Raspiblitz: Security: How to verify the EEPROM of the RPI4?

Created on 9 Oct 2019  路  2Comments  路  Source: rootzoll/raspiblitz

As Damian brought to our attention the RPi4 has a writable 512 KB EEPROM which can be tampered with: https://twitter.com/meeDamian/status/1179052293053792256
From the docs (https://www.raspberrypi.org/documentation/hardware/raspberrypi/booteeprom.md):

There is no software write protection for the boot EEPROM but there will be a mechanism in Raspbian to skip any future updates to the EEPROM.

How could we verify what is there?
also:

Note that if a bootcode.bin is present in the boot partition of the SD card in a Pi 4, it is ignored.

The Raspbian images contain a bootcode.bin so the EEPROM should be ignored when it is present.
EDIT: it rather seems that the RPi4 is always booting from the EEPROM regardless of the SDcard content.

Discussed in the RPi forum too: https://www.raspberrypi.org/forums/viewtopic.php?f=66&t=253843

Most helpful comment

Now there is a sha256 hash provided for the RPi4 bootloader image:

image

Will need to either reflash the boards with the verified image or find the way to clone it from the bootloader and check the hash.

All 2 comments

There is a recovery image provided with which the EEPROM can be updated if in doubt: https://www.raspberrypi.org/downloads/
Unfortunately I could not yet find a signature to verify it`s content let alone verifying the EEPROM without flashing.

Now there is a sha256 hash provided for the RPi4 bootloader image:

image

Will need to either reflash the boards with the verified image or find the way to clone it from the bootloader and check the hash.

Was this page helpful?
0 / 5 - 0 ratings