This document describes in details how to turn a Nordic nRF52840 board into a working FIDO2 security key.
You will need one the following supported boards:
- Nordic nRF52840-DK development kit. This board is more convenient for development and debug scenarios as the JTAG probe is already on the board.
- Nordic nRF52840 Dongle to have a more practical form factor.
In the case of the Nordic USB dongle, you will also need the following extra hardware:
- a Segger J-Link JTAG probe.
- a TC2050 Tag-Connect programming cable.
- a Tag-Connect TC2050 ARM2010 adaptor
- optionally a Tag-Connect TC2050 retainer clip to keep the spring loaded connector pressed to the PCB.
Although OpenOCD should be supported we encountered some issues while trying to flash a firmware with it. Therefore we suggest at the moment to use a Segger J-Link probe instead.
This guide does not cover how to setup the JTAG probe on your system.
In order to compile and flash a working OpenSK firmware, you will need the following:
- rustup (can be installed with https://rustup.rs/)
- python3 and pip
- the OpenSSL command line tool
The scripts provided in this project have been tested under Linux and OS X. We haven't tested them on Windows and other platforms.
If you just cloned this repository, you need to run the following script (output may differ):
$ ./setup.sh
[-] Applying patch "01-persistent-storage.patch"... DONE.
[-] Applying patch "02-usb.patch"... DONE.
[-] Applying patch "03-app-memory.patch"... DONE.
[-] Applying patch "04-rtt.patch"... DONE.
[-] Applying patch "01-panic_console.patch"... DONE.
[-] Applying patch "02-timer.patch"... DONE.
[-] Applying patch "03-public_syscalls.patch"... DONE.
[-] Applying patch "04-bigger_heap.patch"... DONE.
Signature ok
subject=CN = Google OpenSK CA
Getting Private key
Signature ok
subject=CN = Google OpenSK Hacker Edition
Getting CA Private Key
info: syncing channel updates for 'nightly-2020-01-16-x86_64-unknown-linux-gnu'
nightly-2020-01-16-x86_64-unknown-linux-gnu unchanged - rustc 1.42.0-nightly (3291ae339 2020-01-15)
Requirement already up-to-date: tockloader in /usr/lib/python3/dist-packages/tockloader-1.4.0.dev0-py3.7.egg (1.4.0.dev0)
Requirement already satisfied, skipping upgrade: argcomplete>=1.8.2 in /usr/lib/python3/dist-packages (from tockloader) (1.10.0)
Requirement already satisfied, skipping upgrade: colorama>=0.3.7 in /usr/lib/python3/dist-packages (from tockloader) (0.3.7)
Requirement already satisfied, skipping upgrade: crcmod>=1.7 in /usr/lib/python3/dist-packages (from tockloader) (1.7)
Requirement already satisfied, skipping upgrade: pyserial>=3.0.1 in /usr/lib/python3/dist-packages (from tockloader) (3.4)
Requirement already satisfied, skipping upgrade: pytoml>=0.1.11 in /usr/lib/python3/dist-packages (from tockloader) (0.1.21)
info: component 'rust-std' for target 'thumbv7em-none-eabi' is up to date
Updating crates.io index
Ignored package `elf2tab v0.4.0` is already installed, use --force to override
The script performs the following steps:
-
Make sure that the git submodules are checked out
-
Apply our patches that haven't yet been merged upstream to both Tock and libtock-rs
-
Generate a self-signed certificate authority as well as a private key and a corresponding certificate for your OpenSK key signed by this CA. You will be able to replace them with your own certificate and private key.
-
Ensure that your Rust toolchain is using the same version that we tested OpenSK with.
-
Install tockloader.
-
Ensure that the Rust toolchain can compile code for ARM devices.
All the generated certificates and private keys are stored in the directory
crypto_data/
.
This is the expected content after running our setup.sh
script:
File | Purpose |
---|---|
opensk_ca.csr |
Certificate sign request for the Root CA |
opensk_ca.key |
ECC secp256r1 private key used for the Root CA |
opensk_ca.pem |
PEM encoded certificate of the Root CA |
opensk_ca.srl |
File generated by OpenSSL |
opensk_cert.csr |
Certificate sign request for the attestation certificate |
opensk_cert.pem |
PEM encoded certificate used for the authenticator |
opensk.key |
ECC secp256r1 private key used for the autenticator |
If you want to use your own attestation certificate and private key, simply
replace opensk_cert.pem
and opensk.key
files.
Our build script is responsible for converting opensk_cert.pem
and
opensk.key
files into the following Rust file: src/ctap/key_material.rs
.
-
Connect a micro USB cable to the JTAG USB port.
-
Run our script for compiling/flashing your device (output may differ):
$ board=nrf52840dk ./deploy.sh app os make: Entering directory './third_party/tock/boards/nordic/nrf52840dk' Compiling kernel v0.1.0 (./third_party/tock/kernel) Compiling cortexm v0.1.0 (./third_party/tock/arch/cortex-m) Compiling nrf5x v0.1.0 (./third_party/tock/chips/nrf5x) Compiling capsules v0.1.0 (./third_party/tock/capsules) Compiling cortexm4 v0.1.0 (./third_party/tock/arch/cortex-m4) Compiling nrf52 v0.1.0 (./third_party/tock/chips/nrf52) Compiling nrf52840 v0.1.0 (./third_party/tock/chips/nrf52840) Compiling components v0.1.0 (./third_party/tock/boards/components) Compiling nrf52dk_base v0.1.0 (./third_party/tock/boards/nordic/nrf52dk_base) Compiling nrf52840dk v0.1.0 (./third_party/tock/boards/nordic/nrf52840dk) Finished release [optimized + debuginfo] target(s) in 11.28s text data bss dec hex filename 114688 1760 260384 376832 5c000 target/thumbv7em-none-eabi/release/nrf52840dk tockloader flash --address 0x00000 --jlink --board nrf52dk target/thumbv7em-none-eabi/release/nrf52840dk.bin [STATUS ] Flashing binar(y|ies) to board... [INFO ] Using known arch and jtag-device for known board nrf52dk [INFO ] Finished in 0.324 seconds make: Leaving directory './third_party/tock/boards/nordic/nrf52840dk' [STATUS ] Preparing to uninstall apps... [INFO ] Using known arch and jtag-device for known board nrf52dk [ERROR ] No apps are installed on the board Compiling libtock v0.1.0 (./third_party/libtock-rs) Compiling crypto v0.1.0 (./libraries/crypto) Compiling ctap2 v0.1.0 (.) Finished release [optimized] target(s) in 7.60s [STATUS ] Flashing binar(y|ies) to board... [INFO ] Using known arch and jtag-device for known board nrf52dk [INFO ] Finished in 0.305 seconds [STATUS ] Installing app on the board... [INFO ] Using known arch and jtag-device for known board nrf52dk [INFO ] Finished in 0.975 seconds
-
Connect a micro USB cable to the device USB port.
Note: Due to current limitations of our implementation and Tock, you may
have to press the BOOT/RESET
button, located next to the device USB port on
the board in order to see your OpenSK device on your system.
-
The JTAG probe used for programming won't provide power to the board. Therefore you will need to use a USB-A extension cable to power the dongle through its USB port.
-
Connect the TC2050 cable to the pads below the PCB:
-
You can use the retainer clip if you have one to avoid maintaining pressure between the board and the cable:
-
Run our script for compiling/flashing your device (output may differ):
$ board=nrf52840_dongle ./deploy.sh app os make: Entering directory './third_party/tock/boards/nordic/nrf52840_dongle' Compiling kernel v0.1.0 (./third_party/tock/kernel) Compiling cortexm v0.1.0 (./third_party/tock/arch/cortex-m) Compiling nrf5x v0.1.0 (./third_party/tock/chips/nrf5x) Compiling capsules v0.1.0 (./third_party/tock/capsules) Compiling cortexm4 v0.1.0 (./third_party/tock/arch/cortex-m4) Compiling nrf52 v0.1.0 (./third_party/tock/chips/nrf52) Compiling nrf52840 v0.1.0 (./third_party/tock/chips/nrf52840) Compiling components v0.1.0 (./third_party/tock/boards/components) Compiling nrf52dk_base v0.1.0 (./third_party/tock/boards/nordic/nrf52dk_base) Compiling nrf52840_dongle v0.1.0 (./third_party/tock/boards/nordic/nrf52840_dongle) Finished release [optimized + debuginfo] target(s) in 10.47s text data bss dec hex filename 110592 1688 252264 364544 59000 target/thumbv7em-none-eabi/release/nrf52840_dongle tockloader flash --address 0x00000 --jlink --board nrf52dk target/thumbv7em-none-eabi/release/nrf52840_dongle.bin [STATUS ] Flashing binar(y|ies) to board... [INFO ] Using known arch and jtag-device for known board nrf52dk [INFO ] Finished in 0.296 seconds make: Leaving directory './third_party/tock/boards/nordic/nrf52840_dongle' [STATUS ] Preparing to uninstall apps... [INFO ] Using known arch and jtag-device for known board nrf52dk [ERROR ] No apps are installed on the board Compiling libtock v0.1.0 (./third_party/libtock-rs) Compiling crypto v0.1.0 (./libraries/crypto) Compiling ctap2 v0.1.0 (.) Finished release [optimized] target(s) in 7.60s [STATUS ] Flashing binar(y|ies) to board... [INFO ] Using known arch and jtag-device for known board nrf52dk [INFO ] Finished in 0.317 seconds [STATUS ] Installing app on the board... [INFO ] Using known arch and jtag-device for known board nrf52dk [INFO ] Finished in 0.902 seconds
-
Remove the programming cable and the USB-A extension cable.
By default on Linux, a USB device will require root privilege in order interact
with it. As it is not recommended to run your web browser with such a high
privileged account, we made a udev
rule file to allow regular users to
interact with OpenSK authenticators.
To install it, you need to execute the following commands:
sudo cp rules.d/55-opensk.rules /etc/udev/rules.d/
sudo udevadm control --reload
Then, you will need to unplug and replug the key for the rule to trigger.