On Thu, 19 Feb 2009 16:05:10 +0100
phcoder <phco...@gmail.com> wrote:

> Personally if tpm support is merged into mainline grub2 I'll stop using 
> it. However what you request doesn't need tpm. Authenticity of modules, 
> configuration files and so on can be verified by one of 4 methods:
> 1) internal signatures
> 2) file in signed gpg container
> 3) detached signatures
> 4) signed hash file

While TPM may open a door for corporations to prevent machine owners
from having control over their machines, in this instance I do not see
another way to solve Alex's problem.

To restate the problem:

1. The disk must be encrypted.
2. The system must be able to boot without human interaction.  That is,
   a user cannot be prompted for a passphrase or key.

The solution using TPM, as I understand it, essentially puts the
encryption key into tamper-resistant memory in the TPM module, and
supports integrity verification of the system, including the software
on the hard disk, at load time.

It sounds like any solution to problem points (1) and (2) would require
some sort of tamper-resistant module to store the key and handle the
first level of verification (to verify the initial code loaded from
disk).  From that point on, the verified boot sector code can read the
encryption key and verify the next-higher level of software, and so on.

The evil part of TPM seems to be when a person buys a computer but the
computer is locked down with a key not provided to the buyer.

Regards,
Colin


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
http://lists.gnu.org/mailman/listinfo/grub-devel

Reply via email to