!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

182 Members
48 Servers

Load older messages


SenderMessageTime
27 Feb 2023
@elvishjerricco:matrix.orgElvishJerriccoMinor clarification, when creating a key, you choose if it needs authorization to create child keys. It would seem the SRK is expected to be created without any authorization requirement for creating children. I think.21:20:40
@elvishjerricco:matrix.orgElvishJerriccobut of course root keys always need the authorization of the hierarchy21:21:06
@elvishjerricco:matrix.orgElvishJerricco * but of course creating root keys always needs the authorization of the hierarchy21:21:22
@baloo_:matrix.orgbalooupside of SRK, the key gets stored in the TPM, and you need to wait a couple seconds to do a key derivation from the root secret.21:21:33
@elvishjerricco:matrix.orgElvishJerricco You mean you don't need to wait? The key is stored so it needn't be derived 21:23:16
@baloo_:matrix.orgbalooyeah, sorry21:23:29
@elvishjerricco:matrix.orgElvishJerriccoyea that's one upside. The other is that people who don't have owner auth can still use the TPM for some stuff21:24:12
@baloo_:matrix.orgbaloowhen creating a subkey, you feed in a template and tpm uses that as input parameter to do key derivation. Which takes 800ms for an RSA 2048bits or so.21:24:20
@elvishjerricco:matrix.orgElvishJerriccoright21:24:33
@elvishjerricco:matrix.orgElvishJerriccolike disk encryption; with the SRK, you don't need owner auth to do disk encryption21:25:15
@baloo_:matrix.orgbaloowhich isn't necessarily a good thing21:25:30
@elvishjerricco:matrix.orgElvishJerriccoI guess if you don't want that then you can just not create the SRK :P21:25:57
@elvishjerricco:matrix.orgElvishJerriccoor create it so it requires auth to use21:26:04
@baloo_:matrix.orgbalooyeah, you can attach a policy or an auth to an SRK21:27:37
@aktaboot:tchncs.deaktaboot joined the room.23:40:30
1 Mar 2023
@fabianhjr:matrix.orgFabián Heredia changed their display name from fabianhjr to Fabián Heredia.06:05:13
@js:ukvly.orgJulian Stecklina (Old)https://kb.cert.org/vuls/id/78272009:17:06
@js:ukvly.orgJulian Stecklina (Old)That's pretty bad09:17:17
@js:ukvly.orgJulian Stecklina (Old)"... arbitrary code execution within the TPM ..."09:18:16
@raitobezarius:matrix.orgraitobezariusIn the spec! Beautiful10:10:59
@grahamc:nixos.org@grahamc:nixos.orgstunning13:14:34
@grahamc:nixos.org@grahamc:nixos.orgis it actually in the spec, or in a reference implementation?13:15:39
@raitobezarius:matrix.orgraitobezariusI read it as "in the spec"13:16:13
@raitobezarius:matrix.orgraitobezarius

Apply an update The Trusted Computing Group (TCG) has released an update to their Errata for TPM2.0 Library Specification with instructions to address these vulnerabilities.

13:16:14
@raitobezarius:matrix.orgraitobezariusAlso, they did find the vuln I think in some implems13:17:19
@grahamc:nixos.org@grahamc:nixos.orgIm trying to find a diff of the spec ...13:17:22
@raitobezarius:matrix.orgraitobezariushttps://trustedcomputinggroup.org/wp-content/uploads/TPM-2.0-Library-Spec-v1.59-Errata-v1.4_pub.pdf13:17:44
@raitobezarius:matrix.orgraitobezariusVersion 1.413:17:46
@grahamc:nixos.org@grahamc:nixos.orgah nice, I was only finding the full reference13:18:01
@raitobezarius:matrix.orgraitobezariusimage.png
Download image.png
13:18:05

Show newer messages


Back to Room ListRoom Version: 6