On 2012-12-18 07:57, Jeffrey Walton wrote: > On Tue, Dec 18, 2012 at 1:32 AM, Anders Rundgren > <anders.rundg...@telia.com> wrote: >> I have only one problem with TPM or TPM-like technology: the desire to >> kill rooting will hamper development. > Agreed (I hope it does not hamper development and mod'ing). > > The SIM is a mini-HSM, and can probably be used as the basis for a > trusted platform. So development should be available with the right > architecture and a new SIM card :)
As I see it: SIM "=" HSM, SIM <> TPM. SIMs suffer from a serious problem with respect to all kinds of development: They are owned by *operators*. A 10Y+ ago Nokia phones supported SIM-based key-stores but since the handset industry, SIM-vendors, banks and Telcos could never agree on a "business model", this standard (WSIM) more or less died due to "under-utilization". The embedded SE (Security Element) featured in some Android phones could make it easier but currently SEs seems to be locked by either Google or the device vendors: http://nelenkov.blogspot.se/2012/08/android-secure-element-execution.html > > I'm not sure what is easiest for CDMA (SIMs cover GSM networks). We > are seeing SIM like features for CDMA phones, but I suspect its more a > software abstraction coupled with a more versatile baseband processor. > >> IMO, it should be technically possible to root devices but data encrypted >> by the original OS should be useless due to a changed encryption key. >> The same should be valid for keys enrolled through the original OS. > Under some Android phones I have, you can unlock the boot loader and > it will wipe the device. For example, my EVO 4G. > > The same Android phones do *not* wipe data if the phone is re-SIM'd, though. > >> This is probably only feasible if the "TPM" is a part of the main CPU >> which I also think is what is going to happen. > I would expect to see it moved to the baseband processor, and not a > general purpose CPU. What is Qualcomm doing in this area? Is anyone up > to date? http://www.theregister.co.uk/2012/11/13/trustzone_company The advantage with having TPM functionality in the main CPU is that "trusted boot" becomes easy, all you need to have is a trust anchor verifying the boot loader's authenticity. Then the CPU can keep a flag internally saying rooted or "original". The CPU may also maintain separate encryption keys for different mod(e)s. Anders > >> The TPM enables organizations to *optionally* reject connecting devices >> not running "legitimate" OSes. That's OK; they already do that to some >> extent. >> >> Related: Microsoft's TPM-based VSD (Virtual Smart Card) scheme: >> http://www.microsoft.com/en-us/download/details.aspx?id=29076 > Ah, thanks. > > Jeff > >> On 2012-12-18 05:10, Jeffrey Walton wrote: >>> http://www.networkworld.com/news/2012/121712-nist-tia-265172.html >>> >>> A mobile security technology proposal drafted by the National >>> Institute of Standards and Technology (NIST) is being soundly rejected >>> by one of the main trade groups representing a broad cross-section of >>> industry. >>> >>> NIST's "Guidelines on Hardware-Rooted Security in Mobile Devices," >>> issued in draft form in October and out for public comment until last >>> Friday, has drawn sharp criticism from the Telecommunications Industry >>> Association, which labeled NIST's proposal as "over-prescriptive" >>> because it "suggests that security in mobile devices can only be >>> realized using a specific architectural implementation of secure or >>> trustworthy environment, namely the Trusted Platform Module (TPM) >>> architecture specified by the Trusted Computing Group (TCG). >>> >>> TPM is "one way to implement security in mobile devices but it's isn't >>> the only way," said Brian Scarpelli, senior manager of government >>> affairs at Arlington, Va.-based TIA, adding that software-based >>> security can also be relied on. He indicated the TIA membership of >>> carriers and software vendors would prefer not to have to adhere to a >>> specific implementation to meet new federal guidelines for mobile >>> devices, and TIA is reaching out to NIST to voice its objections. TIA >>> industry membership includes carriers such as Verizon Communications >>> and Sprint Nextel, as well as Apple, Dell and Vare. >>> >>> The TPM specification from the TCG is a hardware-based >>> cryptographic-processing technology that can be used for several >>> security purposes, primarily device integrity. TPM is used in desktops >>> and servers but not mobile devices at present. The National Security >>> Agency, for example, which influences technology decisions made at the >>> U.S. Department of Defense, has been an enthusiastic proponent of TPM. >>> >>> TPM exists in much internal computer hardware today, though it appears >>> to suffer from lack of widespread deployment in part due to lack of >>> applications making it easy to deploy. >>> >>> NIST argues for TPM by saying that "many mobile devices are not >>> capable of providing strong security assurances to end users and >>> organizations. Current mobile devices lack the hardware-based roots of >>> trust that are increasingly built into laptops and other types of >>> hosts." >>> >>> NIST says it wants to "accelerate industry efforts" to use >>> hardware-rooted trust technologies, and specifically TPM, in mobile >>> devices such as smartphones and tablets that the federal government >>> would acquire. NIST criticizes today's mobile devices, saying they are >>> "vulnerable to 'jailbreaking' and 'rooting,' which provide device >>> owners with greater flexibility and control over the devices, but also >>> bypass important security features which may introduce >>> vulnerabilities." >>> >>> NIST asserts in its guidelines proposal that TPM and hardware-based >>> root of trust is the model the federal government would like to see >>> for use in assuring device integrity and verification, and that this >>> would also help the government in adopting a bring-your-own-device >>> approach where government employees could use their personally owned >>> devices for work as well. >>> ... > -- You received this message because you are subscribed to the Google Groups "Android Security Discussions" group. To post to this group, send email to android-security-discuss@googlegroups.com. To unsubscribe from this group, send email to android-security-discuss+unsubscr...@googlegroups.com. For more options, visit this group at http://groups.google.com/group/android-security-discuss?hl=en.