grub-devel
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [PATCH v19 33/33] docs: Document TPM2 key protector


From: Stefan Berger
Subject: Re: [PATCH v19 33/33] docs: Document TPM2 key protector
Date: Fri, 20 Sep 2024 09:42:01 -0400
User-agent: Mozilla Thunderbird



On 9/20/24 4:16 AM, Gary Lin wrote:
On Fri, Sep 13, 2024 at 10:25:14AM -0400, Stefan Berger wrote:



+SHA1, SHA256, SHA384, and SHA512, and the default is SHA256.
+
+There are some options only available for the specific mode. The SRK-specific
+options are @option{-T}, @option{-k}, @option{-a}, and @option{-s}. On the
+other hand, the NV index-specific option is @option{-n}.
+
+The key file for SRK mode can be supplied with either @option{-T} or
+@option{-k}. The @option{-T} option is for the path to the key file in
+the TPM 2.0 Key File format. Since the parameters for the TPM commands are
+written in the policy sequences, there is no need to set the PCR

What is 'the policy sequences' ?

It's the TPMPolicy sequence which contains the command code and the
parameters.

So sequence is an ASN.1 sequence? 0x30 iirc. I think people will have a hard time understanding this. You have to describe this in some other way without the word 'policy sequence'.


https://www.hansenpartnership.com/draft-bottomley-tpm2-keys.html#name-tpmpolicy-syntax


When I looked through the patches I did not see anything particularly
related to EFI. Is it only available on EFI and EMU platforms because you
did not test it with a (Sea)BIOS for example ? I was actually going to try
it on PPC64 on KVM that has SLOF firmware.

It's related to the tcg2 functions defined in grub-core/lib/tss2/tcg2.h.
Currently, there is only two implementations:

EFI: grub-core/lib/efi/tcg2.c
EMU: grub-core/lib/tss2/tcg2_emu.c

Right. I have a version of ieee1275 powerpc now.


+reads the TPM eventlog and predicts the PCR values. Besides,
+@command{pcr-oracle} also supports ``authorized policy'' which allows the
+PCR policy to be updated with a valid signature, so that the user only
+needs to seal the random disk key once and then updates the signature
+of PCR policy for the later changes.

... and then the user needs to update the signature of the PCR policy for
the later changes. (?)

I am not sure what this means though in practice.

The random disk key is first sealed with the user's public key, and then
the user signs the 'policy', i.e. the hash of the PCR hashes, and
appends the signature into the key file as the parameter for
TPM2_PolicyAuthorize. For the later PCR changes, the user only
needs to sign the new policy and update the signature.

https://www.hansenpartnership.com/draft-bottomley-tpm2-keys.html#name-tpm2_policyauthorize

How about rewriting the paragragh like this:

@command{pcr-oracle} also supports ``authorized policy'' which allows the
PCR policy to be updated with a valid signature, so that the user only seals
the random disk key once. For the later changes, the user just needs to
update the signature of PCR policy.

You have to describe what you mean with 'the later changes'. Something like this maybe:

If at some later time the PCR values change due to an updated of the system's firmware, the user just need to ... ??



reply via email to

[Prev in Thread] Current Thread [Next in Thread]