chipsalliance / Caliptra

Caliptra IP and firmware for integrated Root of Trust block
Apache License 2.0
119 stars 29 forks source link

SOC Ability to Independently Reset Caliptra #201

Open JohnTraverAmd opened 4 months ago

JohnTraverAmd commented 4 months ago

Caliptra Error Documentation Requires SOC to have reset ability of Caliptra. This ability must be limited in availability to SOC ROT since SOC ROT FW is not trusted to reset Caliptra independently.

Once we have exited trusted SOC immutable code, ability of SOC ROT to independently reset Caliptra at will, would enable an attack on the secrets of Caliptra by later SOC ROT FW.

Caliptra reset could be allowed by:

  1. SOC ROT Immutable code (this could independently reset Caliptra without SOC ROT reset) or
  2. Caliptra should be tied to SOC ROT reset and ALWAYS be provided SOC ROT measurements on SOC ROT boot.
bharatpillilli commented 1 month ago

We trust SOC RT FW because SOC ROM is loading the SOC RT FW and is creating a chain of trust and thats the whole argument with Caliptra 1.0; I believe we have assumed/required to assume SOC RT FW is trusted.

Since its "secured", we should have it better available to meet CSP RAS requirements.