Enable SecureLock and SecureBoot via the CLI #200
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
I'm finding it difficult to follow the discussions about enabling SecureLock and SecureBoot. The simplest solution would be to use the Commissioner. However, since I'm using a Pico board that isn't included in the SDK, and therefore compiled the firmware myself with my own signing key, I'm wondering if the Commissioner takes this into account or if it burns the hash of the public signing key for the official builds into the OTP? The latter seems more likely to me, since the Commissioner doesn't have access to my otp.json file.
Could I please have a step-by-step guide on how to enable SecureLock and SecureBoot via the CLI?
Regards,
Cid
I found this, but I'm wondering if it's complete? Why are write access revoked for PAGE1, and later PAGE2 and PAGE48? Is all of this necessary?
Revoking access is necessary to avoid OTP dumps, which is the final purpose I guess. Locking page 48 doesn’t mean it will not possible to write or read. It means that only secure code will be able to do so; and since only your signed code will be able to do it, the result is that the keys are only accessible by the owner of the board.
Secure Lock will allow only run firmware signed by me.