You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
AFI aims to supply a standard for certifying firmware auditability.
Specification
AFI manifest struct v1:
AFI (manifest) version
source ref (commit hash)
config ref (build config hash, e.g. script with env vars)
output ref (artifact hash)
Add length and type to each ref for flexibility, support multi-hash, signatures, etc, similar to TPM 2.0 log entries.
The refs must be resolvable, can be a QR code etc in a GUI or TUI provided
by OEMs pointing to product URLs if they like, strongly encouraged
by communities pointing to their project website/mainboard docs
Providing sources, schematics and board view files under OSI/CC licenses and adding repository references is encouraged for sustainability and open auditability. At least there must be release notes with accompanying hashes (similar to checksums often found besides file downloads) to verify the AFI hashes against, which is one way to resolve the hashes.
At least one third party must provide a correspondig verification (attestation).
Note: An external verifier reading a firmware image from an offline device is the only actual guarantee to check integrity. Such a verifier could be flashrom plus some extra tool, potentially Fiedka.
The SLSA framework addresses some of those issues a bit more. Key points lie in reasoning:
What does a feature defend against?
How does it do that?
Why does it do it that way?
Note that AFI looks from the perspective of an artifact. Anything defined by SLSA is a precondition. The goal of AFI is to be able to trace back to the origins.
Auditable Firmware Implementation
Goal
AFI aims to supply a standard for certifying firmware auditability.
Specification
AFI manifest struct v1:
Add length and type to each ref for flexibility, support multi-hash, signatures, etc, similar to TPM 2.0 log entries.
The refs must be resolvable, can be a QR code etc in a GUI or TUI provided
Providing sources, schematics and board view files under OSI/CC licenses and adding repository references is encouraged for sustainability and open auditability. At least there must be release notes with accompanying hashes (similar to checksums often found besides file downloads) to verify the AFI hashes against, which is one way to resolve the hashes.
At least one third party must provide a correspondig verification (attestation).
Note: An external verifier reading a firmware image from an offline device is the only actual guarantee to check integrity. Such a verifier could be flashrom plus some extra tool, potentially Fiedka.
The SLSA framework addresses some of those issues a bit more. Key points lie in reasoning:
Note that AFI looks from the perspective of an artifact. Anything defined by SLSA is a precondition. The goal of AFI is to be able to trace back to the origins.
See also
Related Discussions
The text was updated successfully, but these errors were encountered: