!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

174 Members
42 Servers

Load older messages


SenderMessageTime
27 Feb 2023
@elvishjerricco:matrix.orgElvishJerricco You mean you don't need to wait? The key is stored so it needn't be derived 21:23:16
@baloo_:matrix.orgbalooyeah, sorry21:23:29
@elvishjerricco:matrix.orgElvishJerriccoyea that's one upside. The other is that people who don't have owner auth can still use the TPM for some stuff21:24:12
@baloo_:matrix.orgbaloowhen creating a subkey, you feed in a template and tpm uses that as input parameter to do key derivation. Which takes 800ms for an RSA 2048bits or so.21:24:20
@elvishjerricco:matrix.orgElvishJerriccoright21:24:33
@elvishjerricco:matrix.orgElvishJerriccolike disk encryption; with the SRK, you don't need owner auth to do disk encryption21:25:15
@baloo_:matrix.orgbaloowhich isn't necessarily a good thing21:25:30
@elvishjerricco:matrix.orgElvishJerriccoI guess if you don't want that then you can just not create the SRK :P21:25:57
@elvishjerricco:matrix.orgElvishJerriccoor create it so it requires auth to use21:26:04
@baloo_:matrix.orgbalooyeah, you can attach a policy or an auth to an SRK21:27:37
@aktaboot:tchncs.deaktaboot joined the room.23:40:30
1 Mar 2023
@fabianhjr:matrix.orgFabián Heredia changed their display name from fabianhjr to Fabián Heredia.06:05:13
@js:ukvly.orgJulian Stecklina (Old)https://kb.cert.org/vuls/id/78272009:17:06
@js:ukvly.orgJulian Stecklina (Old)That's pretty bad09:17:17
@js:ukvly.orgJulian Stecklina (Old)"... arbitrary code execution within the TPM ..."09:18:16
@raitobezarius:matrix.orgraitobezariusIn the spec! Beautiful10:10:59
@grahamc:nixos.org@grahamc:nixos.orgstunning13:14:34
@grahamc:nixos.org@grahamc:nixos.orgis it actually in the spec, or in a reference implementation?13:15:39
@raitobezarius:matrix.orgraitobezariusI read it as "in the spec"13:16:13
@raitobezarius:matrix.orgraitobezarius

Apply an update The Trusted Computing Group (TCG) has released an update to their Errata for TPM2.0 Library Specification with instructions to address these vulnerabilities.

13:16:14
@raitobezarius:matrix.orgraitobezariusAlso, they did find the vuln I think in some implems13:17:19
@grahamc:nixos.org@grahamc:nixos.orgIm trying to find a diff of the spec ...13:17:22
@raitobezarius:matrix.orgraitobezariushttps://trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-Library-Spec-v1.59-Errata-v1.4_pub.pdf13:17:44
@raitobezarius:matrix.orgraitobezariusVersion 1.413:17:46
@grahamc:nixos.org@grahamc:nixos.orgah nice, I was only finding the full reference13:18:01
@raitobezarius:matrix.orgraitobezariusimage.png
Download image.png
13:18:05
@raitobezarius:matrix.orgraitobezarius2.6.1, 2.6.2, 2.6.313:18:10
@raitobezarius:matrix.orgraitobezariusIt's indeed the "reference code" provided in the specification13:18:27
@grahamc:nixos.org@grahamc:nixos.orgah, ok, cool, so the code is in the spec, but as a reference and not actually the rules of how a tpm must operate13:18:53
@raitobezarius:matrix.orgraitobezariusYeah, it's not protocol-level vuln I suppose13:19:03

Show newer messages


Back to Room ListRoom Version: 6