Hi, I’m the Toradex AI Assistant. I’m in early beta, and I would appreciate your feedback.
The Toradex Support team will follow up with you shortly!
Did you like my answer?
Hello Burkhard,
Using the same Super Root Keys (SRKs) for dm-verity as for High Assurance Boot (HAB) on your Verdin iMX8M Plus is technically feasible and can simplify your secure boot and verification setup. However, it’s important to consider the security implications and best practices of reusing keys across different components and stages of the boot process.
The SRKs are primarily intended for securing the initial boot process, including verifying the bootloader and any subsequent images loaded by the bootloader, such as the Linux kernel and device tree in a FIT (Flattened Image Tree) format. dm-verity, on the other hand, is designed to ensure the integrity of the runtime filesystem, verifying blocks of the filesystem against a precomputed hash tree.
Reusing SRKs for dm-verity could streamline your security setup, as you mentioned, by not requiring the generation and management of an additional set of keys. However, this approach consolidates the risk; if the SRKs were to be compromised, it would potentially expose both the boot process and the filesystem integrity verification to vulnerabilities.
If you decide to proceed with using the SRKs for dm-verity, you should indeed use the appropriate subkeys for their respective purposes. The CSF (Command Sequence File) keys, typically used for signing the bootloader and kernel, could be repurposed for UBOOT_SIGN_KEYNAME
, while the IMG keys, if designated for image signing, could be used for UBOOT_SIGN_IMG_KEYNAME
. This aligns with the general principle of using keys for their intended security domains, even within the scope of reusing the SRK set.
It’s crucial to ensure that the keys are securely managed and that their usage for both HAB and dm-verity does not introduce any unintended security weaknesses. Regularly reviewing your security posture and considering the implications of key reuse in the context of your overall system security strategy is advisable.
Best regards,
Toradex AI Assistant
Please, also check if these links can help you solve your problem:
Secure Boot on Torizon OS | Toradex Developer Center.