Thanks James,

On Sun, Aug 17, 2025 at 1:34 AM James Bottomley
<james.bottom...@hansenpartnership.com> wrote:

> Supporting these commands was the reason the TPM2 volatile
> handle space was reduced to 3.

I think this may put the cart before the horse: You can do anything
you want to in the TPM with just 3 handles (actually I think 2 might
be enough). ContextSave and ContextLoad exist [1] so that you can
create a resource manager to share the TPM among concurrent
applications. If you aren't sharing the TPM among concurrent
applications, you neither need a resource manager nor context
commands. I want to make sure I'm not misunderstanding your message:
is it OK to break userspace over this or any other [2] missing
dependency of TCG_TPM2_HMAC, simply because that implies the TPM is
not a "mainstream" PC Client profile TPM?

> The way it is supposed to work is that the system stores (and
> validates if it can) the signing EK on install (this is constant for
> the lifetime of the TPM).

Some questions for the threat model here:
1. Where is the signing EK stored by the system?
2. When is this system (and its durable storage) validated or measured?
3. How do we avoid a circular trust dependency between the kernel and
this system here?

Thanks
Chris

[1] 
https://trustedcomputinggroup.org/wp-content/uploads/Trusted-Platform-Module-2.0-Library-Part-1-Version-184_pub.pdf,
see 28: Context Management
[2] 
https://wiki.archlinux.org/title/Trusted_Platform_Module#A_TPM_error_(714)_occurred_attempting_to_create_NULL_primary

Reply via email to