On 10/15/07, Michael Halcrow <[EMAIL PROTECTED]> wrote:
> On Mon, Oct 15, 2007 at 10:23:22PM +0200, Alon Bar-Lev wrote:
> > This has nothing to do with TSPI... As you need passphrase to access
> > TSPI, right? And what do you do with this passphrase? Having a
> > security credentials without "something you know" somewhat make the
> > whole idea redundant.
>
> TSPI seals your key to a system state, based on the PCR values of the
> TPM. There is no additional protection of the key (or, more
> accurately, of the ability to use the key) beyond the PCR values
> having to match. The secret key is always locked in the TPM; no matter
> what information is in the user's session keyring, it is useless
> unless the system's PCR values are set correctly.

So I can read the encrypted files at any point in time... I don't see
any benefit in encryption using static keys.

Alon.

-------------------------------------------------------------------------
This SF.net email is sponsored by: Splunk Inc.
Still grepping through log files to find problems?  Stop.
Now Search log events and configuration files using AJAX and a browser.
Download your FREE copy of Splunk now >> http://get.splunk.com/
_______________________________________________
eCryptfs-devel mailing list
eCryptfs-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ecryptfs-devel

Reply via email to