Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-08 Thread Travis.Gilbert
> -Original Message- > From: Paul Moore (pmoore2) > Sent: Friday, November 8, 2019 11:19 > To: lukasz.hawry...@linux.intel.com; Gilbert, Travis > Cc: tboot-devel@lists.sourceforge.net > Subject: Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern > system with TXT+TPM2 >

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-06 Thread Travis.Gilbert
> -Original Message- > From: Paul Moore (pmoore2) > Sent: Tuesday, November 5, 2019 19:28 > To: Gilbert, Travis > Cc: tboot-devel@lists.sourceforge.net > Subject: Re: Creating a TXT/tboot policy suitable for a modern system with > TXT+TPM2 > > On Tue, 2019-11-05 at 23:02 +,

Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control policy

2018-08-02 Thread Travis.Gilbert
> -Original Message- > From: Sant Y [mailto:satish.va...@gmail.com] > Sent: Thursday, August 2, 2018 10:59 > To: Gilbert, Travis > Cc: tboot-devel@lists.sourceforge.net > Subject: Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control > policy > > On Thu, Aug 2, 2018 at 3:35 AM,

Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control policy

2018-08-01 Thread Travis.Gilbert
> -Original Message- > From: Sant Y [mailto:satish.va...@gmail.com] > Sent: Monday, July 30, 2018 07:41 > To: Gilbert, Travis > Cc: tboot-devel@lists.sourceforge.net > Subject: Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control > policy > > On Sat, Jul 21, 2018 at 6:54 PM, Sant Y

Re: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control policy

2018-07-20 Thread Travis.Gilbert
>From: Sant Y [mailto:satish.va...@gmail.com] >Sent: Friday, July 20, 2018 05:03 >To: tboot-devel@lists.sourceforge.net >Subject: [tboot-devel] Fwd: TXT/TPM 2.0 and tboot Launch control policy > >Hello tboot devs! > >I wish to revive this old discussion, on generating LCP for TPM2. There were

Re: [tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch

2017-08-01 Thread Travis.Gilbert
Dell - Internal Use - Confidential > -Original Message- > From: Xiao Li [mailto:xiao.li@gmail.com] > Sent: Sunday, July 23, 2017 19:53 > To: Gilbert, Travis > Cc: tboot-devel@lists.sourceforge.net > Subject: Re: [tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch

Re: [tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch

2017-07-19 Thread Travis.Gilbert
> -Original Message- > From: Gilbert, Travis > Sent: Wednesday, July 19, 2017 12:02 > To: tboot-devel@lists.sourceforge.net > Subject: [tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch > > This is a significant patch that corrects omissions I found in the lcptools-v2 > utilities. It adds

[tboot-devel] [patch] TPM2.0 LCPv2 Tool Patch

2017-07-19 Thread Travis.Gilbert
Dell - Internal Use - Confidential This is a significant patch that corrects omissions I found in the lcptools-v2 utilities. It adds definitions based on the Intel TXT Software Development Guide

Re: [tboot-devel] tboot + TPM 2.0 + TXT (boot with grub2)

2017-07-13 Thread Travis.Gilbert
I found during my investigations that the TPM 2.0 versions of the LCP tools (in lcptools-v2) aren’t writing fully valid policies. One of the first things I encountered is that with a newer Intel ACM, it noticed that my generated policies had their algorithm set (SHA-256 = 0xB), but the allowed

[tboot-devel] [patch] grub2 20_linux_*tboot config files

2017-07-03 Thread Travis.Gilbert
This patch adds a check for the grub2 location of grub-mkconfig_lib. I'm not sure this is the best place to be patching this based on my perusing of grub2's files, but I couldn't see a better way. At least for a default Xen SLES 12 SP2 this fixes errors with grub2-mkconfig after a "make

[tboot-devel] [patch]

2017-07-03 Thread Travis.Gilbert
Housekeeping patch to ignore TPM 2.0 LCP tool binaries. Signed-off-by: Travis Gilbert --- a/.hgignore Tue Jun 20 10:03:48 2017 -0700 +++ b/.hgignore Mon Jul 03 14:17:19 2017 -0500 @@ -44,6 +44,11 @@ ^lcptools/lcp_crtpolelt$ ^lcptools/lcp_crtpollist$

Re: [tboot-devel] TPM 2.0 + TXT + EFI tboot

2016-12-15 Thread Travis.Gilbert
Okay new update. I tracked the issue down to the ACM saying the PO hash algorithm mask is 0. Here is the script I'm running to create and write the policy. I'm passing the algorithm in to the lcp2_crtpol command. Why isn't it writing that to the algorithm mask? I'm currently analyzing the

Re: [tboot-devel] TPM 2.0 + TXT + EFI tboot

2016-12-13 Thread Travis.Gilbert
Dell - Internal Use - Confidential > -Original Message- > From: Dr. Greg Wettstein [mailto:g...@wind.enjellic.com] > Sent: Friday, December 9, 2016 02:33 > To: Gilbert, Travis ; tboot- > de...@lists.sourceforge.net > Cc: bluc...@sgi.com > Subject: Re: