Re: U-Boot FIT Signature Verification

Hi there
I don't think it would make sense to check for expiration (even in case we would have full certificates like PKCS#7 verifiy)
At our point of the boot process we normally do not have access to a trusted time/date, so any check could be simply spoofed or even worse fails, because wall clock is not initialized properly.
I think even the EFI boot-process (or shim) does not check expiration date of their certificates!
What could make sense is a check for an expired certificate/key at signing time (including intermed certs), but not sure if this would be a too hard restriction (at least for developing/testing). I think a hint for the signer should be enough!
Regards
Robert
On Wed, Sep 16, 2020 at 01:19:03AM +0200, Heinrich Schuchardt wrote:
On 9/11/20 7:26 PM, Andrii Voloshyn wrote:
Hi there,
Does U-boot take into account certificate expiration date when verifying signed images in FIT? In other words, is date stored along with the public key in DTB file?
Cheers,
Andy
Hello Philippe,
looking at padding_pkcs_15_verify() in lib/rsa/rsa-verify.c I cannot
find a comparison of the date on which an image was signed with the
expiry date of the certificate. Shouldn't there be a check? Or did I
simply look into the wrong function?
I think Simon is the right person to answer this question, but
as far as I know, we don't have any device tree property for the expiration date of a public key. See doc/uImage.FIT/signature.txt.
-Takahiro Akashi
Best regards
Heinrich
participants (1)
-
REITHER Robert - Contractor