Compare commits
20 Commits
Author | SHA1 | Date | |
---|---|---|---|
28a1b1cc06 | |||
5738bcc7a3 | |||
4fb166631d | |||
1b862d3b0c | |||
094420b32b | |||
349cbc39f2 | |||
e294cb3458 | |||
da31f984dd | |||
9d3e8c06fc | |||
b378bbf61d | |||
04b89a9739 | |||
0d28a7bcf6 | |||
aeafd09007 | |||
8b6148ac90 | |||
15a4fdfa66 | |||
e713daba26 | |||
b78f2cd2e7 | |||
601c98000a | |||
ab1c9417b1 | |||
f6d96013e1 |
@ -1 +1 @@
|
|||||||
3.0.1
|
3.1.1
|
||||||
|
@ -104,9 +104,24 @@ solo mergehex bootloader.hex solo.hex bundle.hex
|
|||||||
|
|
||||||
`bundle.hex` is our complete firmware build. Note it is in this step that you can
|
`bundle.hex` is our complete firmware build. Note it is in this step that you can
|
||||||
include a custom attestation certificate or lock the device from debugging/DFU.
|
include a custom attestation certificate or lock the device from debugging/DFU.
|
||||||
By default the "hacker" attestation certifcate and key is used.
|
By default the "hacker" attestation certifcate and key is used. Use the `--lock` flag
|
||||||
|
to make this permanent.
|
||||||
|
|
||||||
```
|
```
|
||||||
|
solo mergehex \
|
||||||
|
--attestation-key "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF" \
|
||||||
|
--attestation-cert attestation.der \
|
||||||
|
solo.hex \
|
||||||
|
bootloader.hex \
|
||||||
|
bundle.hex
|
||||||
|
```
|
||||||
|
|
||||||
|
**Warning**: If you use `--lock`, this will permanently lock the device to this new bootloader. You
|
||||||
|
won't be able to program the bootloader again or be able to connect a hardware debugger.
|
||||||
|
The new bootloader may be able to accept (signed) updates still, depending on how you configured it.
|
||||||
|
|
||||||
|
```
|
||||||
|
# Permanent!
|
||||||
solo mergehex \
|
solo mergehex \
|
||||||
--attestation-key "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF" \
|
--attestation-key "0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF0123456789ABCDEF" \
|
||||||
--attestation-cert attestation.der \
|
--attestation-cert attestation.der \
|
||||||
@ -118,9 +133,5 @@ solo mergehex \
|
|||||||
|
|
||||||
See [here for more information on custom attestation](/solo/customization/).
|
See [here for more information on custom attestation](/solo/customization/).
|
||||||
|
|
||||||
If you use `--lock`, this will permanently lock the device to this new bootloader. You
|
|
||||||
won't be able to program the bootloader again or be able to connect a hardware debugger.
|
|
||||||
The new bootloader may be able to accept (signed) updates still, depending on how you configured it.
|
|
||||||
|
|
||||||
To learn more about normal updates or a "full" update, you should [read more on Solo's boot stages](/solo/bootloader-mode).
|
To learn more about normal updates or a "full" update, you should [read more on Solo's boot stages](/solo/bootloader-mode).
|
||||||
|
|
||||||
|
@ -45,7 +45,7 @@ email=example@example.com
|
|||||||
openssl ecparam -genkey -name "$curve" -out root_key.pem -rand seed.bin
|
openssl ecparam -genkey -name "$curve" -out root_key.pem -rand seed.bin
|
||||||
|
|
||||||
# generate a "signing request"
|
# generate a "signing request"
|
||||||
openssl req -new -key root_key.pem -out root_key.pem.csr -subj "/C=$country/ST=$state/O=$organization/OU=$unit/CN=example.com/emailAddress=$email"
|
openssl req -new -key root_key.pem -out root_key.pem.csr -subj "/C=$country/ST=$state/O=$organization/OU=$unit/CN=$CN/emailAddress=$email"
|
||||||
|
|
||||||
# self sign the request
|
# self sign the request
|
||||||
openssl x509 -trustout -req -days 18250 -in root_key.pem.csr -signkey root_key.pem -out root_cert.pem -sha256
|
openssl x509 -trustout -req -days 18250 -in root_key.pem.csr -signkey root_key.pem -out root_cert.pem -sha256
|
||||||
@ -74,7 +74,7 @@ Note you must use a prime256v1 curve for this step, and you must leave the unit/
|
|||||||
country=US
|
country=US
|
||||||
state=Maine
|
state=Maine
|
||||||
organization=OpenSourceSecurity
|
organization=OpenSourceSecurity
|
||||||
unit="Authenticator Attestation"
|
unit="Authenticator Attestation" # MUST KEEP THIS AS "Authenticator Attestation" for FIDO2.
|
||||||
CN=example.com
|
CN=example.com
|
||||||
email=example@example.com
|
email=example@example.com
|
||||||
|
|
||||||
@ -82,7 +82,7 @@ email=example@example.com
|
|||||||
openssl ecparam -genkey -name "$curve" -out device_key.pem -rand seed.bin
|
openssl ecparam -genkey -name "$curve" -out device_key.pem -rand seed.bin
|
||||||
|
|
||||||
# generate a "signing request"
|
# generate a "signing request"
|
||||||
openssl req -new -key device_key.pem -out device_key.pem.csr -subj "/C=$country/ST=$state/O=$organization/OU=$unit/CN=example.com/emailAddress=$email"
|
openssl req -new -key device_key.pem -out device_key.pem.csr -subj "/C=$country/ST=$state/O=$organization/OU=$unit/CN=$CN/emailAddress=$email"
|
||||||
|
|
||||||
# sign the request
|
# sign the request
|
||||||
openssl x509 -req -days 18250 -in device_key.pem.csr -extfile v3.ext -CA root_cert.pem -CAkey root_key.pem -set_serial 01 -out device_cert.pem -sha256
|
openssl x509 -req -days 18250 -in device_key.pem.csr -extfile v3.ext -CA root_cert.pem -CAkey root_key.pem -set_serial 01 -out device_cert.pem -sha256
|
||||||
@ -119,7 +119,7 @@ First, [Build your solo application and bootloader](/solo/building).
|
|||||||
Print your attestation key in a hex string format. Using our utility script:
|
Print your attestation key in a hex string format. Using our utility script:
|
||||||
|
|
||||||
```
|
```
|
||||||
python tools/print_x_y.py device_key.pem
|
python3 tools/gencert/print_x_y.py device_key.pem
|
||||||
```
|
```
|
||||||
|
|
||||||
Merge the `bootloader.hex`, `solo.hex`, attestion key, and certificate into one firmware file.
|
Merge the `bootloader.hex`, `solo.hex`, attestion key, and certificate into one firmware file.
|
||||||
@ -134,6 +134,8 @@ solo mergehex \
|
|||||||
bundle.hex
|
bundle.hex
|
||||||
```
|
```
|
||||||
|
|
||||||
|
**Warning**: Using the `--lock` flag prevents the DFU from being accessed on the device again. It's recommended to try first without the `--lock` flag to make sure it works.
|
||||||
|
|
||||||
Now you have a newly created `bundle.hex` file with a custom attestation key and cert. You can [program this `bundle.hex` file
|
Now you have a newly created `bundle.hex` file with a custom attestation key and cert. You can [program this `bundle.hex` file
|
||||||
with Solo in DFU mode](/solo/programming#procedure).
|
with Solo in DFU mode](/solo/programming#procedure).
|
||||||
|
|
||||||
|
@ -666,8 +666,8 @@ uint8_t ctap_parse_extensions(CborValue * val, CTAP_extensions * ext)
|
|||||||
if (ret == CborErrorOutOfMemory)
|
if (ret == CborErrorOutOfMemory)
|
||||||
{
|
{
|
||||||
printf2(TAG_ERR,"Error, rp map key is too large. Ignoring.\n");
|
printf2(TAG_ERR,"Error, rp map key is too large. Ignoring.\n");
|
||||||
cbor_value_advance(&map);
|
check_ret( cbor_value_advance(&map) );
|
||||||
cbor_value_advance(&map);
|
check_ret( cbor_value_advance(&map) );
|
||||||
continue;
|
continue;
|
||||||
}
|
}
|
||||||
check_ret(ret);
|
check_ret(ret);
|
||||||
@ -1353,11 +1353,21 @@ uint8_t ctap_parse_client_pin(CTAP_clientPin * CP, uint8_t * request, int length
|
|||||||
break;
|
break;
|
||||||
case CP_getKeyAgreement:
|
case CP_getKeyAgreement:
|
||||||
printf1(TAG_CP,"CP_getKeyAgreement\n");
|
printf1(TAG_CP,"CP_getKeyAgreement\n");
|
||||||
|
if (cbor_value_get_type(&map) != CborBooleanType)
|
||||||
|
{
|
||||||
|
printf2(TAG_ERR,"Error, expecting cbor boolean\n");
|
||||||
|
return CTAP2_ERR_INVALID_CBOR_TYPE;
|
||||||
|
}
|
||||||
ret = cbor_value_get_boolean(&map, &CP->getKeyAgreement);
|
ret = cbor_value_get_boolean(&map, &CP->getKeyAgreement);
|
||||||
check_ret(ret);
|
check_ret(ret);
|
||||||
break;
|
break;
|
||||||
case CP_getRetries:
|
case CP_getRetries:
|
||||||
printf1(TAG_CP,"CP_getRetries\n");
|
printf1(TAG_CP,"CP_getRetries\n");
|
||||||
|
if (cbor_value_get_type(&map) != CborBooleanType)
|
||||||
|
{
|
||||||
|
printf2(TAG_ERR,"Error, expecting cbor boolean\n");
|
||||||
|
return CTAP2_ERR_INVALID_CBOR_TYPE;
|
||||||
|
}
|
||||||
ret = cbor_value_get_boolean(&map, &CP->getRetries);
|
ret = cbor_value_get_boolean(&map, &CP->getRetries);
|
||||||
check_ret(ret);
|
check_ret(ret);
|
||||||
break;
|
break;
|
||||||
|
@ -542,6 +542,9 @@ extern void _check_ret(CborError ret, int line, const char * filename);
|
|||||||
|
|
||||||
uint8_t ctaphid_custom_command(int len, CTAP_RESPONSE * ctap_resp, CTAPHID_WRITE_BUFFER * wb);
|
uint8_t ctaphid_custom_command(int len, CTAP_RESPONSE * ctap_resp, CTAPHID_WRITE_BUFFER * wb);
|
||||||
|
|
||||||
|
|
||||||
|
extern void solo_lock_if_not_already();
|
||||||
|
|
||||||
uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
|
uint8_t ctaphid_handle_packet(uint8_t * pkt_raw)
|
||||||
{
|
{
|
||||||
uint8_t cmd = 0;
|
uint8_t cmd = 0;
|
||||||
@ -762,34 +765,51 @@ uint8_t ctaphid_custom_command(int len, CTAP_RESPONSE * ctap_resp, CTAPHID_WRITE
|
|||||||
return 1;
|
return 1;
|
||||||
break;
|
break;
|
||||||
|
|
||||||
|
// Remove on next release
|
||||||
|
#if !defined(IS_BOOTLOADER) && defined(SOLO)
|
||||||
|
case 0x99:
|
||||||
|
solo_lock_if_not_already();
|
||||||
|
wb->bcnt = 0;
|
||||||
|
ctaphid_write(wb, NULL, 0);
|
||||||
|
return 1;
|
||||||
|
break;
|
||||||
|
#endif
|
||||||
|
|
||||||
#if !defined(IS_BOOTLOADER) && (defined(SOLO_EXPERIMENTAL))
|
#if !defined(IS_BOOTLOADER) && (defined(SOLO_EXPERIMENTAL))
|
||||||
case CTAPHID_LOADKEY:
|
case CTAPHID_LOADKEY:
|
||||||
/**
|
/**
|
||||||
* Load external key. Useful for enabling backups.
|
* Load external key. Useful for enabling backups.
|
||||||
* bytes: 4 96
|
* bytes: 4 4 96
|
||||||
* payload: | counter_increase (BE) | master_key |
|
* payload: version [maj rev patch RFU]| counter_replacement (BE) | master_key |
|
||||||
*
|
*
|
||||||
* Counter should be increased by a large amount, e.g. (0x10000000)
|
* Counter should be increased by a large amount, e.g. (0x10000000)
|
||||||
* to outdo any previously lost/broken keys.
|
* to outdo any previously lost/broken keys.
|
||||||
*/
|
*/
|
||||||
printf1(TAG_HID,"CTAPHID_LOADKEY\n");
|
printf1(TAG_HID,"CTAPHID_LOADKEY\n");
|
||||||
if (len != 100)
|
if (len != 104)
|
||||||
{
|
{
|
||||||
printf2(TAG_ERR,"Error, invalid length.\n");
|
printf2(TAG_ERR,"Error, invalid length.\n");
|
||||||
ctaphid_send_error(wb->cid, CTAP1_ERR_INVALID_LENGTH);
|
ctaphid_send_error(wb->cid, CTAP1_ERR_INVALID_LENGTH);
|
||||||
return 1;
|
return 1;
|
||||||
}
|
}
|
||||||
|
param = ctap_buffer[0] << 16;
|
||||||
|
param |= ctap_buffer[1] << 8;
|
||||||
|
param |= ctap_buffer[2] << 0;
|
||||||
|
if (param != 0){
|
||||||
|
ctaphid_send_error(wb->cid, CTAP2_ERR_UNSUPPORTED_OPTION);
|
||||||
|
return 1;
|
||||||
|
}
|
||||||
|
|
||||||
// Ask for THREE button presses
|
// Ask for THREE button presses
|
||||||
if (ctap_user_presence_test(8000) > 0)
|
if (ctap_user_presence_test(8000) > 0)
|
||||||
if (ctap_user_presence_test(8000) > 0)
|
if (ctap_user_presence_test(2000) > 0)
|
||||||
if (ctap_user_presence_test(8000) > 0)
|
if (ctap_user_presence_test(2000) > 0)
|
||||||
{
|
{
|
||||||
ctap_load_external_keys(ctap_buffer + 4);
|
ctap_load_external_keys(ctap_buffer + 8);
|
||||||
param = ctap_buffer[3];
|
param = ctap_buffer[7];
|
||||||
param |= ctap_buffer[2] << 8;
|
param |= ctap_buffer[6] << 8;
|
||||||
param |= ctap_buffer[1] << 16;
|
param |= ctap_buffer[5] << 16;
|
||||||
param |= ctap_buffer[0] << 24;
|
param |= ctap_buffer[4] << 24;
|
||||||
ctap_atomic_count(param);
|
ctap_atomic_count(param);
|
||||||
|
|
||||||
wb->bcnt = 0;
|
wb->bcnt = 0;
|
||||||
|
@ -1,12 +1,16 @@
|
|||||||
#include "version.h"
|
#include "version.h"
|
||||||
|
|
||||||
|
const version_t firmware_version
|
||||||
|
#ifdef SOLO
|
||||||
|
__attribute__ ((section (".flag"))) __attribute__ ((__used__))
|
||||||
|
#endif
|
||||||
|
= {
|
||||||
|
.major = SOLO_VERSION_MAJ,
|
||||||
|
.minor = SOLO_VERSION_MIN,
|
||||||
|
.patch = SOLO_VERSION_PATCH,
|
||||||
|
.reserved = 0
|
||||||
|
};
|
||||||
|
|
||||||
const version_t firmware_version __attribute__ ((section (".flag"))) __attribute__ ((__used__)) = {
|
|
||||||
.major = SOLO_VERSION_MAJ,
|
|
||||||
.minor = SOLO_VERSION_MIN,
|
|
||||||
.patch = SOLO_VERSION_PATCH,
|
|
||||||
.reserved = 0
|
|
||||||
};
|
|
||||||
|
|
||||||
// from tinycbor, for a quick static_assert
|
// from tinycbor, for a quick static_assert
|
||||||
#include <compilersupport_p.h>
|
#include <compilersupport_p.h>
|
||||||
|
@ -50,7 +50,7 @@ typedef struct {
|
|||||||
uint8_t payload[255 - 10];
|
uint8_t payload[255 - 10];
|
||||||
} __attribute__((packed)) BootloaderReq;
|
} __attribute__((packed)) BootloaderReq;
|
||||||
|
|
||||||
uint8_t * last_written_app_address;
|
uint8_t * last_written_app_address = 0;
|
||||||
|
|
||||||
/**
|
/**
|
||||||
* Erase all application pages. **APPLICATION_END_PAGE excluded**.
|
* Erase all application pages. **APPLICATION_END_PAGE excluded**.
|
||||||
@ -58,7 +58,7 @@ uint8_t * last_written_app_address;
|
|||||||
static void erase_application()
|
static void erase_application()
|
||||||
{
|
{
|
||||||
int page;
|
int page;
|
||||||
last_written_app_address = (uint8_t*) APPLICATION_START_ADDR;
|
last_written_app_address = (uint8_t*) 0;
|
||||||
for(page = APPLICATION_START_PAGE; page < APPLICATION_END_PAGE; page++)
|
for(page = APPLICATION_START_PAGE; page < APPLICATION_END_PAGE; page++)
|
||||||
{
|
{
|
||||||
flash_erase_page(page);
|
flash_erase_page(page);
|
||||||
@ -114,6 +114,10 @@ int is_bootloader_disabled()
|
|||||||
bool is_firmware_version_newer_or_equal()
|
bool is_firmware_version_newer_or_equal()
|
||||||
{
|
{
|
||||||
|
|
||||||
|
if (last_written_app_address == 0) {
|
||||||
|
return false;
|
||||||
|
}
|
||||||
|
|
||||||
printf1(TAG_BOOT,"Current firmware version: %u.%u.%u.%u (%02x.%02x.%02x.%02x)\r\n",
|
printf1(TAG_BOOT,"Current firmware version: %u.%u.%u.%u (%02x.%02x.%02x.%02x)\r\n",
|
||||||
current_firmware_version.major, current_firmware_version.minor, current_firmware_version.patch, current_firmware_version.reserved,
|
current_firmware_version.major, current_firmware_version.minor, current_firmware_version.patch, current_firmware_version.reserved,
|
||||||
current_firmware_version.major, current_firmware_version.minor, current_firmware_version.patch, current_firmware_version.reserved
|
current_firmware_version.major, current_firmware_version.minor, current_firmware_version.patch, current_firmware_version.reserved
|
||||||
|
@ -84,4 +84,5 @@ cbor:
|
|||||||
cd ../../tinycbor/ && make clean
|
cd ../../tinycbor/ && make clean
|
||||||
cd ../../tinycbor/ && make CC="$(CC)" AR=$(AR) \
|
cd ../../tinycbor/ && make CC="$(CC)" AR=$(AR) \
|
||||||
LDFLAGS="$(LDFLAGS_LIB)" \
|
LDFLAGS="$(LDFLAGS_LIB)" \
|
||||||
CFLAGS="$(CFLAGS) -Os"
|
CFLAGS="$(CFLAGS) -Os -DCBOR_PARSER_MAX_RECURSIONS=3"
|
||||||
|
|
||||||
|
@ -199,6 +199,20 @@ int solo_is_locked(){
|
|||||||
return tag == ATTESTATION_CONFIGURED_TAG && (device_settings & SOLO_FLAG_LOCKED) != 0;
|
return tag == ATTESTATION_CONFIGURED_TAG && (device_settings & SOLO_FLAG_LOCKED) != 0;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
// Locks solo flash from debugging. Locks on next reboot.
|
||||||
|
// This should be removed in next Solo release.
|
||||||
|
void solo_lock_if_not_already() {
|
||||||
|
uint8_t buf[2048];
|
||||||
|
|
||||||
|
memmove(buf, (uint8_t*)ATTESTATION_PAGE_ADDR, 2048);
|
||||||
|
|
||||||
|
((flash_attestation_page *)buf)->device_settings |= SOLO_FLAG_LOCKED;
|
||||||
|
|
||||||
|
flash_erase_page(ATTESTATION_PAGE);
|
||||||
|
|
||||||
|
flash_write(ATTESTATION_PAGE_ADDR, buf, 2048);
|
||||||
|
}
|
||||||
|
|
||||||
/** device_migrate
|
/** device_migrate
|
||||||
* Depending on version of device, migrates:
|
* Depending on version of device, migrates:
|
||||||
* * Moves attestation certificate to data segment.
|
* * Moves attestation certificate to data segment.
|
||||||
@ -563,7 +577,11 @@ uint32_t ctap_atomic_count(uint32_t amount)
|
|||||||
return lastc;
|
return lastc;
|
||||||
}
|
}
|
||||||
|
|
||||||
lastc += amount;
|
if (amount > 256){
|
||||||
|
lastc = amount;
|
||||||
|
} else {
|
||||||
|
lastc += amount;
|
||||||
|
}
|
||||||
|
|
||||||
if (lastc/256 > erases)
|
if (lastc/256 > erases)
|
||||||
{
|
{
|
||||||
|
@ -146,12 +146,14 @@ void device_set_clock_rate(DEVICE_CLOCK_RATE param)
|
|||||||
case DEVICE_LOW_POWER_IDLE:
|
case DEVICE_LOW_POWER_IDLE:
|
||||||
SET_CLOCK_RATE0();
|
SET_CLOCK_RATE0();
|
||||||
break;
|
break;
|
||||||
|
#if !defined(IS_BOOTLOADER)
|
||||||
case DEVICE_LOW_POWER_FAST:
|
case DEVICE_LOW_POWER_FAST:
|
||||||
SET_CLOCK_RATE1();
|
SET_CLOCK_RATE1();
|
||||||
break;
|
break;
|
||||||
case DEVICE_FAST:
|
case DEVICE_FAST:
|
||||||
SET_CLOCK_RATE2();
|
SET_CLOCK_RATE2();
|
||||||
break;
|
break;
|
||||||
|
#endif
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user