-
-
Notifications
You must be signed in to change notification settings - Fork 45
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Document how to reseal disk encryption key in the TPM #118
Comments
@rbreslow yes. I am playing with TPM disk unlock sealing/unsealing right now under linuxboot/heads#1283 and i'm realizing as part of qemu-coreboot-fbwhiptail-tpm1 testings that if:
With that in place, selecting default boot could pick up on the differences in TCPA log (afterall, reflashing requires resealing measurements for TPMTOTP/HOTP because unsealing wasn't possible because measurements wee inconsistent). The reasoning of this proposition is that two mechanisms are at play under Heads:
When comes the time to unseal, we ask the user to reseal if TPM measurements are inconsistent. But we do not ask the user to recreate hashes and resign (those should not be inconsistent and should not matter). The only place where that matters is at default boot, where the disk unlock key will not unseal if additional things changed. For the matter, if the LUKS header changed, unsealing will fail since measured and sealed for TPM disk unlock key. With the above proposed change, at time of unsealing, the user could be made aware that what was part of coreboot measured boot changed (maybe show diff even if technically valid but not relevant for non-technical users). Other thoughts
|
@rbreslow counter thought? |
From linuxboot/heads#1282:
We should document things that could lead to this. For example, flashing an updated Heads that changes TPM measurements. Perhaps it belongs in the upgrade guide or an FAQ?
Edit: Soon as I posted this, I found https://osresearch.net/Updating#re-owning-the-states:
I don't think this is clear, and it doesn't explicitly mention resealing the disk encryption key.
The text was updated successfully, but these errors were encountered: