*** Please note that this reply is generated by LLM automatically ***
I’ll address each of your questions (Q1, Q2, and Q3) regarding the UEFI firmware and Secure Boot process on NVIDIA Jetson devices.
Q1: Is the UEFI Firmware blob itself not verified? It isn’t signed.
According to the provided context, the UEFI firmware itself is not directly verified by the solution provider’s fused PKC (Public Key Cryptography). Instead, the MB2 ( Bootloader) uses a built-in public key to verify the PV (Platform Vendor) authenticate key for key verification and signature authentication. This allows the platform vendor to independently sign and update the UEFI image without involving the solution provider.
However, when using the UEFI Platform Vendor Key feature, the UEFI firmware can be signed and encrypted by the platform vendor-owned keys. This implies that the UEFI firmware itself can be verified, but only through the platform vendor’s keys, not the solution provider’s fused PKC.
Q2: Is this feature (UEFI Platform Vendor Key) the only way to actually sign and encrypt the UEFI firmware itself?
Based on the provided context, the UEFI Platform Vendor Key feature is the only mentioned way to sign and encrypt the UEFI firmware itself. This feature allows the platform vendor to deploy UEFI firmware that is signed and encrypted by their own keys, without involving the solution provider.
Q3: I am not working with a 3rd party, but would like MB2 to verify the UEFI firmware. Is this the correct feature to use?
If you want MB2 to verify the UEFI firmware, the UEFI Platform Vendor Key feature is the correct feature to use. This feature allows the platform vendor (in this case, you) to sign and encrypt the UEFI firmware, which can then be verified by MB2 using the platform vendor-owned keys.
To summarize:
- Secure Boot Fuses: verify the signature of components before UEFI using the solution provider’s fused PKC.
- UEFI Platform Vendor Key: sign and encrypt the UEFI firmware using platform vendor-owned keys, which can be verified by MB2.
- UEFI Secure Boot: verify the signatures of payloads.
By using the UEFI Platform Vendor Key feature, you can ensure that the UEFI firmware is signed and encrypted, and its signature can be verified by MB2.
*** Please give the thumbs up if you get answers you like. Or provide feedback to help us improve the answer. ***