summaryrefslogtreecommitdiff
path: root/doc/imx/ahab/introduction_ahab.txt
blob: 6a4e4e4004c7533ae109c8893f1d5df3e235ae86 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
          +=======================================================+
          +         i.MX8/8x AHAB Secure Boot introduction        +
          +=======================================================+

1. Introduction
----------------

The i.MX8 and i.MX8x family of applications processors introduce a new
secure boot concept. Due to the multi-core architecture the Security
Controller (SECO) and System Control Unit (SCU) are heavily involved in
the secure boot process.

Step-by-step guides are available under doc/imx/hab/ahab/guides/ directory,
users familiar with AHAB architecture and CST PKI tree generation should
refer to this directory instead.

1.1 The AHAB Secure Boot Architecture
--------------------------------------

The Advanced High Assurance Boot (AHAB) feature relies in digital signatures to
prevent unauthorized software execution during the device boot sequence. In
case a malware takes control of the boot sequence, sensitive data, services and
network can be impacted.

The AHAB authentication is based on public key cryptography in which image
data is signed offline using one or more private keys. The resulting signed
image data is then verified on the i.MX processor using the corresponding
public keys. The public keys are included in the final binary and the SRK
Hash is programmed in the SoC fuses for establishing the root of trust.

In i.MX8 and i.MX8x families the SCU is responsible to interface with the boot
media, managing the process of loading the firmware and software images in
different partitions of the SoC. The SECO is responsible to authenticate the
images and authorize the execution of them.

1.1.1 The System Control Unit (SCU)
------------------------------------

The System Control Unit SCU is a subsystem equipped with a programmable M4
core, which is responsible to handle the resource allocation, power, clocking,
IO configuration and muxing.

The SCU is also responsible to interface between the rest of the system. In the
secure boot flow the SCU interfaces with the Security Controller (SECO),
requesting the image authentication.

The System Control Unit FW (SCFW) is responsible to control all the
functionalities of the SCU. This firmware is distributed in a porting kit form.
Instructions to download the SCFW Porting Kit are available in the Linux BSP
Release Notes.

Details about SCU can be found in the processors Reference Manual (RM).

1.1.2 The Security Controller (SECO)
-------------------------------------

The SECO is a M0+ core dedicated to handle the SoC security subsystem. The
controller communicates with SCU domain through a dedicate message unit (MU).

The SECO has a dedicate ROM which is responsible to initialize low level
security features and to authenticate the SECO firmware previously loaded by
the SCU ROM.

The SECO firmware provides security services at run-time to different domains
of the SoC, one of these being the capability of authenticate images.

The SECO firmware is signed and distributed by NXP and is always authenticated
in OEM open and closed configuration, instructions to download the SECO FW are
available in the Linux BSP Release Notes.

Details about SECO can be found in the processors Security Reference Manual
(SRM).

1.2 The image container
------------------------

Due to the new the architecture, multiple firmwares and softwares are required
to boot i.MX8 and i.MX8x family devices. In order to store all the images in a
single binary the container image structure is used.

At least two containers are needed for the boot process, the first container
must include only the SECO FW (provided by NXP). Additional containers can
contain one or multiple images, depending on the users specific application.

The final binary is generated by the imx-mkimage tool. The tool can generate
additional containers and also combine all containers in a single binary.

1.3 The i.MX8/8x secure boot flow
----------------------------------

As mentioned in the introduction, due to the multiple cores architecture the
i.MX8 boot sequence involves SCU ROM, SCFW, SECO ROM, and SECO FW.

The diagram below illustrate the secure boot flow overview:

System Controller   │  Security Controller  │     Cortex-M     │   Cortex-A
      (SCU)         │        (SECO)         │                  │
                    │                       │                  │
 ╔═════════════╗    │   ╔═════════════╗  ┌───────────┐       ┌─────────┐
 ║   SCU INIT  ║    │   ║  SECO INIT  ║  │  │        │       │ │       │
 ╚══════╤══════╝    │   ╚══════╤══════╝  │  │        v       │ │       v
        │           │          │         │  │  ┌──────────┐  │ │ ┌────────────┐
 ╔══════╧══════╗    │          │         │  │  │ Start M4 │  │ │ │  Start AP  │
 ║Load SECO FW ║    │          │         │  │  │   IMG    │  │ │ │    IMG     │
 ╚══════╤══════╝    │   ╔══════╧══════╗  │  │  └──────────┘  │ │ └─────┬──────┘
        ├──────────────>║Auth SECO FW ║  │  │                │ │       │
 ╔══════╧══════╗    │   ╚══════╤══════╝  │  │   ┌────────────┘ │       │
 ║ Load SCU FW ║    │          │         │  │   │              │       │
 ║   and DCD   ║    │          │         │  │   │              │ ┌─────┴──────┐
 ╚══════╤══════╝    │   ┌──────┴──────┐  │  │   │              │ │    Load    │
        ├──────────────>│ Auth SCU FW │  │  │   │              │ │ Add AP IMG │
        │           │   │   and DCD   │  │  │   │              │ └─────┬──────┘
 ╔══════╧══════╗    │   └──────┬──────┘  │  │   │              │       │
 ║   Run DCD   ║<──────────────┤         │  │   │              │       │
 ╚══════╤══════╝    │          │         │  │   │      ┌───────────────┤
        │           │          │         │  │   │      │       │       │
 ╔══════╧══════╗    │          │         │  │   │      │       │       │
 ║ Load M4 IMG ║    │          │         │  │   │      │       │       │
 ╚══════╤══════╝    │   ┌──────┴──────┐  │  │   │      │       │       │
        ├──────────────>│ Auth M4 IMG │  │  │   │      │       │       │
 ╔══════╧══════╗    │   └──────┬──────┘  │  │   │      │       │ ┌─────┴──────┐
 ║ Load AP IMG ║    │          │         │  │   │      │       │ │     Run    │
 ╚══════╤══════╝    │   ┌──────┴──────┐  │  │   │      │       │ │ Add AP IMG │
        ├──────────────>│ Auth AP IMG │  │  │   │      │       │ └────────────┘
 ╔══════╧══════╗    │   └─────────────┘  │  │   │      │       │
 ║Start SCU FW ║    │ ┌──────────────────┘  │   │      │       │
 ╚══════╤══════╝    │ │                     │   │      │       │
        │           │ │   ┌─────────────────────┘      │       │
 ┌──────┴──────┐    │ │   │                 │          │       │
 │  Start M4   ├──────┘   │     ┌──────────────────────┘       │
 └──────┬──────┘    │     │     │           │                  │
        │           │     │     │           │                  │
 ┌──────┴──────┐    │     │     │           │                  │
 │  Start AP   ├──────────┘     │           │                  │
 └─────────────┘    │           │           │                  │
        ┌───────────────────────┘           │                  │
        │           │                       │                  │
        v           │                       │                  │
 ┌─────────────┐    │   ┌─────────────┐     │                  │
 │Request SECO ├───────>│ Auth AP IMG │     │                  │
 └─────────────┘    │   └─────────────┘     │                  │
                    │                       │                  │

Notes:
All boxes enclosed by double dash (═) are performed at SCU/SECO ROM level.

The sequence below explains the i.MX8 and i.MX8x boot flow:

1  - At reset, the SCU ROM and SECO ROM both start execution.
2  - The SCU ROM reads the boot configuration and loads the SECO FW (First
     container) from the boot media to the SECO TCM.
3  - A message is sent by the SCU ROM via MU requesting the SECO ROM to
     authenticate the SECO FW which is signed using NXP key.
4  - The SCU ROM loads the second container from the boot media, this container
     must contain at least the SCFW which is signed using the OEM keys.
5  - The SCU ROM loads the SCFW to the SCU TCM, a message is sent via MU
     requesting the SECO FW to authenticate the SCFW and DCD table.
6  - The SCU ROM configures the DDR and loads the M4 and AP images included in
     the second container to their respective load addresses.
7  - The SCU ROM request the SECO FW to authenticate the M4 image.
8  - The SCU ROM request the SECO FW to authenticate the AP image. This image
     is the initial AP core software, depending in the U-Boot target it can
     be the U-Boot and ATF or only SPL.
9  - The SCFW is initialized and starts the ARM Cortex-M and Cortex-A cores.
10 - From this point additional containers can be loaded by Cortex-M and
     Cortex-A cores and authenticated by SECO, the AP SW must interface with
     SCU by calling the sc_misc_seco_authenticate() API function. In current
     U-Boot implementation the additional image can be the Linux Kernel binary
     or the U-Boot proper and ATF. Details about current U-Boot implementation
     can be found in AHAB guides included in doc/imx/hab/ahab/guides/ directory.

2. Generating a PKI tree
-------------------------

The first step is to generate the private keys and public keys certificates.
The AHAB architecture is based on a Public Key Infrastructure (PKI) tree.

The Code Signing Tools package contains an OpenSSL based key generation script
under keys/ directory. The ahab_pki_tree.sh script generates a PKI tree
containing 4 Super Root Keys (SRK), possible to also include a subordinate
SGK key.

The AHAB supports both RSA and ECC keys, a new PKI tree can be generated by
following the example below:

- Generating a P384 ECC PKI tree on CST (starting from v3.1.0):

  $ ./ahab_pki_tree.sh
  ...
  Do you want to use an existing CA key (y/n)?: n
  Do you want to use Elliptic Curve Cryptography (y/n)?: y
  Enter length for elliptic curve to be used for PKI tree:
  Possible values p256, p384, p521:  p384
  Enter the digest algorithm to use: sha384
  Enter PKI tree duration (years): 5
  Do you want the SRK certificates to have the CA flag set? (y/n)?: n

The diagram below illustrate the PKI tree generated:

                             ┌─────────┐
                             │   CA    │
                             └────┬────┘
                                  │
                                  │
         ┌───────────────┬────────┴────────┬───────────────┐
         │               │                 │               │
         │               │                 │               │
         v               v                 v               v
    ┌────────┐       ┌────────┐       ┌────────┐       ┌────────┐
    │  SRK1  │       │  SRK2  │       │  SRK3  │       │  SRK4  │
    └────────┘       └────────┘       └────────┘       └────────┘

2.1 Generating a PKI tree including a subordinate SGK key
----------------------------------------------------------

The ahab_pki_tree.sh script is also able to generate a PKI tree containing a
subordinate key of the SRK, this key can be used to verify the signature
included in the final signed image.

Users should set the CA flag when generating the SRK certificates.

- Generating a P384 ECC PKI tree with a subordinate SGK key on CST (starting
from v3.1.0):

  $ ./ahab_pki_tree.sh
  ...
  Do you want to use an existing CA key (y/n)?: n
  Do you want to use Elliptic Curve Cryptography (y/n)?: y
  Enter length for elliptic curve to be used for PKI tree:
  Possible values p256, p384, p521:  p384
  Enter the digest algorithm to use: sha384
  Enter PKI tree duration (years): 5
  Do you want the SRK certificates to have the CA flag set? (y/n)?: y

The diagram below illustrate the PKI tree generated:

                             ┌─────────┐
                             │   CA    │
                             └────┬────┘
                                  │
                                  │
         ┌───────────────┬────────┴────────┬───────────────┐
         │               │                 │               │
         v               v                 v               v
    ┌────────┐       ┌────────┐       ┌────────┐       ┌────────┐
    │  SRK1  │       │  SRK2  │       │  SRK3  │       │  SRK4  │
    └────┬───┘       └───┬────┘       └────┬───┘       └───┬────┘
         │               │                 │               │
         v               v                 v               v
    ┌────────┐       ┌────────┐       ┌────────┐       ┌────────┐
    │  SGK1  │       │  SGK2  │       │  SGK3  │       │  SGK4  │
    └────────┘       └────────┘       └────────┘       └────────┘

Note: Due to a limitation in i.MX8QXP B0 silicon it's not possible to use RSA
4096-bit SRK keys with an additional subordinate SGK key.

2.2 Generating a SRK Table and SRK Hash
----------------------------------------

The next step is to generated the SRK Table and its respective SRK Table Hash
from the SRK public key certificates created in one of the steps above.

In the AHAB architecture, the SRK Table is included in the signed image and the
SRK Hash is programmed in the SoC SRK_HASH[511:0] fuses.

On the target device during the authentication process the AHAB code verify the
SRK Table against the SoC SRK_HASH fuses, in case the verification is successful
the root of trust is established and the AHAB code can progress with the image
authentication.

The srktool can be used for generating the SRK Table and its respective SRK
Table Hash.

- Generating SRK Table and SRK Hash in Linux 64-bit machines:

  $ cd ../crts/
  $ ../linux64/bin/srktool -a -s sha384 -t SRK_1_2_3_4_table.bin \
	-e SRK_1_2_3_4_fuse.bin -f 1 -c \
	SRK1_sha384_secp384r1_v3_usr_crt.pem,\
	SRK2_sha384_secp384r1_v3_usr_crt.pem,\
	SRK3_sha384_secp384r1_v3_usr_crt.pem,\
	SRK4_sha384_secp384r1_v3_usr_crt.pem

- Optionally users can check if the sha512sum of SRK_1_2_3_4_table matches with
  the SRK_1_2_3_4_fuse.bin:

  $ od -t x4 --endian=big SRK_1_2_3_4_fuse.bin
  0000000 01b04697 0253376b 2066fe56 aaef9a91
  0000020 e62e09d8 14fb7e36 d5b38d05 0982edab
  0000040 7ada6576 2f6b4f59 1fd9347e 46e7305d
  0000060 46e34bf0 89780bd1 c809e714 a17e2f4e

  $ sha512sum SRK_1_2_3_4_table.bin
  01b046970253376b2066fe56aaef9a91\
  e62e09d814fb7e36d5b38d050982edab\
  7ada65762f6b4f591fd9347e46e7305d\
  46e34bf089780bd1c809e714a17e2f4e\
  SRK_1_2_3_4_table.bin

NOTE: The commands above cannot be used as reference to program the SoC
      SRK_HASH fuses.

The SRK_1_2_3_4_table.bin and SRK_1_2_3_4_fuse.bin files can be used in further
steps as explained in AHAB guides available under doc/imx/hab/ahab/guides/
directory.