Installing Secure Firmware
Securing firmware involves signing both the bootloader and firmware using the ECC Prime256v1 keypair. The keypair’s private key is securely generated and stored on CubePilot's server. Once a signed bootloader is installed, only firmware signed with an authorized public-private key pair can run on the autopilot. Any unsigned firmware will be blocked from being loaded.
Failure to follow the secure firmware installation steps could result in the hardware malfunctioning.
To install the secure bootloader, complete the following steps:
Ensure the ArduPilot firmware build environment is installed using Linux or Windows WSL. For details, refer to the following website: https://ardupilot.org/dev/docs/building-the-code.html
Ensure the latest MAVProxy has been installed. For details, refer to the following website: https://ardupilot.org/mavproxy/docs/getting_started/download_and_installation.html#mavproxy-downloadinstall
Create a branch to develop the firmware locally.
Open Mission Planner.
Click Setup -> Secure.
Click Generate Key to create a public-private key pair.

Build a securely signed bootloader for the autopilot via the instructions in the following link: https://github.com/ArduPilot/ardupilot/tree/master/Tools/scripts/signing

Build a securely signed firmware and load it onto the autopilot via the instructions in the following link: https://github.com/ArduPilot/ardupilot/tree/master/Tools/scripts/signing

Use MAVProxy to flash the securely signed bootloader as the new bootloader.
Verify that the new secure bootloader has been installed.
For more details, refer to the following link: https://ardupilot.org/dev/docs/secure-firmware.html
Last updated
Was this helpful?