> Private keys generated inside a TPM cannot leave the TPM unless properly
> migrated to another TPM.  It's part of the TPM's design philosophy.

Yes, my only theory was to emulate a virtual TPM, generate the destination key 
and then get the real TPM to generate the migration package. Because I 
generated the destination key I (or the virtual TPM emulator) can also decrypt 
the migration package and hence get access to the original key.

Similarly, I could just get a new free certificate, except either way defeats 
the purpose of having stronger security from a TPM.

> The other thing I am curious about is the contents of the certificate you
> obtained from the CA.  Can you convert the binary base64 encoding to text
> format and post it?

The web page that I pick up the certificate from had some ECMAScript that 
loaded the following data; I think it is a PKCS#7 certificate, presumably the 
signed public key?? (with the private remaining in the TPM). I can't use the 
key now anyway (from Thunderbird), so currently it is useless.

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
 
R2sVmVUcyWZBdk6/TyXsG7ABniMA4GA1UdDwEB/wQEAwIFoDAMBgNVHRMBAf8EAjAAMCAGA1UdJQQZMBcGCCsGAQUFBwMEBgsrBgEEAbIxAQMFAjARBglghkgBhvhCAQEEBAMCBSAwRgYDVR0gBD8wPTA7BgwrBgEEAbIxAQIBAQEwKzApBggrBgEFBQcCARYdaHR0cHM6Ly9zZWN1cmUuY29tb2RvLm5ldC9DUFMwgaUGA1UdHwSBnTCBmjBMoEqgSIZGaHR0cDovL2NybC5jb21vZG9jYS5jb20vVVROLVVTRVJGaXJzdC1DbGllbnRBdXRoZW50aWNhdGlvbmFuZEVtYWlsLmNybDBKoEigRoZEaHR0cDovL2NybC5jb21vZG8ubmV0L1VUTi1VU0VSRmlyc3QtQ2xpZW50QXV0aGVudGljYXRpb25hbmRFbWFpbC5jcmwwgYYGCCsGAQUFBwEBBHoweDA7BggrBgEFBQcwAoYvaHR0cDovL2NydC5jb21vZG9jYS5jb20vVVROQWRkVHJ1c3RDbGllbnRDQS5jcnQwOQYIKwYBBQUHMAKGLWh0dHA6Ly9jcnQuY29tb2RvLm5ldC9VVE5BZGRUcnVzdENsaWVudENBLmNydDAgBgNVHREEGTAXgRVzZ3J5cGhvbkBjb21wdXRlci5vcmcwDQYJKoZIhvcNAQEFBQADggEBAF6yftXwLEmfxhyIJT7AyxnNg3JwU5RD2iITUCKNk/3itgI+L/fOt3ZXoDGY8OlxOA2jXFeDWfyYG4Qa00J+wwEIbgdx3GX1D9sSLOfbBH88M/xWG4VVKEFgzF0Gc+gB2dKPGQeETBz3GERnq9Q9TQBqUNRP9Hoi1UyHoJUzGcWELmbRQLf3CECB2RjTJ2kQIn6QCX4/tjGMPEsDRl5d8r56WQHQ527+ChOj/0PY6DcJ79Y2ADU6yPXSuz/dFvbweT4CWuULad5A3vYlW7vC62z
 
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
 
A73gJMtUGjAdBgNVHQ4EFgQUiYJnfcSdJnAAS7RQSHzePa4Ebn0wDgYDVR0PAQH/BAQDAgEGMA8GA1UdEwEB/wQFMAMBAf8wewYDVR0fBHQwcjA4oDagNIYyaHR0cDovL2NybC5jb21vZG9jYS5jb20vQWRkVHJ1c3RFeHRlcm5hbENBUm9vdC5jcmwwNqA0oDKGMGh0dHA6Ly9jcmwuY29tb2RvLm5ldC9BZGRUcnVzdEV4dGVybmFsQ0FSb290LmNybDANBgkqhkiG9w0BAQUFAAOCAQEAGdiJEW8orKYAoueHwZuQA9t+oRL9HvPi8AGplFRCa5oJxKBt15CSBANmeUNx/Phvr9t2ReI3Gj3d5FkEeKwc9ING83rPW4RyLeVGwboYESnzy0l5hzy6bQWdpG1oT61yFDaoubH9v89/8KRqlDVQj8+BbVWx3VkwSt9toJxkH0l87za79ONp9Pg5j1qtS4U6tw7t088NRKL7BL/kL3COJftaVAaz0MS8bY37czIs6ZuEJC3Wf5F6aAJQHw4/TenM9btn6NwcLjv8Ts3+Ao7jqBMKpSZEZekQ8k1Sp67cPsprMlxBbP71XaDq/9H6m4ZYbT2WR+X+LpUEwgDMjqHyuzCCBDYwggMeoAMCAQICAQEwDQYJKoZIhvcNAQEFBQAwbzELMAkGA1UEBhMCU0UxFDASBgNVBAoTC0FkZFRydXN0IEFCMSYwJAYDVQQLEx1BZGRUcnVzdCBFeHRlcm5hbCBUVFAgTmV0d29yazEiMCAGA1UEAxMZQWRkVHJ1c3QgRXh0ZXJuYWwgQ0EgUm9vdDAeFw0wMDA1MzAxMDQ4MzhaFw0yMDA1MzAxMDQ4MzhaMG8xCzAJBgNVBAYTAlNFMRQwEgYDVQQKEwtBZGRUcnVzdCBBQjEmMCQGA1UECxMdQWRkVHJ1c3QgRXh0ZXJuYWwgVFRQIE5ldHdvcmsxIjAgBgNVBAMTGUFkZFRyd
 
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
 
YbMTgYtHEPms3IDp6OLhvhjJiDyx8x8URMxgRzSXZgD8f4vReAay7pzEwOWpp5DyAKLtWeYyYeVZKU2IIXWnvQvMePToYEMQA=

> Do you know by the way if you are using the Infineon TPM Professional
> Package?  It seems that they provide the implementation of the CSP provider

As per the original email the relevant PKCS#11 module DLL is IfxTpmCk.dll, "TPM 
Cryptoki Provider", version 2.50.771.0.  The Infineon software came pre-loaded 
on laptop and the readme identifies it as "Infineon TPM Professional Package 
V2.5".

> and the PKCS#11 module.  Among the applications supporting this product that
> they list is MS Outlook.

It is listed as integrating with "etscape Communicator 7.2 and 4.79" (as well 
as Outlook).

Note that Outlook seems to be able to access the certificate (it shows up) and 
sign an email (provided the From address is set correctly). I presume it passes 
whatever it needs to the TPM (via PKCS#11) and gets back the signed bit (the 
private key staying in the TPM).

The main issue seems to be that Thunderbird doesn't see the certificate in the 
first place (in the list).

For the original "shy" problem, someone suggested that the public cert may be 
in MS cert store with only the private key in the TPM, and that one solution 
would be to manually put the public key into Thunderbird.

It would then show up in the list, and Thunderbird would know to pass to the 
TPM for the actual signing??

I tried exporting the public cert from MS cert store. Loading via the TB 
interface it came up under 'other peoples certs', so I was trying to use NSS to 
get it into the main cert store yet linked to the private key in the TPM.


- Sly


-----Original Message-----
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Peter Djalaliev
Sent: Saturday, 31 March 2007 13:27
To: [email protected]

> > I am suffering from what appears to be the same problem in ?My shy
> > certificate? from a few months ago:
> >
http://groups.google.com/group/mozilla.dev.tech.crypto/browse_frm/thread/a5e85bc3678e6/24737c620481ede7?lnk=st&q=&rnum=1
>
> > I have an email certificate in my TPM, however it does not show up in
> the
> > certificate list in Thunderbird.
> >
> > Unfortunately, I can not use the solution from the original message as I
> > originally created the certificate in the TPM (I was using MSIE7 and
> > selected the TPM as the CSP to install into), and it looks like the
> private
> > key is stuck in the TPM and I can?t get it out (short of) migrating to
> > another TPM).
> >



Hm, I am not familiar with the Windows implementation of the TPM as a
PKCS#11 module.  Particularly, I am curious about which part of the TPM API
MSIE7 uses to generate the public/private key pair.  However, this is
probably a closed source product...

The other thing I am curious about is the contents of the certificate you
obtained from the CA.  Can you convert the binary base64 encoding to text
format and post it?

Do you know by the way if you are using the Infineon TPM Professional
Package?  It seems that they provide the implementation of the CSP provider
and the PKCS#11 module.  Among the applications supporting this product that
they list is MS Outlook.

Peter
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto
_______________________________________________
dev-tech-crypto mailing list
[email protected]
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to