* How to generate and load evm-key in TPM less systems
@ 2018-07-29 18:16 rishi gupta
2018-07-30 0:35 ` Mimi Zohar
0 siblings, 1 reply; 3+ messages in thread
From: rishi gupta @ 2018-07-29 18:16 UTC (permalink / raw)
To: linux-integrity, Dave Chinner, Theodore Y. Ts'o, zohar
[-- Attachment #1: Type: multipart/alternative, Size: 594 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: How to generate and load evm-key in TPM less systems
2018-07-29 18:16 How to generate and load evm-key in TPM less systems rishi gupta
@ 2018-07-30 0:35 ` Mimi Zohar
2018-07-30 3:51 ` rishi gupta
0 siblings, 1 reply; 3+ messages in thread
From: Mimi Zohar @ 2018-07-30 0:35 UTC (permalink / raw)
To: rishi gupta, linux-integrity, Dave Chinner, Theodore Y. Ts'o,
zohar
Cc: James Bottomley
[Cc'ing James Bottomley]
On Sun, 2018-07-29 at 23:46 +0530, rishi gupta wrote:
> Hi Integrity team,
>
> IMA is working fine in our embedded linux product and now we are trying to
> implement EVM. Our system does not have TPM but have trustzone and crypto
> engine. My question is:
>
> 1. What is the standard practice to generate and load evm-key in systems
> that does not have TPM.
TPMs are really cheap. Convince your product group to include a TPM?
"encrypted" keys can be decrypted either by a "trusted" or a "user"
type key, but the latter is not considered safe and should be limited
to test environments.
Udit Agarwal recently suggested defining a new key type named "secure"
keys, but didn't explain what made them secure. The "secure" key type
was limited to CAAM.
> 2. Suppose we have an encrypted key which has been decrypted and loaded in
> kernel. Isn't it an attacker can analyse RAM and get the evm-key. Am I
> missing something here.
No, what you're saying is true. In a secure, locked down environment
analyzing kernel memory (should still) requires root privileges.
Mimi
^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: How to generate and load evm-key in TPM less systems
2018-07-30 0:35 ` Mimi Zohar
@ 2018-07-30 3:51 ` rishi gupta
0 siblings, 0 replies; 3+ messages in thread
From: rishi gupta @ 2018-07-30 3:51 UTC (permalink / raw)
To: Mimi Zohar
Cc: linux-integrity, Dave Chinner, Theodore Y. Ts'o, zohar,
James Bottomley
[-- Attachment #1: Type: multipart/alternative, Size: 2410 bytes --]
^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2018-07-30 5:24 UTC | newest]
Thread overview: 3+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2018-07-29 18:16 How to generate and load evm-key in TPM less systems rishi gupta
2018-07-30 0:35 ` Mimi Zohar
2018-07-30 3:51 ` rishi gupta
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.