Hi Volkan,
The root of the chain are the 4 SRK public keys, the CA used to generate them
is not used in later verifications. In fact [1] does not even generate the CA,
each SRK is a CA by itself.
> 3. Why do we generate 4 SRK if we only use SRK1 ?
The i.MX53 gives you the opportunity to use 4 different SRKs. If required
you can also revoke at some point those SRKs individually. You can revoke
all but the last SRK, otherwise the system would remain unbootable.
Correct.
> 5. The public key used to verify the signed kernel is stored in
> usbarmory.itb. Is it correct ?
The public key used for kernel verification is embedded in the U-Boot image.
This one is not related with the SRKs of the i.MX53. Please check U-Boot
documentation regarding the "verified boot".
> 6. Can we use RSA key of 4096 bits for the PKI tree and for the kernel
> signature ? How ?
Yes, if you are using [1] you can pass "KEY_LENGTH=4096", as documented in [2].
> 7. If the kernel is signed, does it mean that I cannot change the kernel
> configuration or cannot run binaries if I don't sign them ? What is not
> allowed to do in a signed kernel even if the signature verification was
> successful?
When the varified boot is enforced you can not boot a non-signed kernel.
The binaries are not verified.
Cheers,
Andrej
[1]
https://github.com/inversepath/usbarmory/blob/master/software/secure_boot/Makefile-pki
[2]
https://github.com/inversepath/usbarmory/wiki/Secure-boot
>
> Sorry for the number of questions but I really need to understand the full
> process.
> Thank you in advance.
>
> --
> You received this message because you are subscribed to the Google Groups "USB armory" group.
> To unsubscribe from this group and stop receiving emails from it, send an email to
usbarmory+...@googlegroups.com.
> To post to this group, send email to
usba...@googlegroups.com.
> To view this discussion on the web visit
https://groups.google.com/d/msgid/usbarmory/b1e80447-a5a8-4c91-8844-2101cd7c40fc%40googlegroups.com.