From: Roberts, William C <william.c.roberts at intel.com>
To: tpm2@lists.01.org
Subject: [tpm2] Re: How to initialize a used TPM2 module and thoughts on clevis
Date: Wed, 13 Jul 2022 14:53:57 +0000 [thread overview]
Message-ID: <741ff3ee9707c1f3502d48e97496e1a47edfbb6d.camel@intel.com> (raw)
In-Reply-To: 20220712222548.2570.88870@ml01.vlan13.01.org
[-- Attachment #1: Type: text/plain, Size: 1513 bytes --]
+ Javier
On Tue, 2022-07-12 at 22:25 +0000, Tim K wrote:
> Very useful, thank you!
>
> > and YES. This is required to keep someone from wiping all the keys
> > in
> > the owner hierarchy which would include your disk encryption keys.
> > You also want to set the lockoutauth as well.
>
> It appears clevis uses the owner hierarchy by default. If I set an
> owner password, what are the implications, does clevis need to know
> the owner password when it creates its own key and then
> encrypts/decrypts its own key?
>
> This is how I'm trying to use it to encrypt a single file on disk
> (not the entire disk/LUKS):
> https://manpages.ubuntu.com/manpages/focal/man1/clevis-encrypt-tpm2.1.html
Looking at the source[1,2], it appears they call tpm2_createprimary on
encrypt which would require owner auth, call tpm2_create save the key
and then on decrypt call tpm2_createprimary which requires owner auth
and then call tpm2_load to load the key under that primary object.
I don't see an option to use the SRK, this looks like an oversight or I
am missing something. Javier, do you know?
[1]
https://github.com/latchset/clevis/blob/master/src/pins/tpm2/clevis-encrypt-tpm2
[2]
https://github.com/latchset/clevis/blob/master/src/pins/tpm2/clevis-decrypt-tpm2
> _______________________________________________
> tpm2 mailing list -- tpm2(a)lists.01.org
> To unsubscribe send an email to tpm2-leave(a)lists.01.org
> %(web_page_url)slistinfo%(cgiext)s/%(_internal_name)s
next reply other threads:[~2022-07-13 14:53 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-07-13 14:53 Roberts, William C [this message]
-- strict thread matches above, loose matches on Subject: below --
2022-08-19 16:17 [tpm2] Re: How to initialize a used TPM2 module and thoughts on clevis Roberts, William C
2022-07-13 15:59 Tim K
2022-07-13 14:33 Roberts, William C
2022-07-12 22:25 Tim K
2022-07-12 21:32 Roberts, William C
2022-07-12 21:19 Roberts, William C
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=741ff3ee9707c1f3502d48e97496e1a47edfbb6d.camel@intel.com \
--to=tpm2@lists.01.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox