Skip to content

Latest commit

 

History

History
479 lines (343 loc) · 24.3 KB

File metadata and controls

479 lines (343 loc) · 24.3 KB

Firmware update

This section documents the complete firmware update procedure, enabling secure boot for an existing embedded application.

Updating Microcontroller FLASH

The steps to complete a firmware update with wolfBoot are:

  • Compile the firmware with the correct entry point
  • Sign the firmware
  • Transfer the image using a secure connection, and store it to the secondary firmware slot
  • Trigger the image swap
  • Reboot to let the bootloader begin the image swap

At any given time, an application or OS running on a wolfBoot system can receive an updated version of itself, and store the updated image in the second partition in the FLASH memory.

Update and Rollback

Applications or OS threads can be linked to the libwolfboot library, which exports the API to trigger the update at the next reboot, and some helper functions to access the flash partition for erase/write through the target specific HAL.

Update procedure description

Using the API provided to the application, wolfBoot offers the possibility to initiate, confirm or rollback an update.

After storing the new firmware image in the UPDATE partition, the application should initiate the update by calling wolfBoot_update_trigger(). By doing so, the UPDATE partition is marked for update. Upon the next reboot, wolfBoot will:

  • Validate the new firmware image stored in the UPDATE partition
  • Verify the signature attached against a known public key stored in the bootloader image
  • Swap the content of the BOOT and the UPDATE partitions
  • Mark the new firmware in the BOOT partition as in state STATE_TESTING
  • Boot into the newly received firmware

If the system is interrupted during the swap operation and reboots, wolfBoot will pick up where it left off and continue the update procedure.

Successful boot

Upon a successful boot, the application should inform the bootloader by calling wolfBoot_success(), after verifying that the system is up and running again. This operation confirms the update to a new firmware.

Failing to set the BOOT partition to STATE_SUCCESS before the next reboot triggers a roll-back operation. Roll-back is initiated by the bootloader by triggering a new update, this time starting from the backup copy of the original (pre-update) firmware, which is now stored in the UPDATE partition due to the swap occurring earlier.

Building a new firmware image

Firmware images are position-dependent, and can only boot from the origin of the BOOT partition in FLASH. This design constraint implies that the chosen firmware is always stored in the BOOT partition, and wolfBoot is responsible for pre-validating an update image and copy it to the correct address.

All the firmware images must therefore have their entry point set to the address corresponding to the beginning of the BOOT partition, plus an offset of 256 Bytes to account for the image header.

Once the firmware is compiled and linked, it must be signed using the sign tool. The tool produces a signed image that can be transferred to the target using a secure connection, using the same key corresponding to the public key currently used for verification.

The tool also adds all the required Tags to the image header, containing the signatures and the SHA256 hash of the firmware.

Self-update

wolfBoot can update itself if RAM_CODE is set. This procedure operates almost the same as firmware update with a few key differences. The header of the update is marked as a bootloader update (use --wolfboot-update for the sign tools).

The new signed wolfBoot image is loaded into the UPDATE partition and triggered the same as a firmware update. Instead of performing a swap, after the image is validated and signature verified, the bootloader is erased and the new image is written to flash. This operation is not safe from interruption. Interruption will prevent the device from rebooting.

wolfBoot can be used to deploy new bootloader versions as well as update keys.

Self-header: persisting the bootloader manifest

In a typical wolfBoot deployment the bootloader verifies the application firmware, but no entity verifies the bootloader itself. When an external component — such as a wolfHSM server, or another secure co-processor — needs to measure and authenticate the running bootloader, it must be able to read the bootloader's signed manifest header independently. The self-header feature makes this possible by persisting a copy of the bootloader's manifest header at a dedicated, fixed flash address after every self-update.

This completes the chain of trust:

External verifier  --verifies-->  wolfBoot  -->verifies-->  Application
  (wolfHSM/TPM)                 (self-header)              (BOOT partition)
Configuration options
Build option Required Description
WOLFBOOT_SELF_HEADER=1 Yes Enable the self-header feature
WOLFBOOT_PARTITION_SELF_HEADER_ADDRESS=<addr> Yes Flash address where the header is stored. Must be sector-aligned.
WOLFBOOT_SELF_HEADER_SIZE=<size> No Erase span at the header address. Defaults to IMAGE_HEADER_SIZE. Must be ≥ IMAGE_HEADER_SIZE.
SELF_HEADER_EXT=1 No Store the header in external flash. Requires EXT_FLASH=1.
Flash layout

The self-header occupies its own region in the flash map, separate from the bootloader binary and the firmware partitions:

  Internal flash (example)
  ┌─────────────────────┐  0x00000
  │  wolfBoot           │
  │  (bootloader)       │
  ├─────────────────────┤  WOLFBOOT_PARTITION_BOOT_ADDRESS
  │  BOOT partition     │
  ├─────────────────────┤  WOLFBOOT_PARTITION_UPDATE_ADDRESS
  │  UPDATE partition   │
  ├─────────────────────┤  WOLFBOOT_PARTITION_SWAP_ADDRESS
  │  SWAP partition     │
  ├─────────────────────┤  WOLFBOOT_PARTITION_SELF_HEADER_ADDRESS
  │  Self-header        │  (IMAGE_HEADER_SIZE or WOLFBOOT_SELF_HEADER_SIZE)
  └─────────────────────┘

When SELF_HEADER_EXT=1 is set the self-header is stored in external flash instead. See Flash partitions for more detail on the overall partition layout.

Update flow

During a self-update with WOLFBOOT_SELF_HEADER enabled, the following steps occur:

  1. A new signed bootloader image (created with --wolfboot-update) is placed in the UPDATE partition.
  2. The application triggers the update (e.g. wolfBoot_update_trigger()).
  3. On reboot, wolfBoot validates the new bootloader image — verifying both integrity and signature.
  4. The new bootloader binary is copied to flash, overwriting the old one in-place.
  5. After the firmware copy completes, the manifest header is written to WOLFBOOT_PARTITION_SELF_HEADER_ADDRESS.
  6. The system reboots into the new bootloader.
Runtime verification API

Applications and external verifiers can use the following functions (declared in include/image.h and include/wolfboot/wolfboot.h) when linking against wolfBoot as a library to read and verify the persisted self-header:

  • wolfBoot_get_self_header() — returns a pointer to the persisted header bytes, or NULL if the header is missing or invalid.
  • wolfBoot_get_self_version() — returns the version number stored in the persisted header, or 0 if the header is invalid.
  • wolfBoot_open_self(struct wolfBoot_image *img) — opens the self-header and populates img so that the standard verification functions can be used on it. Returns 0 on success.
  • wolfBoot_open_self_address(struct wolfBoot_image *img, uint8_t *hdr, uint8_t *image) — like wolfBoot_open_self() but accepts explicit header and firmware base addresses. Useful for opening any self-header and image combination.

After opening the image with wolfBoot_open_self(), the caller can verify the bootloader using the standard verification functions:

struct wolfBoot_image img;
if (wolfBoot_open_self(&img) == 0) {
    wolfBoot_verify_integrity(&img);
    wolfBoot_verify_authenticity(&img);
}

NOTE: An application verifying its own integrity and authenticity almost never provides meaningful security.

The self-header feature exists to support verification of an untrusted wolfBoot image by an external entity that has its own independent root of trust, before execution is transferred to wolfBoot. This is intended for platforms where the silicon does not support ROM-based verification of a first-stage bootloader.

A common use case is in automotive multicore systems used with wolfHSM, where an HSM core boots first and is responsible for authenticating and releasing the remaining cores in the system.

Factory programming

At manufacturing time the self-header must be programmed alongside the bootloader binary. Use --header-only with the sign tool to generate a standalone header binary:

tools/keytools/sign --wolfboot-update --header-only wolfboot.bin key.der 1

This produces a wolfboot_v1_header.bin containing only the manifest header. Program it at WOLFBOOT_PARTITION_SELF_HEADER_ADDRESS and the regular signed image at the bootloader origin.

See Signing.md for more detail on the --header-only sign tool option.

Monolithic updates

The self-update mechanism can be used to update both the bootloader and the application firmware in a single operation. Because wolfBoot_self_update() copies fw_size bytes from the update image to ARCH_FLASH_OFFSET, a payload that is larger than the bootloader region will spill into the contiguous BOOT partition, overwriting whatever application image was there previously.

To enable this behavior, set SELF_UPDATE_MONOLITHIC=1 in your build configuration. The payload should be constructed by concatenating the new bootloader binary with the new signed application image and signing the result as a wolfBoot self-update. Note that the user must ensure that padding is supplied such that the header of the new signed app image will be located at an offset of WOLFBOOT_PARTITION_BOOT_ADDRESS from the base of the binary.

The following pseudo-shell-script demonstrates how to use standard CLI tools to build this padded image, where $PRIVATE_KEY, $ARCH_FLASH_OFFSET and $WOLFBOOT_PARTITION_BOOT_ADDRESS are the wolfBoot config variables that correspond to your platform

# Sign your app image as v2 for inclusion in the monolithic payload. This generates test-app/image_v2_signed.bin
tools/keytools/sign test-app/image.bin $(PRIVATE_KEY) 2

# Create padded wolfboot v2 binary file (0xFF fill to exact bootloader region size)
# Bootloader region = $WOLFBOOT_PARTITION_BOOT_ADDRESS - $ARCH_FLASH_OFFSET
dd if=/dev/zero bs=$$(($WOLFBOOT_PARTITION_BOOT_ADDRESS - $ARCH_FLASH_OFFSET)) count=1 2>/dev/null | tr '\000' '\377' > wolfboot_v2_padded.bin
dd if=wolfboot.bin of=wolfboot_v2_padded.bin conv=notrunc 2>/dev/null

# Concatenate padded bootloader v2 + signed app v2 to form the monolithic payload
cat wolfboot_v2_padded.bin test-app/image_v2_signed.bin > monolithic_payload.bin
# Sign the monolithic payload as a wolfBoot self-update v2
tools/keytools/sign --wolfboot-update monolithic_payload.bin $PRIVATE_KEY 2

After the self-update completes, flash looks like:

ARCH_FLASH_OFFSET            WOLFBOOT_PARTITION_BOOT_ADDRESS
     |                                   |
     v                                   v
     [  new bootloader bytes  | padding  |  new signed app image  ]
     <-------- fw_size ------------------------------------------->
Self-header interaction

When WOLFBOOT_SELF_HEADER is enabled, the persisted header retains the fw_size, hash and signature exactly as the signing tool produced them. The hash covers the entire monolithic payload — both the bootloader bytes and the nested application image. Later calls to wolfBoot_open_self() / wolfBoot_verify_integrity() will re-hash fw_size bytes starting at ARCH_FLASH_OFFSET, spanning into the BOOT partition.

Restrictions
  • Not power-fail safe. Like all self-updates, a monolithic update erases the bootloader region and writes in-place. An interruption during the write leaves the device unbootable.

  • Not revertible. There is no swap or rollback mechanism. The old bootloader and application are destroyed during the update.

  • Locks bootloader verification to a specific application version. Because the self-header hash covers the full monolithic image, any independent application update will invalidate the persisted self-header. To maintain a valid self-header, both components must always be updated together as a single monolithic payload.

  • Payload must fit in the UPDATE partition. The signed monolithic image (header + bootloader + signed application) plus the 5-byte pBOOT trailer must not exceed WOLFBOOT_PARTITION_SIZE.

Simulator test

A simulator test is provided in tools/test.mk to exercise this use case:

cp config/examples/sim-self-update-monolithic.config .config
make clean && make
make test-sim-self-update-monolithic

Skipping boot image verification

When wolfBoot is used together with the self-header and monolithic updates features, an external verifier such as wolfHSM can verify the combined bootloader+application payload before wolfBoot runs. In this scenario, wolfBoot's own boot-time verification is redundant and can be skipped as a performance optimization.

Setting WOLFBOOT_SKIP_BOOT_VERIFY=1 in the build configuration disables both the integrity (hash) and authenticity (signature) checks that wolfBoot normally performs on the boot image at startup.

WARNING: This option completely disables boot-time firmware verification. It is only safe to use when ALL of the following conditions are met:

  • The self-header feature is enabled, so the bootloader manifest is persisted alongside the application image
  • Monolithic updates are enabled, so the bootloader and application are always updated together as a single payload
  • An external entity (e.g. an HSM running wolfHSM) is guaranteed to verify the full monolithic payload before wolfBoot boots

Using this option outside of this specific scenario removes all boot-time authenticity and integrity guarantees and is not secure.

Note that this option only affects verification of the boot image at startup. Firmware updates staged in the update partition are still fully verified (signature and integrity) before being installed, regardless of this setting.

Incremental updates (aka: 'delta' updates)

wolfBoot supports incremental updates, based on a specific older version. The sign tool can create a small "patch" that only contains the binary difference between the version currently running on the target and the update package. This reduces the size of the image to be transferred to the target, while keeping the same level of security through public key verification, and integrity due to the repeated check (on the patch and the resulting image).

The format of the patch is based on the mechanism suggested by Bentley/McIlroy, which is particularly effective to generate small binary patches. This is useful to minimize time and resources needed to transfer, authenticate and install updates.

How it works

As an alternative to transferring the entire firmware image, the key tools create a binary diff between a base version previously uploaded and the new updated image.

The resulting bundle (delta update) contains the information to derive the content of version '2' of the firmware, starting from the base version, that is currently running on the target (version '1' in this example), and the reverse patch to downgrade version '2' back to version '1' if something goes wrong running the new version.

Delta update

On the device side, wolfboot will recognize and verify the authenticity of the delta update before applying the patch to the current firmware. The new firmware is rebuilt in place, replacing the content of the BOOT partition according to the indication in the (authenticated) 'delta update' bundle.

Two-steps verification

Binary patches are created by comparing signed firmware images. wolfBoot verifies that the patch is applied correctly by checking for the integrity and the authenticity of the resulting image after the patch.

The delta update bundle itself, containing the patches, is prefixed with a manifest header describing the details for the patch, and signed like a normal full update bundle.

This means that wolfBoot will apply two levels of authentication: the first one when the delta bundle is processed (e.g. when an update is triggered), and the second one every time a patch is applied, or reversed, to validate the firmware image before booting.

These steps are performed automatically by the key tools when using the --delta option, as described in the example.

Confirming the update

From the application perspective, nothing changes from the normal, 'full' update case. Application must still call wolfBoot_success() on the first boot with the updated version to ensure that the update is confirmed.

Failing to confirm the success of the update will cause wolfBoot to revert the patch applied during the update. The 'delta update' bundle also contains a reverse patch, which can revert the update and restore the base version of the firmware.

The diagram below shows the authentication steps and the diff/patch process in both directions (update and roll-back for missed confirmation).

Delta update: details

Incremental update: example

Requirement: wolfBoot is compiled with DELTA_UPDATES=1

Version "1" is signed as usual, as a standalone image:

tools/keytools/sign --ecc256 --sha256 test-app/image.bin wolfboot_signing_private_key.der 1

When updating from version 1 to version 2, you can invoke the sign tool as:

tools/keytools/sign --delta test-app/image_v1_signed.bin --ecc256 --sha256 test-app/image.bin wolfboot_signing_private_key.der 2

Besides the usual output file image_v2_signed.bin, the sign tool creates an additional image_v2_signed_diff.bin which should be noticeably smaller in size as long as the two binary files contain overlapping areas.

This is the delta update bundle, a signed package containing the patches for updating version 1 to version 2, and to roll back to version 1 if needed, after the first patch has been applied.

The delta bundle image_v2_signed_diff.bin can be now transferred to the update partition on the target like a full update image.

At next reboot, wolfBoot recognizes the incremental update, checks the integrity, the authenticity and the versions of the patch. If all checks succeed, the new version is installed by applying the patch on the current firmware image.

If the update is not confirmed, at the next reboot wolfBoot will restore the original base image_v1_signed.bin, using the reverse patch contained in the delta update bundle.

ELF loading

wolfBoot supports loading ELF (Executable and Linkable Format) images via both the RAM update_ram.c and flash update mechanisms.

RAM ELF loading

The wolfBoot RAM loader supports loading ELF images from flash into RAM before booting. When using the RAM loader update_ram.c with WOLFBOOT_ELF defined, wolfBoot will verify the ELF file signature and hash as stored in the boot or update partition, and then load the ELF file into RAM based on the LMA (Load Memory Address) of each section before jumping to the entry point.

Flash ELF loading

The wolfBoot flash loader also supports loading ELF files containing scattered LMA (Load Memory Address) segments to their respective locations in flash. This feature allows firmware images to be distributed as ELF files with sections only containing loadable regions, rather than requiring a contiguous/flat binary image for the entire memory space or image size. The flash elf loading procedure only supports loading ELF file program segments into flash memory with the same access restrictions as the BOOT partition (e.g. will use the same hal_flash/ext_flash functions) and does not support loading sections into RAM.

How it works

When wolfBoot is compiled with WOLFBOOT_ELF_FLASH_SCATTER defined, it includes support for:

  1. Section Loading: During boot or update, wolfBoot:

    • Parses the ELF headers to identify section locations
    • Loads each section into its designated memory address
    • Sets up the proper entry point for execution
    • Verifies the scattered hash after loading
  2. Dual-Layer Verification: wolfBoot performs two distinct integrity checks:

    • Initial verification of the ELF file signature and integrity check (hash) as stored in the boot or update partition
    • A second "scattered hash" verification that re-computes the same image hash as in the manifest header, but computed over the actual loaded segments in their final memory locations (Load Memory Address - LMA) rather than their data in the ELF file
  3. Update Support: The scattered ELF support is transparently integrated with wolfBoot's flash update mechanism:

    • ELF images can be used as update packages
    • The bootloader automatically handles loading and verifying scattered sections during the update process
    • If the scattered hash verification fails after an update, the system can fall back to the previous version

Using Scattered ELF Images

To use scattered ELF images:

  1. Ensure wolfBoot is compiled with WOLFBOOT_ELF and WOLFBOOT_ELF_FLASH_SCATTER
  2. Build your firmware as an ELF file with the desired memory layout
  3. Preprocess the ELF file using squashelf to strip the ELF file to just loadable sections and ensure it is compatible with wolfBoot (if building using wolfBoot's Makefile build system, this step is performed automatically)
  4. Sign the ELF image using the wolfBoot signing tools
  5. Transfer the signed ELF image to the target like any other update

The on boot or during update, the bootloader will automatically perform both layers of verification:

  1. Verifying the signature and hash over the image in the BOOT or UPDATE partition
  2. Computing and verifying the scattered hash after loading sections to their final locations

Note: When using scattered ELF images, ensure that:

  • The ELF file adheres to the ELF file specification and was generated by a toolchain supporting the target architecture
  • All section addresses are within valid executable memory regions and do not overlap with the wolfBoot image, nor the BOOT, UPDATE and SWAP partitions.

Certificate Verification

wolfBoot supports authenticating images using certificate chains instead of raw public keys. in this mode of operation, a certificate chain is included in the image manifest header, and the image is signed with the private key corresponding to the leaf certificate identity (signer cert). On boot, wolfBoot verifies the trust of the certificate chain (and therefore the signer cert) against a trusted root CA stored in the wolfHSM server, and if the chain is trusted, verifies the authenticity of the firmware image using the public key from the image signer certificate.

To use this feature:

  1. Enable the feature in your wolfBoot configuration by defining WOLFBOOT_CERT_CHAIN_VERIFY
  2. When signing firmware, include the certificate chain using the --cert-chain option:
./tools/keytools/sign --rsa2048 --sha256 --cert-chain cert_chain.der test-app/image.bin private_key.der 1

When verifying firmware, wolfBoot will:

  1. Extract the certificate chain from the firmware header
  2. Verify the chain using the pre-provisioned root certificate
  3. Use the public key from the leaf certificate to verify the firmware signature

This feature is particularly useful in scenarios where you want to rotate signing keys without updating the bootloader, as you can simply resign the image with a new key, create a new certificate chain, then update the certificate chain in the firmware header.

Note: Currently, support for certificate verification is limited to use in conjuction with wolfHSM. Fore more information see wolfHSM.md.