Skip to content

fix: bump bootloader version to 1.0.2 for key rotation#27

Open
k9ert wants to merge 1 commit intocryptoadvance:masterfrom
k9ert:kn/bump-bootloader-version
Open

fix: bump bootloader version to 1.0.2 for key rotation#27
k9ert wants to merge 1 commit intocryptoadvance:masterfrom
k9ert:kn/bump-bootloader-version

Conversation

@k9ert
Copy link
Copy Markdown
Contributor

@k9ert k9ert commented Mar 22, 2026

Summary

  • Bumps bootloader version tag from 1.0.1 (0100000199) to 1.0.2 (0100000299)
  • Fixes the v1.10.0 → v1.10.1 upgrade failure ("Not enough signatures")

Problem

The startup code selects between two bootloader copies based on the ICR version — highest wins, ties go to copy 1. When v1.10.0 writes the new bootloader (with rotated signing keys) to the inactive slot, both copies end up at version 1.0.1. The startup code keeps running copy 1 (old keys), so v1.10.1 signed with the new keys fails signature verification.

Full analysis: cryptoadvance/specter-diy#330 (comment)

Test plan

  • Rebuild bootloader with this change
  • Regenerate v1.10.0 upgrade binary with the new bootloader
  • Verify upgrade path: v1.9.0 → v1.10.0 → v1.10.1 via SD card
  • Confirm "Bootloader: 1.0.1 → 1.0.2" on upgrade complete screen

🤖 Generated with Claude Code

The bootloader version was 1.0.1, same as the version shipped with
v1.9.0. When the v1.10.0 upgrade writes the new bootloader (with
rotated signing keys) to the inactive copy slot, the startup code
never swaps to it because both copies have version 1.0.1 and ties
go to copy 1 (the old one). This causes subsequent upgrades signed
with the new keys to fail with "Not enough signatures".

Bumping to 1.0.2 ensures the startup code selects the new copy
after the v1.10.0 upgrade.

See: cryptoadvance/specter-diy#330

Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant