-
In some DICE model, the TCI of FMC is combined with UDS to derive CDI of device certificate, i.e., BootROM-->FMC-->Runtime. In this boot model, it is reasonable that we have such extra FMC stage before transferring control to the main runtime FW. Since any code update on Runtime FW will not affect the device certificate. The rarely changed FMC stage can help stabilize the device certificate. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 4 replies
-
Good question. The primary reason is to allow machine owners to issue an owner certificate for FMC alias key. Because RT is hitelssly updatable but FMC is not, you can issue an FMC owner cert at cold boot and then guarantee it won't change until the next cold boot. You can also force it to rotate with an FMC update, whereas LDevID is bound to fuses, so it's not infinitely rotatable. We have had a couple discussions for 2.0 about ways we could achieve this property without FMC, but we don't have anything concrete written down yet. |
Beta Was this translation helpful? Give feedback.
Good question. The primary reason is to allow machine owners to issue an owner certificate for FMC alias key. Because RT is hitelssly updatable but FMC is not, you can issue an FMC owner cert at cold boot and then guarantee it won't change until the next cold boot. You can also force it to rotate with an FMC update, whereas LDevID is bound to fuses, so it's not infinitely rotatable.
We have had a couple discussions for 2.0 about ways we could achieve this property without FMC, but we don't have anything concrete written down yet.