | 0x024720591 0x66915305 0x0e0b29b0 |
| 214 | 0x0de2ad30d 0x8589430f 0xb1590325 |
| 215 | 0x0fb9f5d5e 0x9eba752a 0xd88e6de9 |
| 216 | 0x056b3dcc6 0x9a6b8e61 0x6784f61f |
| 217 | 0x000f39c21 0x5eec6b33 0xd78e4f78 |
| 218 | 0x0921a305f 0xaa2cc27e 0x1ca917af |
| 219 | 0x06e1134f4 0xd48cac77 0x4e914d07 |
| 220 | 0x0f707aa5a 0x0d141f41 0x84677f1d |
| 221 | 0x0ad47a049 0x028aedb6 0xd5536fcf |
| 222 | 0x03fef1e4f 0x133a03d2 0xfd7a750a |
| 223 | 0x0f9159732 0xd207812e 0x6a807375 |
| 224 | 0x06434230d 0xc8e22dad 0x9f29b3d6 |
| 225 | 0x07c44ac2b 0xfa2aad88 0xe2429504 |
| 226 | 0x041febd41 0x85d0d142 0x7b194d65 |
| 227 | 0x06e5d55ea 0x41116961 0xf3181dde |
| 228 | 0x068bf5fbc 0x3dd82047 0x00ee647e |
| 229 | 0x0d7a44ab3>; |
| 230 | rsa,exponent = <0x00 0x10001>; |
| 231 | rsa,n0-inverse = <0xb3928b85>; |
| 232 | rsa,num-bits = <0x800>; |
| 233 | key-name-hint = "dev"; |
| 234 | }; |
| 235 | }; |
| 236 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 237 | |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 238 | Signed Configurations |
| 239 | --------------------- |
| 240 | While signing images is useful, it does not provide complete protection |
| 241 | against several types of attack. For example, it it possible to create a |
| 242 | FIT with the same signed images, but with the configuration changed such |
| 243 | that a different one is selected (mix and match attack). It is also possible |
| 244 | to substitute a signed image from an older FIT version into a newer FIT |
| 245 | (roll-back attack). |
| 246 | |
| 247 | As an example, consider this FIT: |
| 248 | |
| 249 | / { |
| 250 | images { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 251 | kernel-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 252 | data = <data for kernel1> |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 253 | signature-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 254 | algo = "sha1,rsa2048"; |
| 255 | value = <...kernel signature 1...> |
| 256 | }; |
| 257 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 258 | kernel-2 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 259 | data = <data for kernel2> |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 260 | signature-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 261 | algo = "sha1,rsa2048"; |
| 262 | value = <...kernel signature 2...> |
| 263 | }; |
| 264 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 265 | fdt-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 266 | data = <data for fdt1>; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 267 | signature-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 268 | algo = "sha1,rsa2048"; |
Thomas Perrot | ec80ece | 2021-07-02 11:32:37 +0200 | [diff] [blame] | 269 | value = <...fdt signature 1...> |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 270 | }; |
| 271 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 272 | fdt-2 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 273 | data = <data for fdt2>; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 274 | signature-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 275 | algo = "sha1,rsa2048"; |
Thomas Perrot | ec80ece | 2021-07-02 11:32:37 +0200 | [diff] [blame] | 276 | value = <...fdt signature 2...> |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 277 | }; |
| 278 | }; |
| 279 | }; |
| 280 | configurations { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 281 | default = "conf-1"; |
| 282 | conf-1 { |
| 283 | kernel = "kernel-1"; |
| 284 | fdt = "fdt-1"; |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 285 | }; |
Mickaël Tansorier | b3c15b0 | 2019-07-17 17:57:16 +0200 | [diff] [blame] | 286 | conf-2 { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 287 | kernel = "kernel-2"; |
| 288 | fdt = "fdt-2"; |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 289 | }; |
| 290 | }; |
| 291 | }; |
| 292 | |
| 293 | Since both kernels are signed it is easy for an attacker to add a new |
| 294 | configuration 3 with kernel 1 and fdt 2: |
| 295 | |
| 296 | configurations { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 297 | default = "conf-1"; |
| 298 | conf-1 { |
| 299 | kernel = "kernel-1"; |
| 300 | fdt = "fdt-1"; |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 301 | }; |
Mickaël Tansorier | b3c15b0 | 2019-07-17 17:57:16 +0200 | [diff] [blame] | 302 | conf-2 { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 303 | kernel = "kernel-2"; |
| 304 | fdt = "fdt-2"; |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 305 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 306 | conf-3 { |
| 307 | kernel = "kernel-1"; |
| 308 | fdt = "fdt-2"; |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 309 | }; |
| 310 | }; |
| 311 | |
| 312 | With signed images, nothing protects against this. Whether it gains an |
| 313 | advantage for the attacker is debatable, but it is not secure. |
| 314 | |
Masahiro Yamada | 65aff48 | 2017-08-22 15:19:20 +0900 | [diff] [blame] | 315 | To solve this problem, we support signed configurations. In this case it |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 316 | is the configurations that are signed, not the image. Each image has its |
| 317 | own hash, and we include the hash in the configuration signature. |
| 318 | |
| 319 | So the above example is adjusted to look like this: |
| 320 | |
| 321 | / { |
| 322 | images { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 323 | kernel-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 324 | data = <data for kernel1> |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 325 | hash-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 326 | algo = "sha1"; |
| 327 | value = <...kernel hash 1...> |
| 328 | }; |
| 329 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 330 | kernel-2 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 331 | data = <data for kernel2> |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 332 | hash-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 333 | algo = "sha1"; |
| 334 | value = <...kernel hash 2...> |
| 335 | }; |
| 336 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 337 | fdt-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 338 | data = <data for fdt1>; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 339 | hash-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 340 | algo = "sha1"; |
| 341 | value = <...fdt hash 1...> |
| 342 | }; |
| 343 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 344 | fdt-2 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 345 | data = <data for fdt2>; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 346 | hash-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 347 | algo = "sha1"; |
| 348 | value = <...fdt hash 2...> |
| 349 | }; |
| 350 | }; |
| 351 | }; |
| 352 | configurations { |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 353 | default = "conf-1"; |
| 354 | conf-1 { |
| 355 | kernel = "kernel-1"; |
| 356 | fdt = "fdt-1"; |
| 357 | signature-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 358 | algo = "sha1,rsa2048"; |
| 359 | value = <...conf 1 signature...>; |
| 360 | }; |
| 361 | }; |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 362 | conf-2 { |
| 363 | kernel = "kernel-2"; |
| 364 | fdt = "fdt-2"; |
| 365 | signature-1 { |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 366 | algo = "sha1,rsa2048"; |
| 367 | value = <...conf 1 signature...>; |
| 368 | }; |
| 369 | }; |
| 370 | }; |
| 371 | }; |
| 372 | |
| 373 | |
| 374 | You can see that we have added hashes for all images (since they are no |
| 375 | longer signed), and a signature to each configuration. In the above example, |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 376 | mkimage will sign configurations/conf-1, the kernel and fdt that are |
| 377 | pointed to by the configuration (/images/kernel-1, /images/kernel-1/hash-1, |
| 378 | /images/fdt-1, /images/fdt-1/hash-1) and the root structure of the image |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 379 | (so that it isn't possible to add or remove root nodes). The signature is |
Andre Przywara | 9fdfb1f | 2017-12-04 02:05:07 +0000 | [diff] [blame] | 380 | written into /configurations/conf-1/signature-1/value. It can easily be |
Simon Glass | 56ab8d6 | 2013-06-13 15:10:09 -0700 | [diff] [blame] | 381 | verified later even if the FIT has been signed with other keys in the |
| 382 | meantime. |
| 383 | |
| 384 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 385 | Verification |
| 386 | ------------ |
| 387 | FITs are verified when loaded. After the configuration is selected a list |
| 388 | of required images is produced. If there are 'required' public keys, then |
| 389 | each image must be verified against those keys. This means that every image |
| 390 | that might be used by the target needs to be signed with 'required' keys. |
| 391 | |
| 392 | This happens automatically as part of a bootm command when FITs are used. |
| 393 | |
Thirupathaiah Annapureddy | a49efb3 | 2020-08-16 23:01:11 -0700 | [diff] [blame] | 394 | For Signed Configurations, the default verification behavior can be changed by |
| 395 | the following optional property in /signature node in U-Boot's control FDT. |
| 396 | |
| 397 | - required-mode: Valid values are "any" to allow verified boot to succeed if |
| 398 | the selected configuration is signed by any of the 'required' keys, and "all" |
| 399 | to allow verified boot to succeed if the selected configuration is signed by |
| 400 | all of the 'required' keys. |
| 401 | |
| 402 | This property can be added to a binary device tree using fdtput as shown in |
| 403 | below examples:: |
| 404 | |
| 405 | fdtput -t s control.dtb /signature required-mode any |
| 406 | fdtput -t s control.dtb /signature required-mode all |
| 407 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 408 | |
| 409 | Enabling FIT Verification |
| 410 | ------------------------- |
| 411 | In addition to the options to enable FIT itself, the following CONFIGs must |
| 412 | be enabled: |
| 413 | |
Masahiro Yamada | 65aff48 | 2017-08-22 15:19:20 +0900 | [diff] [blame] | 414 | CONFIG_FIT_SIGNATURE - enable signing and verification in FITs |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 415 | CONFIG_RSA - enable RSA algorithm for signing |
| 416 | |
Heiko Schocher | 515eb12 | 2014-05-28 11:33:33 +0200 | [diff] [blame] | 417 | WARNING: When relying on signed FIT images with required signature check |
| 418 | the legacy image format is default disabled by not defining |
Tom Rini | c220bd9 | 2019-05-23 07:14:07 -0400 | [diff] [blame] | 419 | CONFIG_LEGACY_IMAGE_FORMAT |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 420 | |
Mickaël Tansorier | 6afbde4 | 2019-07-17 17:57:29 +0200 | [diff] [blame] | 421 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 422 | Testing |
| 423 | ------- |
Masahiro Yamada | 65aff48 | 2017-08-22 15:19:20 +0900 | [diff] [blame] | 424 | An easy way to test signing and verification is to use the test script |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 425 | provided in test/vboot/vboot_test.sh. This uses sandbox (a special version |
| 426 | of U-Boot which runs under Linux) to show the operation of a 'bootm' |
| 427 | command loading and verifying images. |
| 428 | |
| 429 | A sample run is show below: |
| 430 | |
| 431 | $ make O=sandbox sandbox_config |
| 432 | $ make O=sandbox |
| 433 | $ O=sandbox ./test/vboot/vboot_test.sh |
Mickaël Tansorier | 6afbde4 | 2019-07-17 17:57:29 +0200 | [diff] [blame] | 434 | |
| 435 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 436 | Simple Verified Boot Test |
| 437 | ========================= |
| 438 | |
| 439 | Please see doc/uImage.FIT/verified-boot.txt for more information |
| 440 | |
Heiko Schocher | edaf9b1 | 2014-03-03 12:19:26 +0100 | [diff] [blame] | 441 | /home/hs/ids/u-boot/sandbox/tools/mkimage -D -I dts -O dtb -p 2000 |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 442 | Build keys |
Heiko Schocher | edaf9b1 | 2014-03-03 12:19:26 +0100 | [diff] [blame] | 443 | do sha1 test |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 444 | Build FIT with signed images |
| 445 | Test Verified Boot Run: unsigned signatures:: OK |
| 446 | Sign images |
| 447 | Test Verified Boot Run: signed images: OK |
| 448 | Build FIT with signed configuration |
| 449 | Test Verified Boot Run: unsigned config: OK |
| 450 | Sign images |
| 451 | Test Verified Boot Run: signed config: OK |
Heiko Schocher | d7b4232 | 2014-03-03 12:19:30 +0100 | [diff] [blame] | 452 | check signed config on the host |
Simon Glass | a51991d | 2014-06-12 07:24:53 -0600 | [diff] [blame] | 453 | Signature check OK |
Heiko Schocher | d7b4232 | 2014-03-03 12:19:30 +0100 | [diff] [blame] | 454 | OK |
| 455 | Test Verified Boot Run: signed config: OK |
Heiko Schocher | edaf9b1 | 2014-03-03 12:19:26 +0100 | [diff] [blame] | 456 | Test Verified Boot Run: signed config with bad hash: OK |
| 457 | do sha256 test |
| 458 | Build FIT with signed images |
| 459 | Test Verified Boot Run: unsigned signatures:: OK |
| 460 | Sign images |
| 461 | Test Verified Boot Run: signed images: OK |
| 462 | Build FIT with signed configuration |
| 463 | Test Verified Boot Run: unsigned config: OK |
| 464 | Sign images |
| 465 | Test Verified Boot Run: signed config: OK |
Heiko Schocher | d7b4232 | 2014-03-03 12:19:30 +0100 | [diff] [blame] | 466 | check signed config on the host |
Simon Glass | a51991d | 2014-06-12 07:24:53 -0600 | [diff] [blame] | 467 | Signature check OK |
Heiko Schocher | d7b4232 | 2014-03-03 12:19:30 +0100 | [diff] [blame] | 468 | OK |
| 469 | Test Verified Boot Run: signed config: OK |
Heiko Schocher | edaf9b1 | 2014-03-03 12:19:26 +0100 | [diff] [blame] | 470 | Test Verified Boot Run: signed config with bad hash: OK |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 471 | |
| 472 | Test passed |
| 473 | |
Simon Glass | a51991d | 2014-06-12 07:24:53 -0600 | [diff] [blame] | 474 | |
Alexandru Gagniuc | 5b83104 | 2021-02-19 12:45:16 -0600 | [diff] [blame] | 475 | Software signing: keydir vs keyfile |
| 476 | ----------------------------------- |
| 477 | |
| 478 | In the simplest case, signing is done by giving mkimage the 'keyfile'. This is |
| 479 | the path to a file containing the signing key. |
| 480 | |
| 481 | The alternative is to pass the 'keydir' argument. In this case the filename of |
| 482 | the key is derived from the 'keydir' and the "key-name-hint" property in the |
| 483 | FIT. In this case the "key-name-hint" property is mandatory, and the key must |
| 484 | exist in "<keydir>/<key-name-hint>.<ext>" Here the extension "ext" is |
| 485 | specific to the signing algorithm. |
| 486 | |
| 487 | |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 488 | Hardware Signing with PKCS#11 or with HSM |
| 489 | ----------------------------------------- |
George McCollister | 23d1489 | 2017-01-06 13:14:17 -0600 | [diff] [blame] | 490 | |
| 491 | Securely managing private signing keys can challenging, especially when the |
| 492 | keys are stored on the file system of a computer that is connected to the |
| 493 | Internet. If an attacker is able to steal the key, they can sign malicious FIT |
| 494 | images which will appear genuine to your devices. |
| 495 | |
| 496 | An alternative solution is to keep your signing key securely stored on hardware |
| 497 | device like a smartcard, USB token or Hardware Security Module (HSM) and have |
| 498 | them perform the signing. PKCS#11 is standard for interfacing with these crypto |
| 499 | device. |
| 500 | |
| 501 | Requirements: |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 502 | Smartcard/USB token/HSM which can work with some openssl engine |
George McCollister | 23d1489 | 2017-01-06 13:14:17 -0600 | [diff] [blame] | 503 | openssl |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 504 | |
| 505 | For pkcs11 engine usage: |
George McCollister | 23d1489 | 2017-01-06 13:14:17 -0600 | [diff] [blame] | 506 | libp11 (provides pkcs11 engine) |
| 507 | p11-kit (recommended to simplify setup) |
| 508 | opensc (for smartcards and smartcard like USB devices) |
| 509 | gnutls (recommended for key generation, p11tool) |
| 510 | |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 511 | For generic HSMs respective openssl engine must be installed and locateable by |
| 512 | openssl. This may require setting up LD_LIBRARY_PATH if engine is not installed |
| 513 | to openssl's default search paths. |
| 514 | |
| 515 | PKCS11 engine support forms "key id" based on "keydir" and with |
Jan Luebbe | cd4eafb | 2020-05-13 12:26:24 +0200 | [diff] [blame] | 516 | "key-name-hint". "key-name-hint" is used as "object" name (if not defined in |
| 517 | keydir). "keydir" (if defined) is used to define (prefix for) which PKCS11 source |
| 518 | is being used for lookup up for the key. |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 519 | |
| 520 | PKCS11 engine key ids: |
| 521 | "pkcs11:<keydir>;object=<key-name-hint>;type=<public|private>" |
Jan Luebbe | cd4eafb | 2020-05-13 12:26:24 +0200 | [diff] [blame] | 522 | or, if keydir contains "object=" |
| 523 | "pkcs11:<keydir>;type=<public|private>" |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 524 | or |
| 525 | "pkcs11:object=<key-name-hint>;type=<public|private>", |
| 526 | |
| 527 | Generic HSM engine support forms "key id" based on "keydir" and with |
| 528 | "key-name-hint". If "keydir" is specified for mkimage it is used as a prefix in |
| 529 | "key id" and is appended with "key-name-hint". |
| 530 | |
| 531 | Generic engine key ids: |
| 532 | "<keydir><key-name-hint>" |
| 533 | or |
| 534 | "<key-name-hint>" |
| 535 | |
Marc Kleine-Budde | 88e07a7 | 2021-07-23 22:17:50 +0200 | [diff] [blame] | 536 | In order to set the pin in the HSM, an environment variable "MKIMAGE_SIGN_PIN" |
| 537 | can be specified. |
Vesa Jääskeläinen | abf8eb2 | 2019-06-16 20:53:38 +0300 | [diff] [blame] | 538 | |
| 539 | The following examples use the Nitrokey Pro using pkcs11 engine. Instructions |
| 540 | for other devices may vary. |
George McCollister | 23d1489 | 2017-01-06 13:14:17 -0600 | [diff] [blame] | 541 | |
| 542 | Notes on pkcs11 engine setup: |
| 543 | |
| 544 | Make sure p11-kit, opensc are installed and that p11-kit is setup to use opensc. |
| 545 | /usr/share/p11-kit/modules/opensc.module should be present on your system. |
| 546 | |
| 547 | |
| 548 | Generating Keys On the Nitrokey: |
| 549 | |
| 550 | $ gpg --card-edit |
| 551 | |
| 552 | Reader ...........: Nitrokey Nitrokey Pro (xxxxxxxx0000000000000000) 00 00 |
| 553 | Application ID ...: xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx |
| 554 | Version ..........: 2.1 |
| 555 | Manufacturer .....: ZeitControl |
| 556 | Serial number ....: xxxxxxxx |
| 557 | Name of cardholder: [not set] |
| 558 | Language prefs ...: de |
| 559 | Sex ..............: unspecified |
| 560 | URL of public key : [not set] |
| 561 | Login data .......: [not set] |
| 562 | Signature PIN ....: forced |
| 563 | Key attributes ...: rsa2048 rsa2048 rsa2048 |
| 564 | Max. PIN lengths .: 32 32 32 |
| 565 | PIN retry counter : 3 0 3 |
| 566 | Signature counter : 0 |
| 567 | Signature key ....: [none] |
| 568 | Encryption key....: [none] |
| 569 | Authentication key: [none] |
| 570 | General key info..: [none] |
| 571 | |
| 572 | gpg/card> generate |
| 573 | Make off-card backup of encryption key? (Y/n) n |
| 574 | |
| 575 | Please note that the factory settings of the PINs are |
| 576 | PIN = '123456' Admin PIN = '12345678' |
| 577 | You should change them using the command --change-pin |
| 578 | |
| 579 | What keysize do you want for the Signature key? (2048) 4096 |
| 580 | The card will now be re-configured to generate a key of 4096 bits |
| 581 | Note: There is no guarantee that the card supports the requested size. |
| 582 | If the key generation does not succeed, please check the |
| 583 | documentation of your card to see what sizes are allowed. |
| 584 | What keysize do you want for the Encryption key? (2048) 4096 |
| 585 | The card will now be re-configured to generate a key of 4096 bits |
| 586 | What keysize do you want for the Authentication key? (2048) 4096 |
| 587 | The card will now be re-configured to generate a key of 4096 bits |
| 588 | Please specify how long the key should be valid. |
| 589 | 0 = key does not expire |
| 590 | <n> = key expires in n days |
| 591 | <n>w = key expires in n weeks |
| 592 | <n>m = key expires in n months |
| 593 | <n>y = key expires in n years |
| 594 | Key is valid for? (0) |
| 595 | Key does not expire at all |
| 596 | Is this correct? (y/N) y |
| 597 | |
| 598 | GnuPG needs to construct a user ID to identify your key. |
| 599 | |
| 600 | Real name: John Doe |
| 601 | Email address: john.doe@email.com |
| 602 | Comment: |
| 603 | You selected this USER-ID: |
| 604 | "John Doe <john.doe@email.com>" |
| 605 | |
| 606 | Change (N)ame, (C)omment, (E)mail or (O)kay/(Q)uit? o |
| 607 | |
| 608 | |
| 609 | Using p11tool to get the token URL: |
| 610 | |
| 611 | Depending on system configuration, gpg-agent may need to be killed first. |
| 612 | |
| 613 | $ p11tool --provider /usr/lib/opensc-pkcs11.so --list-tokens |
| 614 | Token 0: |
| 615 | URL: pkcs11:model=PKCS%2315%20emulated;manufacturer=ZeitControl;serial=000xxxxxxxxx;token=OpenPGP%20card%20%28User%20PIN%20%28sig%29%29 |
| 616 | Label: OpenPGP card (User PIN (sig)) |
| 617 | Type: Hardware token |
| 618 | Manufacturer: ZeitControl |
| 619 | Model: PKCS#15 emulated |
| 620 | Serial: 000xxxxxxxxx |
| 621 | Module: (null) |
| 622 | |
| 623 | |
| 624 | Token 1: |
| 625 | URL: pkcs11:model=PKCS%2315%20emulated;manufacturer=ZeitControl;serial=000xxxxxxxxx;token=OpenPGP%20card%20%28User%20PIN%29 |
| 626 | Label: OpenPGP card (User PIN) |
| 627 | Type: Hardware token |
| 628 | Manufacturer: ZeitControl |
| 629 | Model: PKCS#15 emulated |
| 630 | Serial: 000xxxxxxxxx |
| 631 | Module: (null) |
| 632 | |
| 633 | Use the portion of the signature token URL after "pkcs11:" as the keydir argument (-k) to mkimage below. |
| 634 | |
| 635 | |
| 636 | Use the URL of the token to list the private keys: |
| 637 | |
| 638 | $ p11tool --login --provider /usr/lib/opensc-pkcs11.so --list-privkeys \ |
| 639 | "pkcs11:model=PKCS%2315%20emulated;manufacturer=ZeitControl;serial=000xxxxxxxxx;token=OpenPGP%20card%20%28User%20PIN%20%28sig%29%29" |
| 640 | Token 'OpenPGP card (User PIN (sig))' with URL 'pkcs11:model=PKCS%2315%20emulated;manufacturer=ZeitControl;serial=000xxxxxxxxx;token=OpenPGP%20card%20%28User%20PIN%20%28sig%29%29' requires user PIN |
| 641 | Enter PIN: |
| 642 | Object 0: |
| 643 | URL: pkcs11:model=PKCS%2315%20emulated;manufacturer=ZeitControl;serial=000xxxxxxxxx;token=OpenPGP%20card%20%28User%20PIN%20%28sig%29%29;id=%01;object=Signature%20key;type=private |
| 644 | Type: Private key |
| 645 | Label: Signature key |
| 646 | Flags: CKA_PRIVATE; CKA_NEVER_EXTRACTABLE; CKA_SENSITIVE; |
| 647 | ID: 01 |
| 648 | |
| 649 | Use the label, in this case "Signature key" as the key-name-hint in your FIT. |
| 650 | |
| 651 | Create the fitImage: |
| 652 | $ ./tools/mkimage -f fit-image.its fitImage |
| 653 | |
| 654 | |
| 655 | Sign the fitImage with the hardware key: |
| 656 | |
| 657 | $ ./tools/mkimage -F -k \ |
| 658 | "model=PKCS%2315%20emulated;manufacturer=ZeitControl;serial=000xxxxxxxxx;token=OpenPGP%20card%20%28User%20PIN%20%28sig%29%29" \ |
| 659 | -K u-boot.dtb -N pkcs11 -r fitImage |
| 660 | |
| 661 | |
Simon Glass | 58fe7e5 | 2013-06-13 15:10:00 -0700 | [diff] [blame] | 662 | Future Work |
| 663 | ----------- |
| 664 | - Roll-back protection using a TPM is done using the tpm command. This can |
| 665 | be scripted, but we might consider a default way of doing this, built into |
| 666 | bootm. |
| 667 | |
| 668 | |
| 669 | Possible Future Work |
| 670 | -------------------- |
| 671 | - Add support for other RSA/SHA variants, such as rsa4096,sha512. |
| 672 | - Other algorithms besides RSA |
| 673 | - More sandbox tests for failure modes |
| 674 | - Passwords for keys/certificates |
| 675 | - Perhaps implement OAEP |
| 676 | - Enhance bootm to permit scripted signature verification (so that a script |
| 677 | can verify an image but not actually boot it) |
| 678 | |
| 679 | |
| 680 | Simon Glass |
| 681 | sjg@chromium.org |
| 682 | 1-1-13 |