|
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index] Re: [Xen-devel] [PATCH] docs/vtpm: explain dom0 physical TPM access caveats
On 03/12/2014 07:04 PM, Shuaijun Zhang wrote: Thank you so much for the new patches. It is great to see the new patches of vTPM allow to attest both of the dom0 and VMs. I found the commit message of the patches here: http://www.gossamer-threads.com/lists/xen/devel/320297. But I can't find the repository. Can you please point me out where is the source code repository Thank you There is no repository with these commits yet (other than the git repository on my computer where they were developed). You can import these patches into your repository using "git am" (or by manually applying the patches) to test. There will also be some follow-on patches adding support scripts to generate the administrative command messages and addressing certain instances where physical TPMs do not exactly conform to the specification. The scripts I have been using for testing are not really suitable for general use, so were not included in this series. On 12 March 2014 18:39, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> wrote:On 03/12/2014 12:36 PM, Shuaijun Zhang wrote:That explains the reason. But If the dom0 can't access the TPM, you will not be able to verify the dom0 system & the boot process. Is it not a security risk? Is there any solution that allows me to use vTPM and also be able to verify the dom0 system(host system)? Regards, JasonAt the moment, you need to give dom0 access to the physical TPM to verify the boot process/hypervisor. I have an updated TPM Manager and vTPM domain for Xen 4.5 that supports a "deep quote" operation, using the hardware TPM to produce a quote of pTPM and vTPM PCR values; I plan to post this later today.On 12 March 2014 14:37, Daniel De Graaf <dgdegra@xxxxxxxxxxxxx> wrote: On 03/12/2014 09:51 AM, Konrad Rzeszutek Wilk wrote:On Wed, Mar 12, 2014 at 12:32:24PM +0000, Shuaijun Zhang wrote:Hi There,In the document of VTPM (http://xenbits.xen.org/docs/ unstable/misc/vtpm.txt ): The Linux dom0 kernel should not try accessing the TPM while the vTPM Manager domain is accessing it. Anyone knows the reason why the dom0 should not access the TPM while vTPM Mgr is accessing it?Lets rope in the maintainer. Perhaps the doc should be updated to explain this. Thanks & Regards,JasonI agree; this docs patch explains the reasoning behind the original -- Daniel De Graaf National Security Agency _______________________________________________ Xen-devel mailing list Xen-devel@xxxxxxxxxxxxx http://lists.xen.org/xen-devel
|
![]() |
Lists.xenproject.org is hosted with RackSpace, monitoring our |