Hi support team,
I am currently working with TMDS64EVM on secure boot. I have read documentation from Processor SDK Linux for AM64X and READMEs (and code) from TI U-Boot.
If I undertood well, each individual component of all fitImages (SPL, U-Boot, kernel) is signed using customer key. But not the entire fitImage nor the "configuration" node of the fitImage.
So, here is the question: what prevent an attacker from mixing fitImage components?
For example, an attacker could recreate the kernel fitImage with U-Boot or SPL DTB instead of the desired kernel DTB. As they are both signed with the same key, they will be correctly authentificated and boot with continue with the wrong DTB, which may not put the Linux kernel in a desirable state.
Is there a way of preventing this kind of attack?
Best regards,
Guillaume