TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

A cryptographically secure bootloader for RISC-V in Rust

189 pointsby fork-bomber10 months ago

8 comments

Vogtinator10 months ago
Measured boot &gt; trust chain through signature verification:<p>With measured boot, components in the boot chain tell some trusted component (e.g. a TPM, possibly in FW) about all of their input and only if the hashes at the end match, $something is accessible (in most cases a secret key for data decryption).<p>1. More flexibility (with TPM e.g. you can &quot;seal&quot; a secret against different parts independently)<p>2. No need for PKI, which gets very complex once revocations are involved (have fun looking at the &quot;Secure Boot&quot; DBX lists and the shim SBAT mechanism)<p>3. More freedom: The system still boots if the measurements don&#x27;t match, you just don&#x27;t get access to secrets. You&#x27;re free to seal your own secrets against your new measurements and whoever did the last sealing has no access anymore. (Unlike on PCs where the Microsoft trust is in most cases not removable).
评论 #41163580 未加载
评论 #41163937 未加载
评论 #41164716 未加载
评论 #41169186 未加载
zokier10 months ago
tbh I feel bad for the kid, his thesis supervisor should have helped him more here to scope and direct the work in some sensible way. now it is bit of a mess :(<p>like just doing a review and comparison of existing boot verification mechanisms would have been already good scope for a thesis. Instead they are barely even mentioned as a side-note, which puts this in a awkward position.<p>or if crypto was focus, then putting more work on designing and implementing the crypto scheme would have been relevant. Now they got so tangled with the nitty gritty boot details that the crypto ended up also as questionable side-note.<p>or if rust was focus, then just implementing clean pure-rust bootloader could have been already enough for the thesis, avoiding the stumbling over on misguided crypto bits.<p>or many other ways this could have been more successful. overall it now feels the author ended up biting far more than what they can chew. also they should have imho spent less time coding and more time on editing the actual thesis. the text is all over the place.
评论 #41169230 未加载
ReleaseCandidat10 months ago
I don&#x27;t get the &quot;1&#x2F;10 size of U-Boot&quot; argument. As it can only boot 3 RISC-V64 boards via TFTP, it also has less than 1&#x2F;10 of the features and supported hardware of U-Boot. <a href="https:&#x2F;&#x2F;github.com&#x2F;u-boot&#x2F;u-boot">https:&#x2F;&#x2F;github.com&#x2F;u-boot&#x2F;u-boot</a>
评论 #41163883 未加载
评论 #41163819 未加载
zamalek10 months ago
The problem with Rust in the boot process is that it&#x27;s going to become much harder to find vulnerabilities for roots&#x2F;jailbreaks. Still, this is great work!
评论 #41163667 未加载
评论 #41163287 未加载
评论 #41164493 未加载
IshKebab10 months ago
That is I&#x27;ve impressive final year project, nice work!<p>Vector crypto is very cutting edge too. I guess there isn&#x27;t any hardware that has it yet...
评论 #41164248 未加载
Aurornis10 months ago
This is a very specific type of bootloader for devices that get their code over the internet:<p>&gt; SentinelBoot&#x27;s threat model focuses on thin client devices which do not store their own OS and over-the-air updates (e.g. how phones are updated): both of these cases involve executable code being sent over a network, usually the internet. We ignore the risk of direct hardware modification, as an attacker can just swap out the bootloader (making any potential defence implemented by SentinelBoot in vain).<p>The author readily acknowledges that it does not defend against hardware modification. The other comments here trying to vilify this project don&#x27;t understand what it is supposed to do.
评论 #41163000 未加载
greenavocado10 months ago
Congratulations on the development. Part of me is concerned that this will be used to push devices that cannot be unlocked and tinkered with by end users, reducing their technological freedom.
评论 #41162659 未加载
评论 #41162804 未加载
评论 #41163186 未加载
评论 #41162640 未加载
评论 #41162580 未加载
评论 #41163546 未加载
评论 #41162534 未加载
评论 #41162408 未加载
fefe2310 months ago
&quot;cryptographically secure bootloader&quot; is a meaningless phrase.<p>They mean a boot loader that validates cryptographic public key signatures of the loaded component. That would be a secure cryptographic bootloader. AFTER they have proven that it is, in fact, secure.<p>You can&#x27;t just write some code and then say it must be secure because Rust was involved.
评论 #41162698 未加载
评论 #41162597 未加载
评论 #41162651 未加载
评论 #41162562 未加载
评论 #41163003 未加载