[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xense-devel] vtpm_managerd locks the TPM


  • To: Xense-devel@xxxxxxxxxxxxxxxxxxx
  • From: Luke <secureboot@xxxxxxxxx>
  • Date: Fri, 21 Sep 2007 09:51:59 -0400
  • Delivery-date: Fri, 21 Sep 2007 06:53:16 -0700
  • List-id: "A discussion list for those developing security enhancements for Xen." <xense-devel.lists.xensource.com>

Cihula, Joseph wrote:
> Thanks to Vinnie for getting into more background on why the vTPM
> Manager isn't using a gneral TSS.  This fills-in the background on my
> previous answer to this same question:
> http://lists.xensource.com/archives/html/xen-devel/2007-07/msg00812.html
> .
> 
> In your (Luke's) original reply to this, you stated that you wanted to:
>       My goal is to be able to do all of the following, though no two
> need to occur simultaneously
>       1) Run vtpm_managerd
>       2) create tpm keys in the dom0
>       3) create vtpm keys in the domu
> and then later that you had gotten 1) and 3) working.
> 
> As Vinnie explained, if you have a need for a somewhat privileged domain
> to use keys, it would be preferable to do that within a secure domU.
> 
> It has long been a goal of the Xen security community to disaggregate
> dom0, and in such a case, the vTPM Manager would most likely end up in a
> small domain to itself.  So a forward-looking design would be to use a
> secure domU for any TPM operations.
> 
> Is your intended use something that cannot work in such a model and
> requires access to the hardware TPM?
> 

Yes - both the VTPM and actual TPM in dom0 must be accessible
simultaneously.

The end goal is to "fully" attest to the state of a VM.

vtpm_managerd would run in a dom0 that has nothing except an attestation
server, to attest to the dom0, bios, bootloader, etc.  A VM would run a
similar service.  A remote party then should be able to query both VM
and dom0 for attestations.

In this way, a remote party can verify that no compromise of the VMM,
bootloader, dom0, or VM has taken place.

See  the publications on
http://domino.research.ibm.com/comm/research_projects.nsf/pages/ssd_shype.index.html
for more extensive information, particularly those including the title
"Shamon"


It sounds like I need to modify this to work with Trousers then, or a
different TSS stack.

_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.