[Ovmsdev] Request For Comment: Protection of Sensitive Information on the Vehicle Module

Mark Webb-Johnson mark at webb-johnson.net
Mon Aug 7 14:17:53 HKT 2017


I’ve received both this suggestion, as well as one to offer two different versions of the module (one with flash encryption enabled and one without).

I am going to experiment with this, to see if we can run signed firmware on devices with no flash encryption enabled. If that is the case, we could probably reasonably easily provide the modules encryption-ready, with just a simple utility to actually enable it. Then, OTA updates wouldn’t care which version of device they would be run on.

Regards, Mark.

> On 4 Aug 2017, at 1:08 AM, Michael Balzer <dexter at expeedo.de> wrote:
> 
> 
> Am 03.08.2017 um 05:53 schrieb Mark Webb-Johnson:
>> A public key is stored in a write-once eFuse.
>> A matching private key is used to sign programs to be downloaded to the system.
> 
> How about shipping unprotected and adding a simple utility to create and burn an individual key pair?
> 
> Users who want to protect the module would then just do their own code signing.
> 
> Regards,
> Michael
> 
> -- 
> Michael Balzer * Helkenberger Weg 9 * D-58256 Ennepetal
> Fon 02333 / 833 5735 * Handy 0176 / 206 989 26
> _______________________________________________
> OvmsDev mailing list
> OvmsDev at lists.teslaclub.hk
> http://lists.teslaclub.hk/mailman/listinfo/ovmsdev

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.openvehicles.com/pipermail/ovmsdev/attachments/20170807/0bab4c95/attachment.htm>


More information about the OvmsDev mailing list