mirror of https://github.com/duggerd/KFDtool.git
DOC: Add manual; fixes #1
This commit is contained in:
parent
08ee4287d9
commit
7a1bf8a818
16
README.md
16
README.md
|
@ -10,20 +10,9 @@ Download Software: [latest release](https://github.com/KFDtool/KFDtool/releases)
|
|||
|
||||
Demonstration: [video](https://www.youtube.com/watch?v=Oioa3xTQoE0)
|
||||
|
||||
Disclaimer
|
||||
----------
|
||||
Software Manual: [view](doc/KFDtool_Manual.pdf)
|
||||
|
||||
The KFDtool as a computer peripheral has several important considerations to keep in mind when secure keyloading is required:
|
||||
|
||||
* The following points are only valid with unmodified software, firmware, and hardware. With physical access to the PC or adapter, the software, firmware, or hardware could be modified to covertly retain the plaintext keying material.
|
||||
|
||||
* Plaintext keying material is present in the PC's RAM, over the USB connection, in the adapter's RAM, and over the keyload connection. Therefore, you must trust the PC that the software is running on, or air gap it.
|
||||
|
||||
* It is possible that plaintext keying material in the PC's RAM is paged out to disk. It is also possible that Windows crash dumps may contain plaintext keying material. Therefore, it is recommended that the PC's hard drive is protected using full disk encryption such as BitLocker and powered off when unattended.
|
||||
|
||||
* After the KFDtool adapter has been disconnected from the USB port, any residual plaintext keying material present in the microcontroller's RAM will be lost.
|
||||
|
||||
* When certain non-default logging is enabled, plaintext keying material is written out to the log file on disk. This logging should only be enabled when diagnostic information needs to be collected, and only used with dummy keying material.
|
||||
Security Considerations: [view](doc/SECURITY_CONSIDERATIONS.md)
|
||||
|
||||
Features
|
||||
--------
|
||||
|
@ -124,6 +113,7 @@ Documentation
|
|||
* [TWI Cable Assembly Notes](doc/TWI_CABLE_ASSY_NOTES.md)
|
||||
* [MX Connector Modification Notes](doc/MX_CONN_MOD_NOTES.md)
|
||||
* [Developer Notes](doc/DEV_NOTES.md)
|
||||
* [Security Considerations](doc/SECURITY_CONSIDERATIONS.md)
|
||||
|
||||
Contributors
|
||||
------------
|
||||
|
|
Binary file not shown.
Binary file not shown.
|
@ -0,0 +1,25 @@
|
|||
# Security Considerations
|
||||
|
||||
* The KFDtool as a computer peripheral has several important considerations to keep in mind when secure keyloading is required.
|
||||
* What this means
|
||||
* Because the KFDtool keyloader is made up of a USB peripheral and software for use on a Windows PC, precautions have to be taken to preserve the integrity of the encryption keys due to the complex nature of the systems involved.
|
||||
|
||||
* The following points are only valid with unmodified software, firmware, and hardware. With physical access to the PC or adapter, the software, firmware, or hardware could be modified to covertly retain the plaintext keying material.
|
||||
* What this means
|
||||
* With physical access to the KFDtool adapter or computer running the KFDtool software, someone could modify them in a way to record or transmit the encryption keys without your knowledge. Therefore, you should physically secure the KFDtool adapter and the computer used for keyloading.
|
||||
|
||||
* Plaintext keying material is present in the PC's RAM, over the USB connection, in the adapter's RAM, and over the keyload connection. Therefore, you must trust the PC that the software is running on, or air gap it.
|
||||
* What this means
|
||||
* If the computer you use for keyloading is connected to a network, it is possible that the encryption keys could be accessed without your knowledge due to vulnerabilities in Windows or other software installed on your computer. Therefore, it is recommended that you use a computer that is not connected to any networks, and that you only install software and connect devices to it that you trust.
|
||||
|
||||
* It is possible that plaintext keying material in the PC's RAM is paged out to disk. It is also possible that Windows crash dumps may contain plaintext keying material. Therefore, it is recommended that the PC's hard drive is protected using full disk encryption such as BitLocker and powered off when unattended.
|
||||
* What this means
|
||||
* Windows is a complex operating system, and there are many ways for the encryption keys to end up on the hard drive without your knowledge. Therefore, encrypting the hard drive of the computer you use for keyloading is a good idea as it provides another layer of security against unauthorized users accessing the encryption keys without your knowledge.
|
||||
|
||||
* After the KFDtool adapter has been disconnected from the USB port, any residual plaintext keying material present in the microcontroller's RAM will be lost.
|
||||
* What this means
|
||||
* When unplugging the KFDtool adapter from the computer, any encryption keys are lost due to the memory type used. The KFDtool adapter by design does not store any encryption keys.
|
||||
|
||||
* When certain non-default logging is enabled, plaintext keying material is written out to the log file on disk. This logging should only be enabled when diagnostic information needs to be collected, and only used with dummy keying material.
|
||||
* What this means
|
||||
* There are options in the KFDtool software configuration files that can be set to write detailed information to the hard drive for use to diagnose issues. If you are directed to change these files to enable logging to diagnose an issue, understand that the keys you use may be included in these logs. Therefore, you should not use your production keys when collecting these logs.
|
Loading…
Reference in New Issue