On 12/17/20 10:54 AM, Marc-André Lureau wrote:
Hi On Wed, Dec 16, 2020 at 11:45 PM Michael Weiser ...




    Could it be as easy as booting a recovery linux distro and
    comparing the
    outputs of dmidecode or somesuch?


I am afraid it's not so easy.  We should probably consider new tests to ensure version machines get the same PCR measurement from bios/uefi. That's what OS usually rely on, but they may probe more hardware related details themself too.


I created now this wiki page for swtpm: https://github.com/stefanberger/swtpm/wiki/Sealing-to-PCR-0-7-Values-when-using-QEMU

The whole purpose of measured/trusted boot is to reflect some known measurement values of a known BIOS in the TPM PCRs. Unfortunately this bites with sealing to those values and the rather fast development of QEMU. Updates of QEMU on the host platform then become a recovery event inside the VM, which is unfortunate, but this is when measured/trusted boot actually 'does its job'.




    For giggles I did enter the recovery key of the testing VM when
    prompted. It did boot up and showed Bitlocker enabled. After rebooting
    it prompted for the recovery key again. I entered it again, it booted
    again and I turned off Bitlocker (decrypted the disk). After
    re-enabling
    Bitlocker (re-encrypting the disk) and rebooting again it now does not
    prompt for the recovery key again.


Does Bitlocker not allow you to accept a configuration change (= PCR value change) and it internally (presumably) then seals the secreted against those new values so upon the next reboot it works again? Do you really need to go through the whole re-encryption process? It sounds like unattractive even for a physical machine firmware update...

   Stefan

Reply via email to