Garrett: A short introduction to TPMs
I've been working on TPMs lately. It turns out that they're moderately awful, but what's significantly more awful is basically all the existing documentation. So here's some of what I've learned, presented in the hope that it saves someone else some amount of misery."
Posted May 8, 2013 4:45 UTC (Wed)
by cmrx64 (guest, #89304)
[Link] (1 responses)
He's a good sport about it though. Must be lots of alcohol involved.
Posted May 14, 2013 14:11 UTC (Tue)
by ortalo (guest, #4654)
[Link]
Now that he has looked at TPM, I'd really like him to give a hand at smartcards and their usage in Linux for authentication. Especially the OpenPGP card. Especially him and one of these cards for securing the system boot process (on a physically controlled computer). Wow, it would make such an informed comparison of techniques...
I know I am abusing. (Should good will be abused? On the contrary of alcohol...) However, I would happily share a few good additional bottles of wine in case there's a need, possibly even complemented by the solid substances needed to support it. (But I am living in a region that usually makes such offers noteworthy.)
Posted May 8, 2013 10:38 UTC (Wed)
by kbengston (guest, #6153)
[Link] (5 responses)
Posted May 8, 2013 10:49 UTC (Wed)
by lindi (subscriber, #53135)
[Link]
Posted May 8, 2013 20:59 UTC (Wed)
by rahvin (guest, #16953)
[Link] (2 responses)
Posted May 8, 2013 22:16 UTC (Wed)
by Cyberax (✭ supporter ✭, #52523)
[Link]
I've used them in past (in medical industry) for remote attestation on trusted boots to make sure that servers are physically secure.
Posted May 8, 2013 22:17 UTC (Wed)
by luto (guest, #39314)
[Link]
The ChromeOS people have a project called "trunks" that's rather special-purpose but avoids relying on trousers.
Shameless plug: My tpmkey project has been languishing. Eventually I'll spruce it up and make it awesome. Anyone want to help?
Posted May 16, 2013 12:10 UTC (Thu)
by phred14 (guest, #60633)
[Link]
I've been interested for some time now about actually using one of these TPMs for my own security purposes. One of these days, maybe...
Garrett: A short introduction to TPMs
Garrett: A short introduction to TPMs
So few TPM users
So few TPM users
So few TPM users
So few TPM users
The relevant data is freely available. I've used it, and it's actually not completely awful. What is rather awful is the officially sanctioned API between the various components of the software stack (e.g. TSPI). What's even worse is the undocumented TCP-based protocol that client software uses to talk to the trousers daemon.
So few TPM users
So few TPM users
