From: Shuaijun Zhang <szhang@research.ait.ie>
To: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Cc: xen-devel@lists.xen.org
Subject: Re: [PATCH] docs/vtpm: explain dom0 physical TPM access caveats
Date: Wed, 12 Mar 2014 16:36:01 +0000 [thread overview]
Message-ID: <CAB2Fdya2kafZDM9CH3rHrgMmZ4cFJW1PannCg5UO2mr7CyGBNw@mail.gmail.com> (raw)
In-Reply-To: <53207134.5020009@tycho.nsa.gov>
[-- Attachment #1.1: Type: text/plain, Size: 3342 bytes --]
That explains the reason.
But If the dom0 can't access the TPM, you will not be able to verify the
dom0 system & the boot process. Is it not a security risk?
Is there any solution that allows me to use vTPM and also be able to verify
the dom0 system(host system)?
Regards,
Jason
On 12 March 2014 14:37, Daniel De Graaf <dgdegra@tycho.nsa.gov> wrote:
> On 03/12/2014 09:51 AM, Konrad Rzeszutek Wilk wrote:
>
>> On Wed, Mar 12, 2014 at 12:32:24PM +0000, Shuaijun Zhang wrote:
>>
>>> Hi There,
>>>
>>> In the document of VTPM (http://xenbits.xen.org/docs/
>>> unstable/misc/vtpm.txt
>>> ): The Linux dom0 kernel should not try accessing the TPM while the
>>> vTPM Manager
>>> domain is accessing it.
>>>
>>> Anyone knows the reason why the dom0 should not access the TPM while vTPM
>>> Mgr is accessing it?
>>>
>>
>> Lets rope in the maintainer. Perhaps the doc should be updated to explain
>> this.
>>
>>
>>> Thanks & Regards,
>>> Jason
>>>
>>
> I agree; this docs patch explains the reasoning behind the original
> guidance
> and addresses use cases that cannot yet be handled by a virtual TPM.
>
> ----------------------------->8--------------------------------
>
> Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
> ---
> docs/misc/vtpm.txt | 22 ++++++++++++++++++----
> 1 file changed, 18 insertions(+), 4 deletions(-)
>
> diff --git a/docs/misc/vtpm.txt b/docs/misc/vtpm.txt
> index df1dfae..d20b424 100644
> --- a/docs/misc/vtpm.txt
> +++ b/docs/misc/vtpm.txt
> @@ -120,10 +120,24 @@ the stubdom tree.
> Compiling the LINUX dom0 kernel:
> --------------------------------
> -The Linux dom0 kernel should not try accessing the TPM while the vTPM
> -Manager domain is accessing it; the simplest way to accomplish this is
> -to ensure the kernel is compiled without a driver for the TPM, or avoid
> -loading the driver by blacklisting the module.
> +Because the TPM manager uses direct access to the physical TPM, it may
> interfere
> +with access to the TPM by dom0. The simplest solution for this is to
> prevent
> +dom0 from accessing the physical TPM by compiling the kernel without a
> driver or
> +blacklisting the module. If dom0 needs a TPM but does not need to use it
> during
> +the boot process (i.e. it is not using IMA), a virtual TPM can be
> attached to
> +dom0 after the system is booted.
> +
> +Because the TPM manager does not yet accept requests for deep quotes, if
> a quote
> +or other request needs to be fulfilled by the physical TPM, dom0 will
> need to
> +access the physical TPM. In order to prevent interference, the TPM
> Manager and
> +dom0 should use different values for the TPM's locality; since Linux
> always uses
> +locality 0, using locality 2 for the TPM Manager is recommended. If both
> Linux
> +and the TPM Manager attempt to access the TPM at the same time, the TPM
> device
> +will return a busy status; some applications will consider this a fatal
> error
> +instead of retrying the command at a later time. If a vTPM gets an error
> when
> +loading its key, it will currently generate a fresh vTPM image (with a
> new EK,
> +SRK, and blank NVRAM).
> +
> Compiling the LINUX domU kernel:
> --------------------------------
>
--
Shuaijun Zhang
Research Engineer
Software Research Institute,
Athlone Institute of Technology, IE
Tel: +353 90 646 8196
http://www.ait.ie/sri/
[-- Attachment #1.2: Type: text/html, Size: 4476 bytes --]
[-- Attachment #2: Type: text/plain, Size: 126 bytes --]
_______________________________________________
Xen-devel mailing list
Xen-devel@lists.xen.org
http://lists.xen.org/xen-devel
next prev parent reply other threads:[~2014-03-12 16:36 UTC|newest]
Thread overview: 13+ messages / expand[flat|nested] mbox.gz Atom feed top
2014-03-12 12:32 Question about VTPM Implementation Shuaijun Zhang
2014-03-12 13:51 ` Konrad Rzeszutek Wilk
2014-03-12 14:35 ` Ian Campbell
2014-03-12 14:37 ` [PATCH] docs/vtpm: explain dom0 physical TPM access caveats Daniel De Graaf
2014-03-12 15:20 ` Shuaijun Zhang
2014-03-12 16:36 ` Shuaijun Zhang [this message]
2014-03-12 18:39 ` Daniel De Graaf
2014-03-12 23:04 ` Shuaijun Zhang
2014-03-12 23:41 ` Daniel De Graaf
2014-03-13 11:10 ` Ian Campbell
2014-03-13 14:53 ` Daniel De Graaf
2014-03-13 15:59 ` Ian Campbell
2014-03-14 11:01 ` Ian Campbell
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CAB2Fdya2kafZDM9CH3rHrgMmZ4cFJW1PannCg5UO2mr7CyGBNw@mail.gmail.com \
--to=szhang@research.ait.ie \
--cc=dgdegra@tycho.nsa.gov \
--cc=xen-devel@lists.xen.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).