On Mon, Mar 30, 2015 at 4:09 AM, Mick <michaelkintz...@gmail.com> wrote:
> On Monday 30 Mar 2015 01:52:14 Rich Freeman wrote:
>> On Sun, Mar 29, 2015 at 8:32 PM, Walter Dnes <waltd...@waltdnes.org> wrote:
>> >   Be careful what you wish for.  I have my doubts that TPM chips would
>> >
>> > boot linux with Microsoft offering "volume discounts" to OEMS.  Call me
>> > cynical.
>>
>> TPM chips don't control what boots.  They just accept the hash of the
>> bootloader reported by the firmware and store it (and that is it as
>> far as the OEM's contribution to the process).
>
> Rich, the problem with TPM as I understand it is that the private key in the
> TPM chip is not yours, generated on your trusted platform, but the TPM
> manufacturer's and is burned into the TPM chip at the time of production.  If
> the TPM OEMs are in US or within the sphere of influence of the US, then I
> would consider this key as good as compromised.

As far as I'm aware, using a TPM for full-disk encryption does not
rely on any keys pre-installed in the TPM.  Typically you install your
own key or have the TPM generate one for you.  All the TPM does is
refuse to divulge the key unless the firmware reported that the
bootloader hash matches what you told it to look out for, and the
bootloader reported that the kernel hash matches what you told it to
look for (and you can go beyond that, but only if you are using a
distro that signs its userspace, which I believe is a direction RedHat
is going).

However, if the TPM or firmware has a back-door, then I'll certainly
grant that the NSA can read your hard drive.  They don't even need to
compromise the TPM - the firmware alone is capable of compromising the
trusted boot path.  It just needs to tell the TPM that it booted your
trusted bootloader when it really booted something else.

Securing your system isn't really about keeping the NSA out.  If they
want in, they're probably already in.  Sure, it might be
hypothetically possible to keep them out, but it would take far more
effort than almost anybody is going to be willing to put in.  A TPM
will likely do a very effective job at keeping the 99.9999999% of
people on the Earth who aren't the NSA out, which seems to be good
enough for just about every company on the planet, since most secure
their laptops with TPMs.

-- 
Rich

Reply via email to