Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Client Application Authentication via OPTEE #3092

Closed
dashemsec opened this issue Jun 18, 2019 · 3 comments
Closed

Client Application Authentication via OPTEE #3092

dashemsec opened this issue Jun 18, 2019 · 3 comments

Comments

@dashemsec
Copy link
Contributor

Hi,
Currently Do we have any mechanism in OPTEE, to authenticate that the CA requested for the TEE service is from a correct source?
Say, we have a private key stored in the secure storage area. Each persistent object is designated by its object name. So, any malware CA can trick the TA to operate on that object.

How to ensure that the CA is not a malware and the genuine one?

@jbech-linaro
Copy link
Contributor

Hi @dashemsec

I'm afraid that the answer as of today is that you cannot ensure that the CA is not rouge application. The trust model for the TEE is that we don't trust anything coming from the non-secure side. What makes that extra interesting is that most of the data being handled in the TEE/TA is indeed coming from the non-secure side in one or another way.

If data is coming from somewhere outside the device itself, then you can have some handshake protocol exchanging keys and do authentication a bit more easy. But for local application running on the device we have no good way of authenticating the CA app.

As @jonsmirl mentioned in another thread, this is indeed an issue in many cases and he proposed SE Linux. That's one step in the right direction, but based on the track record of root exploits in Linux then I'd say it's better than nothing, but probably not worth that much.

If you have any ideas how to make this better, then please let us know, since we would like to improve this situation in one or another way.

@jbech-linaro
Copy link
Contributor

I'm closing the ticket, either because it has already been answered or that it is no longer relevant or it could be lack of response from the author. Having that said, feel free to re-open the ticket if you have more to add to the ticket.

@dashemsec
Copy link
Contributor Author

Hi @jbech-linaro ,
I have done a PoC related to CA authentication.
Please review the issue page: #3407

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants