Hello all,

Continuing the discussions we had on securing the boot flow and OS as much as
possible, we came up with the following idea.

We are currently sorting out what's needed to add UEFI Secure Boot in U-Boot. 
This will cover the next payload (shim/grub2/shim depending on board needs).

In order to provide better overall security for the OS we'll need to at least
verify DTB (if provided externally), initramfs and kernel modules.

1. For the kernel modules we can use kernel module signing facilities [1]
2. In case someone wants to provide an external DTB, we can use FIT images
to secure that. The FIT images will contain the DTB(s) we need. Those will 
only be used if the authentication process succeeds. This will allow us to 
verify DTBs without introducing any new functionality to U-Boot.
3. We need to verify initramfs as well. This can be accomplished in various 
ways.
Packing kernel + initramfs or using dm-verity are the two obvious ones but we
are open to suggestions.

This also makes the development process for LEDGE pretty clear. We'll have to
add UEFI Secure Boot implementation on U-Boot *only* since the rest of the
functionality can be achieved with the existing code (minor adjustments might be
needed though).

What do you think?

[1] https://www.kernel.org/doc/html/v4.15/admin-guide/module-signing.html


Thanks
/Ilias
_______________________________________________
boot-architecture mailing list
[email protected]
https://lists.linaro.org/mailman/listinfo/boot-architecture

Reply via email to