| 12 Dec 2025 |
| gkleen changed their display name from Gregor to gkleen. | 13:45:13 |
| 22 Dec 2025 |
| kiara left the room. | 10:58:17 |
| 26 Dec 2025 |
| zimward changed their display name from zimward to zimward @ 39c3. | 15:48:45 |
| 27 Dec 2025 |
| zimward changed their display name from zimward @ 39c3 to zimward @ 39c3 ☎️ 75947. | 10:43:30 |
| 28 Dec 2025 |
| psyclyx joined the room. | 16:18:23 |
| psyclyx set a profile picture. | 16:20:33 |
| 30 Dec 2025 |
| jasper joined the room. | 09:38:22 |
| zimward changed their display name from zimward @ 39c3 ☎️ 75947 to zimward. | 23:39:29 |
| jasper changed their display name from jasper @ 39c3 ☎️ 62749 to jasper. | 23:38:40 |
| jasper | 23:40:10 |
| 16 Jul 2021 |
| andi- changed the history visibility to "world_readable" from "shared". | 12:07:40 |
| spacesbot - keeps a log of public NixOS channels joined the room. | 12:09:23 |
@grahamc:nixos.org | ^ recording material I looked at | 12:09:26 |
| manveru joined the room. | 12:09:46 |
andi- | I've found this https://kernsec.org/wiki/index.php/Linux_Kernel_Integrity | 12:09:54 |
andi- | had a bunch of (somewhat dated) links | 12:10:00 |
@grahamc:nixos.org | I'm still waiting for someone to confirm what I believe to be a fundamentally true security property https://developers.tpm.dev/posts/15575774 | 12:11:22 |
@grahamc:nixos.org | just as many bots as people in here | 12:11:35 |
andi- | I am still a bit confused by the requirement of different secrets to decrypt one secret. This is probably because TPMs support different trust roots(?) and each of the root has to match the secrets you want to decrypt? | 12:12:51 |
@grahamc:nixos.org | yeah | 12:13:00 |
andi- | So, why that take ownership stuff then? | 12:13:12 |
@grahamc:nixos.org | you can create a hierarchy of keys which reveal different amounts of data | 12:13:20 |
andi- | Shouldn't I rather specify the root somehow? | 12:13:21 |
@grahamc:nixos.org | ah | 12:13:35 |
andi- | and the root is also the part that takes the two passwords? | 12:13:37 |
@grahamc:nixos.org | ah, no | 12:13:43 |
@grahamc:nixos.org | heh | 12:13:45 |
@grahamc:nixos.org | takeownership does 2 thinsg afaik:
- resets the seed which is used for all the root key calculations
- sets a password used to reset counters
| 12:14:06 |
@grahamc:nixos.org | so you can set a policy saying increment a counter on decrypt attempt, and refuse if it goes about 10, then you need the ownership password to reset it | 12:14:51 |
andi- | Ok, so that part is then stored in the NV RAM of the TPM? | 12:15:35 |