Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-11 Thread Michel Messerschmidt
On Sun, Feb 09, 2003 at 02:32:13PM -0800, Mike Rosing wrote: TPM != TCPA. TCPA with *user* control is good. The TPM is a mandatory part of the TCPA specifications. There will be no TCPA without TPM. And there will be no TCPA-enabled system with complete user control. Just look at the main

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-11 Thread Mike Rosing
On Tue, 11 Feb 2003, Michel Messerschmidt wrote: The TPM is a mandatory part of the TCPA specifications. There will be no TCPA without TPM. That makes sense, TPM is just key storage. And there will be no TCPA-enabled system with complete user control. Just look at the main specification:

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-11 Thread Michel Messerschmidt
On Sun, Feb 09, 2003 at 02:32:13PM -0800, Mike Rosing wrote: TPM != TCPA. TCPA with *user* control is good. The TPM is a mandatory part of the TCPA specifications. There will be no TCPA without TPM. And there will be no TCPA-enabled system with complete user control. Just look at the main

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-11 Thread Mike Rosing
On Tue, 11 Feb 2003, Michel Messerschmidt wrote: The TPM is a mandatory part of the TCPA specifications. There will be no TCPA without TPM. That makes sense, TPM is just key storage. And there will be no TCPA-enabled system with complete user control. Just look at the main specification:

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-09 Thread Mike Rosing
On Sun, 9 Feb 2003, Anonymous via the Cypherpunks Tonga Remailer wrote: However note: you can't defend TCPA as being good vs Palladium bad (as you did by in an earlier post) by saying that TCPA only provides key storage. TPM != TCPA. TCPA with *user* control is good. As Michel noted TCPA

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-09 Thread Mike Rosing
On Sun, 9 Feb 2003, Anonymous via the Cypherpunks Tonga Remailer wrote: However note: you can't defend TCPA as being good vs Palladium bad (as you did by in an earlier post) by saying that TCPA only provides key storage. TPM != TCPA. TCPA with *user* control is good. As Michel noted TCPA

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-08 Thread Mike Rosing
On Sat, 8 Feb 2003, Michel Messerschmidt wrote: AFAIK, IBM's embedded security subsystem 1.0 is only a key storage device (Atmel AT90SP0801 chip). But the TPM we're talking about is part of the TCPA compliant embedded security subsystem 2.0 which supports all specified TPM functions, even if

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-08 Thread Michel Messerschmidt
On Wed, Feb 05, 2003 at 07:15:50AM -0800, Mike Rosing wrote: On Tue, 4 Feb 2003, AARG! Anonymous wrote: The main features of TCPA are: - key storage The IBM TPM does this part. AFAIK, IBM's embedded security subsystem 1.0 is only a key storage device (Atmel AT90SP0801 chip). But the

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-08 Thread Mike Rosing
On Sat, 8 Feb 2003, Michel Messerschmidt wrote: AFAIK, IBM's embedded security subsystem 1.0 is only a key storage device (Atmel AT90SP0801 chip). But the TPM we're talking about is part of the TCPA compliant embedded security subsystem 2.0 which supports all specified TPM functions, even if

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-08 Thread Anonymous via the Cypherpunks Tonga Remailer
Mike Rosing wrote: BTW, why should I need a TPM only for secure key storage ? Any smartcard is better suited for this. Because it's soldered into the portable. For an enterprise that means they *know* each portable out in the field is held by the correct user. With a smart card, they

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-06 Thread Mike Rosing
On Thu, 6 Feb 2003, Anonymous via the Cypherpunks Tonga Remailer wrote: I think you may have been mislead by the slant of paper. Quoting from the paper: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf you will see: | The TCPA chip is not particularly suited to DRM. While it does have

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-06 Thread Anonymous via the Cypherpunks Tonga Remailer
Mike Rosing wrote: - secure boot - sealing - remote attestation It does *not* do these parts. I think you may have been mislead by the slant of paper. Quoting from the paper: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf you will see: | The TCPA chip is not particularly suited to

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-06 Thread Mike Rosing
On Thu, 6 Feb 2003, Anonymous via the Cypherpunks Tonga Remailer wrote: I think you may have been mislead by the slant of paper. Quoting from the paper: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf you will see: | The TCPA chip is not particularly suited to DRM. While it does have

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-05 Thread Mike Rosing
On Tue, 4 Feb 2003, AARG! Anonymous wrote: The main features of TCPA are: - key storage The IBM TPM does this part. - secure boot - sealing - remote attestation It does *not* do these parts. That's why IBM wants the TPM != TCPA to be loud and clear. That's why the RIAA can't expect it

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-05 Thread Anonymous via the Cypherpunks Tonga Remailer
Mike Rosing wrote: - secure boot - sealing - remote attestation It does *not* do these parts. I think you may have been mislead by the slant of paper. Quoting from the paper: http://www.research.ibm.com/gsal/tcpa/why_tcpa.pdf you will see: | The TCPA chip is not particularly suited to

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-05 Thread Mike Rosing
On Tue, 4 Feb 2003, AARG! Anonymous wrote: The main features of TCPA are: - key storage The IBM TPM does this part. - secure boot - sealing - remote attestation It does *not* do these parts. That's why IBM wants the TPM != TCPA to be loud and clear. That's why the RIAA can't expect it

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-02-04 Thread AARG! Anonymous
Mike Rosing wrote: Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still monitor who reads/writes the chip (using a pci bus logger for

[IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Eugen Leitl
-- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL PROTECTED] Date: Tue, 21 Jan 2003 12:05:39 -0500

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, Eugen Leitl wrote: -- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread David Howe
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED] was seen to say: Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still

[IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Eugen Leitl
-- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL PROTECTED] Date: Tue, 21 Jan 2003 12:05:39 -0500

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, Eugen Leitl wrote: -- Forwarded message -- Date: Fri, 24 Jan 2003 02:29:27 -0500 From: Dave Farber [EMAIL PROTECTED] To: ip [EMAIL PROTECTED] Subject: [IP] Open Source TCPA driver and white papers -- Forwarded Message From: David Safford [EMAIL

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread David Howe
at Friday, January 24, 2003 4:53 PM, Mike Rosing [EMAIL PROTECTED] was seen to say: Thanks Eugen, It looks like the IBM TPM chip is only a key store read/write device. It has no code space for the kind of security discussed in the TCPA. The user still controls the machine and can still

Re: [IP] Open Source TCPA driver and white papers (fwd)

2003-01-24 Thread Mike Rosing
On Fri, 24 Jan 2003, David Howe wrote: Bearing in mind though that DRM/Paladium won't work at all if it can't trust its hardware - so TPM != Paladium, but TPM (or an improved TPM) is a prerequisite. Certainly! But this TPM is really nothing more than a dongle attached to the pci bus. It