From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from bedivere.hansenpartnership.com ([66.63.167.143]:50616 "EHLO bedivere.hansenpartnership.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S932644AbeEHPZu (ORCPT ); Tue, 8 May 2018 11:25:50 -0400 Message-ID: <1525793148.3672.8.camel@HansenPartnership.com> Subject: Re: [PATCH v3 2/2] usb: misc: xapea00x: perform platform initialization of TPM From: James Bottomley To: Jarkko Sakkinen , "David R. Bild" , philip.b.tricca@intel.com Cc: Jason Gunthorpe , Greg Kroah-Hartman , Peter Huewe , linux-usb@vger.kernel.org, linux-integrity@vger.kernel.org Date: Tue, 08 May 2018 08:25:48 -0700 In-Reply-To: <20180508105515.GB6132@linux.intel.com> References: <20180430125418.31344-1-david.bild@xaptum.com> <20180504130022.5231-3-david.bild@xaptum.com> <20180504190638.ikqhdvcqccakzdjd@ziepe.ca> <20180508105515.GB6132@linux.intel.com> Content-Type: text/plain; charset="UTF-8" Mime-Version: 1.0 Sender: linux-integrity-owner@vger.kernel.org List-ID: On Tue, 2018-05-08 at 13:55 +0300, Jarkko Sakkinen wrote: > On Fri, May 04, 2018 at 02:56:25PM -0500, David R. Bild wrote: [...] > > In particular, it sets the credentials for the platform hierarchy. > > The platform hierarchy is essentially the "root" account of the > > TPM, so it's critical that those credentials be set before the TPM > > is exposed to user-space. (The platform credentials aren't > > persisted in the TPM and must be set by the platform on every > > boot.) If the driver registers the TPM before doing > > initialization, there's a chance that something else could access > > the TPM before the platform credentials get set. > > Maybe. Not sure yet where to draw the line eg should TSS2 daemon to > do it for example. > > James? Philip? I don't see any reason to set an unreachable password for the platform hierarchy if the UEFI didn't. If the desire is to disable the platform hierarchy, then it should be disabled, not have a random password set. I'd also say this is probably the job of early boot based on policy. James