[tboot-devel] Error code on Q45 and apparently outdated info in tboot-1.6/docs/txt-info.txt

2011-12-11 Thread tboot-devel
provide a great way to learn Windows Azure and what it provides. You can attend the event by watching it streamed LIVE online. Learn more at http://p.sf.net/sfu/ms-windowsazure ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] Location of the MLE Developers Guide

2011-12-15 Thread tboot-devel
--- > Systems Optimization Self Assessment > Improve efficiency and utilization of IT resources. Drive out cost and > improve service delivery. Take 5 minutes to use this Systems Optimization > Self Assessment. http://www.accelacomm.com/jaw/sdnl/114/51450054/ >

Re: [tboot-devel] tboot + TPM 2.0 + TXT (boot with grub2)

2017-07-13 Thread Marco Vanotti via tboot-devel
EMAIL: g...@enjellic.com > -------- > -- > "... remember that innovation is saying 'no' to 1000 things." > -- Moxie Marlinspike > > ---

Re: [tboot-devel] suspend problem since kernel 5.15

2022-02-01 Thread Łukasz Hawryłko via tboot-devel
can see the issue. This experiment may tell us if hang is related to tboot's shutdown handler or not. Lukasz _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] status of the grub patch to support multiple SINIT modules?

2022-03-11 Thread Łukasz Hawryłko via tboot-devel
is change. It is much better to select proper SINIT during installation that loads all possible ones every boot, only to always choose the same right one. Thanks, Lukasz ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] status of the grub patch to support multiple SINIT modules?

2022-03-11 Thread Łukasz Hawryłko via tboot-devel
re patch for tboot that combined should fix the issue, will you be able to run tests? Thanks, Lukasz _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] status of the grub patch to support multiple SINIT modules?

2022-03-22 Thread Łukasz Hawryłko via tboot-devel
OD_LOAD_PREFERENCE 11 #define MB2_HDR_TAG_REQUIRED 0 #define MB2_HDR_TAG_OPTIONAL 1 ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [PATCH] 20_linux_tboot: efi logic was inverted

2022-06-17 Thread Łukasz Hawryłko via tboot-devel
x27; flag to prevent kernel from using EFI. On non-EFI systems this flag is pointless because kernel can't use EFI services if they do not exist. If removing 'noefi' flag solves your issue, you should find out why. Maybe there is some information that kernel retrieves from EFI

Re: [tboot-devel] [PATCH] Correct IDT exception handler addresses

2022-07-13 Thread Łukasz Hawryłko via tboot-devel
ne > gets properly executed instead of "int_handler - 0x4000". > > NOTE: A simple way to test this is to insert 'asm volatile("ud2");' in > begin_launch(). > Thank you for the patch. Lukasz ___ tboot-devel m

Re: [tboot-devel] TBOOT on a PowerEdge R730 with a TPM2.0

2022-10-10 Thread Łukasz Hawryłko via tboot-devel
your system is ready to enable remote attestation. Thanks, Lukasz _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [Tboot-changelog] changeset in code: Extend low memory range reserved for logs

2022-12-27 Thread Łukasz Hawryłko via tboot-devel
at 0x8c000, this may also conflict with logs. As I said, my testing system does not boot with this patch, I expect that this is not the only one. I don't know the exact motivation on expanding space for logs, but you should consider to do this in another way. Thanks, Lukasz ___

[tboot-devel] Missing "rootflags=subvol=root" for Btrfs

2023-08-16 Thread Heting Wang via tboot-devel
T_20190708_PW.bin ...' module2 /SNB_IVB_SINIT_20190708_PW.bin } smime.p7s Description: S/MIME cryptographic signature ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

[tboot-devel] [RFC] tboot: kernel signature verification

2019-09-19 Thread Paul Moore (pmoore2) via tboot-devel
boot repository once it is more complete? ___________ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-09-27 Thread Paul Moore (pmoore2) via tboot-devel
ture and extend PCRs with signature's public key hash, am I > right? > In this approach tboot is not able to verify if kernel is signed by > proper authority, this need to be done be local/remote attestation in > further boot process. > > Thanks, > Lukasz > > On

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-10-08 Thread Paul Moore (pmoore2) via tboot-devel
heck > > > how > > > it works, idea of measuring kernel signature instead of whole > > > binary > > > is > > > very interesting. I hope that next week I will find some time for > > > that, > > > as you said patch is quite big. > > > >

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-10-18 Thread Paul Moore (pmoore2) via tboot-devel
On Thu, 2019-09-19 at 15:39 +, Paul Moore (pmoore2) via tboot-devel wrote: > Hello, > > I've been working on adding PECOFF/kernel signature verification to > tboot and now that I have a rough working prototype I wanted to bring > it to the list to see if this is something

[tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-05 Thread Paul Moore (pmoore2) via tboot-devel
a LCP using the current sources? Thanks, -Paul _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-05 Thread Paul Moore (pmoore2) via tboot-devel
On Tue, 2019-11-05 at 23:02 +, travis.gilb...@dell.com wrote: > > -Original Message- > > From: Paul Moore (pmoore2) via tboot-devel > de...@lists.sourceforge.net> > > Sent: Tuesday, November 5, 2019 16:50 > > To: lukasz.hawry...@linux.intel.com; > &g

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-07 Thread Paul Moore (pmoore2) via tboot-devel
On Wed, 2019-11-06 at 20:12 +, travis.gilb...@dell.com wrote: > > -Original Message- > > From: Paul Moore (pmoore2) > > Sent: Tuesday, November 5, 2019 19:28 > > To: Gilbert, Travis > > Cc: tboot-devel@lists.sourceforge.net > > Subject: Re: Creati

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-08 Thread Paul Moore (pmoore2) via tboot-devel
't be resolved within the next month or two, is there any reason why we couldn't continue to make changes to the lcptools-v2 tools? -Paul _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-13 Thread Paul Moore (pmoore2) via tboot-devel
...@cisco.com > > > Sent: Friday, November 8, 2019 11:19 > > > To: > > > lukasz.hawry...@linux.intel.com > > > ; Gilbert, Travis > > > Cc: > > > tboot-devel@lists.sourceforge.net > > > > > > Subject: Re: [tboot-devel] Creating

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-13 Thread Paul Moore (pmoore2) via tboot-devel
On Wed, 2019-11-13 at 17:17 +, travis.gilb...@dell.com wrote: > > -Original Message- > > From: Paul Moore (pmoore2) > > Sent: Wednesday, November 13, 2019 09:51 > > To: lukasz.hawry...@linux.intel.com; Gilbert, Travis > > Cc: tboot-devel@lists.sourcefor

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-11-15 Thread Paul Moore (pmoore2) via tboot-devel
ools-v2. > > > On Wed, 2019-11-13 at 17:15 +, travis.gilb...@dell.com wrote: > > > -Original Message- > > > From: Lukasz Hawrylko < > > > lukasz.hawry...@linux.intel.com > > > Sent: Wednesday, November 13, 2019 08:24 > > > T

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-11-20 Thread Paul Moore (pmoore2) via tboot-devel
On Fri, 2019-10-18 at 13:27 +, Paul Moore (pmoore2) via tboot-devel wrote: > On Thu, 2019-09-19 at 15:39 +, Paul Moore (pmoore2) via > tboot-devel wrote: > > Hello, > > > > I've been working on adding PECOFF/kernel signature verification to > > tboot

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-04 Thread Paul Moore (pmoore2) via tboot-devel
rst problem that I found. At > least, you should check if pointer to next element in chain is not > NULL. ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-05 Thread Paul Moore (pmoore2) via tboot-devel
On Wed, 2019-12-04 at 14:33 +, Paul Moore (pmoore2) via tboot-devel wrote: > On Mon, 2019-12-02 at 14:09 +0100, Lukasz Hawrylko wrote: > > If VLP is present under its own index (for TPM 2.0 it is > > 0x01C10131), > > tboot will not read LCP at all, so certificate will

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-06 Thread Paul Moore (pmoore2) via tboot-devel
I'm assuming it is the VLP we loaded directly, and not from > > inside > > the LCP, but thought it was worth checking. > > > > In "stock" TBOOT, VLP loaded from its own index has higher priority > over > one embedded in LCP, so I agree with you that here it should work like > that. > > Thanks, > Lukasz > ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-17 Thread Paul Moore (pmoore2) via tboot-devel
language :) No worries, no offense was taken, I just wanted to make sure that the expectations were set appropriately. Also, I just wanted to say that your English is just fine, it's *far* better than my Polish ;) -Paul ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-17 Thread Paul Moore (pmoore2) via tboot-devel
On Fri, 2019-12-06 at 21:28 +, Paul Moore (pmoore2) via tboot-devel wrote: > On Fri, 2019-12-06 at 11:37 +0100, Lukasz Hawrylko wrote: > > On Wed, 2019-12-04 at 14:33 +, Paul Moore (pmoore2) wrote: > > > Can you elaborate a bit more on what you mean by "the ro

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-17 Thread Paul Moore (pmoore2) via tboot-devel
need to generate a new LCP to contain the certificate payload, why not store the VLP in the LCP at that point? Is there any advantage to storing the VLP directly in the TPM and not in the LCP? -Paul ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] [RFC] tboot: kernel signature verification

2019-12-21 Thread Paul Moore (pmoore2) via tboot-devel
ave a LCP to carry the certificates. Not to mention the benefits of a signed LCP allowing you to update the policy without updating the values stored in the TPM nvindex (assuming the same policy signing key). > > Is there any advantage to storing the VLP directly in the TPM and

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2019-12-23 Thread Paul Moore (pmoore2) via tboot-devel
On Wed, 2019-11-06 at 20:12 +, travis.gilb...@dell.com wrote: > > -Original Message- > > From: Paul Moore (pmoore2) > > Sent: Tuesday, November 5, 2019 19:28 > > To: Gilbert, Travis > > Cc: tboot-devel@lists.sourceforge.net > > Subject: Re: Creati

[tboot-devel] VLP policy and TPM2 hash agility

2020-01-02 Thread Paul Moore (pmoore2) via tboot-devel
lgen seems limited to using SHA1, does anyone have any patches to use SHA256 (or another hash)? -Paul _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] VLP policy and TPM2 hash agility

2020-01-03 Thread Paul Moore (pmoore2) via tboot-devel
On Thu, 2020-01-02 at 22:27 +, Paul Moore (pmoore2) via tboot-devel wrote: > I hope everyone had a nice holiday and is enjoying the new year thus > far. > > As you've seen in the other thread, I'm playing around with different > tboot/TXT policies and I have a que

Re: [tboot-devel] VLP policy and TPM2 hash agility

2020-01-03 Thread Paul Moore (pmoore2) via tboot-devel
On Fri, 2020-01-03 at 20:07 +, Paul Moore (pmoore2) via tboot-devel wrote: > On Thu, 2020-01-02 at 22:27 +, Paul Moore (pmoore2) via tboot- > devel > wrote: > > I hope everyone had a nice holiday and is enjoying the new year thus > > far. > > > > As you

Re: [tboot-devel] Creating a TXT/tboot policy suitable for a modern system with TXT+TPM2

2020-01-09 Thread Paul Moore (pmoore2) via tboot-devel
On Mon, 2019-12-23 at 21:20 +, Paul Moore (pmoore2) via tboot-devel wrote: > It appears that lcptools-v2 doesn't understand the "pconf" type ... I just added a new "pconf2" policy element type to lcptools-v2 so you can generate a LCP_PCONF_ELEMENT2 without havin

Re: [tboot-devel] VLP policy and TPM2 hash agility

2020-01-13 Thread Paul Moore (pmoore2) via tboot-devel
On Thu, 2020-01-09 at 14:59 +, Hawrylko, Lukasz wrote: On Fri, 2020-01-03 at 20:26 +, Paul Moore (pmoore2) via tboot-devel wrote: On Fri, 2020-01-03 at 20:07 +, Paul Moore (pmoore2) via tboot-devel wrote: On Thu, 2020-01-02 at 22:27 +, Paul Moore (pmoore2) via tboot- devel

Re: [tboot-devel] VLP policy and TPM2 hash agility

2020-01-13 Thread Paul Moore (pmoore2) via tboot-devel
On Mon, 2020-01-13 at 20:33 +, Paul Moore (pmoore2) via tboot-devel wrote: On Thu, 2020-01-09 at 14:59 +, Hawrylko, Lukasz wrote: On Fri, 2020-01-03 at 20:26 +, Paul Moore (pmoore2) via tboot-devel wrote: On Fri, 2020-01-03 at 20:07 +, Paul Moore (pmoore2) via tboot-devel wrote

Re: [tboot-devel] VLP policy and TPM2 hash agility

2020-01-15 Thread Paul Moore (pmoore2) via tboot-devel
at 00:18 +, Paul Moore (pmoore2) wrote: > > > > On Mon, 2020-01-13 at 20:33 +, Paul Moore (pmoore2) via > > > > tboot-devel wrote: > > > > > On Thu, 2020-01-09 at 14:59 +, Hawrylko, Lukasz wrote: > > > > > > On Fri, 2020-01-03 at 20:26

Re: [tboot-devel] Intel TXT + TBOOT + TPM 2.0: can't get LCP_ANY policy working on Supermicro X11SPM-TF

2020-02-04 Thread Paul Moore (pmoore2) via tboot-devel
closer to a working system. I'm in the process of writing up some better notes, I'll send a note to the list when they are available. Good luck! -Paul _______ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

Re: [tboot-devel] Intel TXT + TBOOT + TPM 2.0: can't get LCP_ANY policy working on Supermicro X11SPM-TF

2020-02-04 Thread Paul Moore (pmoore2) via tboot-devel
the tboot code to debug this further. If you haven't found it already, a good starting point is the tboot/common/policy.c:set_policy() function. > De : Paul Moore (pmoore2) > Envoyé : mardi 4 février 2020 15:44 > À : LE ROY Olivier - Contractor; tboot-devel@lists.sourceforge.net > Ob

[tboot-devel] Update on my tboot kernel signature verification work

2020-02-05 Thread Paul Moore (pmoore2) via tboot-devel
his work will prove helpful, even if it is just the information in README.md. Thanks for all your help over the past year! -Paul ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel

[tboot-devel] Issue with grub2-2.02-0.86 and tboot-1.9.11

2021-04-28 Thread LE ROY Olivier - Contractor via tboot-devel
rance ___ tboot-devel mailing list tboot-devel@lists.sourceforge.net https://lists.sourceforge.net/lists/listinfo/tboot-devel