From mboxrd@z Thu Jan 1 00:00:00 1970 From: Martin Schneider Subject: Re: vTPM Support Date: Tue, 26 Jan 2010 13:23:03 +0100 Message-ID: <690347541001260423l167bb728j23c5435b4380baac@mail.gmail.com> References: <690347541001260210xf1b2648j7584d95e7c4a4713@mail.gmail.com> <4B5ED69E.8070309@web.de> Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Return-path: In-Reply-To: <4B5ED69E.8070309@web.de> List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xensource.com Errors-To: xen-devel-bounces@lists.xensource.com To: Andreas Sommer Cc: xen-devel@lists.xensource.com List-Id: xen-devel@lists.xenproject.org > There's a good tutorial on building vTPM support for Xen at > http://cybione.org/~cdidier/blog/200812020841.html > . You can either use a > physical TPM or the TPM emulator (of course unsafe) from sourceforge. > However I don't know how robust the vTPM implementation is... Thank you for this link, Andreas. The thing I am searching for is not really a tutorial how to set things up but more some kind of a documentation that describes how XEN and vTPM really work, what level of support we currently have, etc. There's a lot of literature about virtual trusted computing (research papers, whitepapers, secondary literature, etc...) but it is not clear for me what ideas are implemented and how things really work. Best regards Martin