Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

SOC Ability to Independently Reset Caliptra #201

Open
JohnTraverAmd opened this issue Jun 5, 2024 · 1 comment
Open

SOC Ability to Independently Reset Caliptra #201

JohnTraverAmd opened this issue Jun 5, 2024 · 1 comment

Comments

@JohnTraverAmd
Copy link
Contributor

Caliptra Error Documentation Requires SOC to have reset ability of Caliptra. This ability must be limited in availability to SOC ROT since SOC ROT FW is not trusted to reset Caliptra independently.

Once we have exited trusted SOC immutable code, ability of SOC ROT to independently reset Caliptra at will, would enable an attack on the secrets of Caliptra by later SOC ROT FW.

Caliptra reset could be allowed by:

  1. SOC ROT Immutable code (this could independently reset Caliptra without SOC ROT reset) or
  2. Caliptra should be tied to SOC ROT reset and ALWAYS be provided SOC ROT measurements on SOC ROT boot.
@bharatpillilli
Copy link
Contributor

We trust SOC RT FW because SOC ROM is loading the SOC RT FW and is creating a chain of trust and thats the whole argument with Caliptra 1.0; I believe we have assumed/required to assume SOC RT FW is trusted.

Since its "secured", we should have it better available to meet CSP RAS requirements.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants