Tool/software:
Team,
Some cybersecurity inquiries from our customer with my first-pass at answers (please review and also comment on the last #3 question please):
1.How to authenticate ROOTFS before mounting it by kernel? What is TI’s recommendation?
Use NFS to mount the root filesystem. The boot loader will tell the kernel where to look for the root filesystem1.
- SK-AM62A-LP: How to set U-Boot environment values to mount NFS on AM62A custom board - Processors forum - Processors - TI E2E support forums
- Getting Started with U Boot on Arm
2.How crts and keys are managed? Currently I see they are part of U-boot source i.e. u-boot/board/ti/keys directory
The management of cryptographic keys and certificates on the AM62x system12345 involves high-security field-securable (HS-FS) silicon, asymmetric cryptography, and custom keys1234. The system uses a combination of public and private keys for secure boot and protection of ROM code and security peripherals24.
Foundational security enablers | Video | TI.com
Introduction to Secure Boot | Video | TI.com
(There are more videos in planning)
Trainings for AM62x:
Security overview: Security
3.I am getting below error while u-boot authenticating fitImage, I verified uboot dtb has signature node and gone through many E2E’s but no solution found.
This is the one I’d like to lean on our experts for …. Stay tuned for more…
Also, do you already have the AM62X Security documentation (I think you do)?
ti.com/secureresources/AM62X-RESTRICTED-SECURITY?
TY,
CY