[LEDE-DEV] automated signed firmware upgrades / hide a secret in image

Yousong Zhou yszhou4tech at gmail.com
Wed Feb 22 03:23:41 PST 2017

On 22 February 2017 at 17:05, Bastian Bittorf <bb at npl.de> wrote:
> There are "automated" signatures (e.g. from builbot) and manual ones,
> from humans. For protecting ourselfes from bad admins, there
> should be a "secret thing" which is baked into the firmware and
> only seeable during runtime: this way we can prevent, that a lazy
> admin "signs" a sha256 sum, without really has flashed the image
> and can make sure that it really runs.
> Now the question: a secret can be e.g.
> # ls -la /etc | md5sum
> This is naive, and a dumb admin can e.g. unsquashfs the
> image for getting the data. are there better methods? any ideas?

How about generating at build time a piece of c code whose output when
run at the target board will be the source code itself (quine).  We
can use the output content to seed the computation of signature.  The
binary itself should be cross-compiled in a reproducible way so that
integrity of the binary itself can be verified...


More information about the Lede-dev mailing list