Disabling default mechanisms #19
Replies: 1 comment
-
Hi, yes due to lack of tasting this is highly probable. For perspective, the long-term plan is to have some kind of "builder" environment, that starts from a specification:
And would then derive (from the app requirements) what cryptography is needed, which implementation to use, and build a firmware bundle out of this. The idea is definitely that the framework is minimalist after compilation, with the idea that firmware "bundles" of Trussed, the apps and the entire runtime are updated atomically (code update, data untouched). A little more specifically, in the current state of Trussed, one should distinguish between "core" cryptographic algorithms (such as SHA256 which is used internally as baseline hash, or ChaCha8Poly1305 which is used as baseline AEAD), "nearly core" algorithms (for Trussed device identity, some kind of signing key and some kind of key agreement key is needed; right now this is either P256 for both, or Ed255/X255 - in principle RSA could be used too), and true "fluff" (like SHA-1 which is pulled in here only for TOTP, which shouldn't even be a "mechanism"). Short term, some kind of testing using e.g. Thoughts? |
Beta Was this translation helpful? Give feedback.
-
Hi, Trussed feature flags seem to be broken - disabling unused mechanisms causes build to fail in a hard-to-fix way.
Without that, Trussed pulls a massive amount of dependencies that are not needed for our project, and cutting them off could save us some kB's.
Beta Was this translation helpful? Give feedback.
All reactions