Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

attest tpm operation with EK #10027

Open
frezbo opened this issue Dec 24, 2024 · 0 comments
Open

attest tpm operation with EK #10027

frezbo opened this issue Dec 24, 2024 · 0 comments

Comments

@frezbo
Copy link
Member

frezbo commented Dec 24, 2024

Feature Request

Ref:

Description

If the user provides a trusted EK, we could verify that an interposer is not present (also we could provide a TOFU (trust on first use) for EK and verify before enrolling luks keys

Kernel 6.10 and above already disables tpm2 if the tpm is reset by an interposer, enabled by CONFIG_TCG_TPM2_HMAC and is enabled by default of x86_64 , this is disabled by default on arm64 since there's reports of very slow tpm initialization.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant