public inbox for linux-tegra@vger.kernel.org
 help / color / mirror / Atom feed
From: Alban Bedel <alban.bedel-RM9K5IK7kjKj5M59NBduVrNAH6kLmebB@public.gmane.org>
To: Stephen Warren <swarren-3lzwWm7+Weoh9ZMKESR00Q@public.gmane.org>
Cc: Alban Bedel
	<alban.bedel-RM9K5IK7kjKj5M59NBduVrNAH6kLmebB@public.gmane.org>,
	Jimmy Zhang <jimmzhang-DDmLM1+adcrQT0dZR+AlfA@public.gmane.org>,
	"linux-tegra-u79uwXL29TY76Z2rM5mHXA@public.gmane.org"
	<linux-tegra-u79uwXL29TY76Z2rM5mHXA@public.gmane.org>
Subject: Re: [tegrarcm PATCH v2] Add support for production devices secured with PKC
Date: Wed, 2 Mar 2016 11:41:10 +0100	[thread overview]
Message-ID: <20160302114110.40a43529@avionic-0020> (raw)
In-Reply-To: <56D5D245.3000204-3lzwWm7+Weoh9ZMKESR00Q@public.gmane.org>

[-- Attachment #1: Type: text/plain, Size: 2337 bytes --]

On Tue, 1 Mar 2016 10:32:53 -0700
Stephen Warren <swarren-3lzwWm7+Weoh9ZMKESR00Q@public.gmane.org> wrote:

> On 03/01/2016 04:12 AM, Alban Bedel wrote:
> > On Mon, 29 Feb 2016 23:03:01 +0000
> > Jimmy Zhang <jimmzhang-DDmLM1+adcrQT0dZR+AlfA@public.gmane.org> wrote:
> >
> >> Alban,
> >>
> >> First of all, I believe the code your added here should and will work.
> >> However, it is probably purely coincident that I was adding similar
> >> functions as requested by Avionic Design (AD) in the last a few weeks.
> >> I think we could merge both approaches and result in one best
> >> solution.
> >
> > Up to yesterday what I did was only based on guess work, it was enough
> > to use RCM, but loading the bootloader failed. Now we finally got access
> > to (part of) the miniloader source and I was able to pin point the
> > missing piece to start the bootloader. The miniloader need the
> > bootloader signature before the bootloader binary when in PKC mode.
> > I added that and I was finally able to bootstrap my fused board.
> >
> >> The main differences between your and mine are:
> >> 1. When to sign.
> >>      My solution is to separate signing and flashing. Ie, signing can be
> >> done at a secure server and flashing at non-secure factory. During
> >> flashing, only signed RCM messages and bootloader are needed. No pkc
> >> private key file is required to be present at factory. This private
> >> key management feature is also requested by AD. Your solution requires
> >> the rsa key file being present when downloading flasher.
> >
> > Yes, this is currently not suited for production.
> 
> Given that, I think I'll ignore this patch series for now. It's typical 
> to mark such patches "RFC" in the email subject to indicate that they 
> shouldn't be applied.

Sorry, this was misleading, with production I meant a factory producing
some K1 based hardware. What this patch implement works properly, but it
is only useful for developers as you need the private key. It does not
provide a solution for programming/recovering locked devices at an
untrusted factory. However I didn't intended to cover this case with
this patch.

> Hopefully you and Jimmy can work together to 
> combine your work and post a production-ready patch set?

I'll look at Jimmy's patches.

Alban

[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 819 bytes --]

      parent reply	other threads:[~2016-03-02 10:41 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2016-02-29 17:49 [tegrarcm PATCH v2] Add support for production devices secured with PKC Alban Bedel
     [not found] ` <1456768181-12983-1-git-send-email-alban.bedel-RM9K5IK7kjKj5M59NBduVrNAH6kLmebB@public.gmane.org>
2016-02-29 23:03   ` Jimmy Zhang
     [not found]     ` <fbd256251e014b23a189337a7d251da0-wO81nVYWzR7YuxH7O460wFaTQe2KTcn/@public.gmane.org>
2016-03-01 11:12       ` Alban Bedel
2016-03-01 17:32         ` Stephen Warren
     [not found]           ` <56D5D245.3000204-3lzwWm7+Weoh9ZMKESR00Q@public.gmane.org>
2016-03-01 18:26             ` Jimmy Zhang
2016-03-02 10:41             ` Alban Bedel [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20160302114110.40a43529@avionic-0020 \
    --to=alban.bedel-rm9k5ik7kjkj5m59nbduvrnah6klmebb@public.gmane.org \
    --cc=jimmzhang-DDmLM1+adcrQT0dZR+AlfA@public.gmane.org \
    --cc=linux-tegra-u79uwXL29TY76Z2rM5mHXA@public.gmane.org \
    --cc=swarren-3lzwWm7+Weoh9ZMKESR00Q@public.gmane.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox