Skip to content

Commit

Permalink
specification: Replace hardware RoT with just RoT
Browse files Browse the repository at this point in the history
In that context the RoT does not have to be entirely in HW, as long as
it's a platform RoT.

Fixes #51

Signed-off-by: Samuel Ortiz <sameo@rivosinc.com>
  • Loading branch information
sameo committed Jan 23, 2024
1 parent 413fce5 commit 4d3a46f
Show file tree
Hide file tree
Showing 4 changed files with 35 additions and 37 deletions.
25 changes: 12 additions & 13 deletions specification/04-requirements.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -156,7 +156,7 @@ platform IOMMUs own MSIs. As a consequence, all IOMMUs on a CoVE-IO platform
must provide a domain isolated Register Programming Interface (RPI) that is
exclusively accessible to the TSM.

===== Hardware Root-of-Trust
===== Root-of-Trust

As described in <<PCIe>>, the TSM generates and sets the IDE keys into both the
CoVE-IO PCIe endpoint and its upstream Root Port, for all maintained selective
Expand All @@ -168,28 +168,27 @@ Secured SPDM session. However, there are no architecturally-defined PCIe
protocol for managing Root Port IDE keys.

Instead of adding multiple vendor-specific `IDE_KM` implementations to the TSM,
the TSM relies on the platform hardware Root-of-Trust (HROT) to implement the
`IDE_KM` protocol and abstract the platform specific PCIe RP implementation away
from the TSM. The TSM establishes a Secured SPDM session with the HROT over a
host accessible DOE mailbox, and then sets platform RP IDE keys over that
session.
the TSM relies on the platform Root-of-Trust (ROT) to implement the `IDE_KM`
protocol and abstract the platform specific PCIe RP implementation away from
the TSM. The TSM establishes a Secured SPDM session with the ROT over a host
accessible DOE mailbox, and then sets platform RP IDE keys over that session.

[[IDE_KM_RPT]]
.PCIe Root Port IDE Key Management through Hardware Root-of-Trust
.PCIe Root Port IDE Key Management through Root-of-Trust
image::images/rp_rot_idekm.svg[align="center"]

As a consequence, a CoVE-IO-compliant platform must have at least one PCIe
accessible HROT, with the following requirements:
accessible ROT, with the following requirements:

1. The HROT must support the DOE mechanism
2. The HROT must support Secured SPDM sessions
3. The HROT must support the IDE Key Management protocol
1. The ROT must support the DOE mechanism
2. The ROT must support Secured SPDM sessions
3. The ROT must support the IDE Key Management protocol

===== CoVE-IO Manifest

The TSM must be provisioned with a trusted piece of data describing the required
CoVE-IO platform components. The hardware Root-of-Trust provides the TSM with a
CoVE-IO manifest containing the following pieces of information:
CoVE-IO platform components. The Root-of-Trust provides the TSM with a CoVE-IO
manifest containing the following pieces of information:

Trust anchor:: A list of root certificates that the TSM uses to verify DSM
certificates received through SPDM.
Expand Down
2 changes: 1 addition & 1 deletion specification/05-security_model.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -220,7 +220,7 @@ from the following adversaries:
between a physical device and the untrusted host domain.
- Although the VMM can tamper with the device IDE extended capabilities,
the PCIe root port IDE settings must only be available to a TVM TCB
component, either the TSM or a hardware root-of-trust.
component, either the TSM or the platform Root-of-Trust.

|===

Expand Down
2 changes: 1 addition & 1 deletion specification/07-theory_operations.adoc
Original file line number Diff line number Diff line change
Expand Up @@ -109,7 +109,7 @@ RP DSM role, the RP vendor-specific IDE key management interface is abstracted
by the ROT.

[[IDE_KM_RPT_OP]]
.PCIe Root Port IDE Key Management through Hardware Root-of-Trust
.PCIe Root Port IDE Key Management through Root-of-Trust
image::images/rp_rot_idekm.svg[align="center"]

=== SPDM Transport
Expand Down
Loading

0 comments on commit 4d3a46f

Please sign in to comment.