> From: Martin Schneider [mailto:martincschnei...@googlemail.com]
> Sent: Monday, August 29, 2011 7:55 AM

Please use the tboot-devel mailing list for discussions and questions; 
tboot-changelog is just for automated notifications from the source code 
control system.

> Hi list,
> 
> I am new to tboot / Intel TXT technology and have some questions, mainly 
> concerning  the role of
> the TPM in the Intel TXT architecture.
> 
> Up to now I went through the "Intel Safer computing Initiative" book by David 
> Grawrock and think I
> have a basic understanding what SINIT
> does: Preparing a secure launch environment for a hypervisor and doing some 
> measurements which are
> put to the TPM of the system. When my understanding is correct, tboot is a 
> specific implementation
> for SINIT for being used with the XEN hypervisor...?

I would say that tboot is a specific implementation of an MLE (Measured 
Launched Environment).  Tboot encapsulates (most of) the TXT-specific knowledge 
so that it can launch an OS or VMM that is only minimally aware of TXT.  Tboot 
works with Linux/KVM as well as with Xen.

> What I absolutely do not understand is the role of the TPM in the 
> architecture. Besides holding
> the measurement values of the SHA-1 fingerprints from SINIT (PCR17) and the 
> hypervisor (PCR18) I
> do not see the need for the TPM. I does not enforce anything or make anything 
> more secure? Or am I
> mistaken here? Actually the TPM is only useful when I want to do some kind of 
> remote attestation
> of my environment.
> The big problem I see is, that I can not use e.g. tboot when no TPM is 
> available? Or am I
> mistaken?

The TPM is fundamental to the TXT architecture.  Without a secure location for 
the measurements made by the TXT hardware, firmware, and software there would 
be no secure way of knowing that TXT was actually used for a launch.  An MLE 
that does not use the TPM measurements for remote attestation or sealing cannot 
really be sure that it was launched with TXT.

> My next big question is: what is different if I use tboot and when I do not. 
> Where is the security
> plus?

If tboot, or some other TXT MLE, is not used then you are left with a static 
root of trust based in BIOS.  David Grawrock's book should describe the 
differences between dynamic and static roots of trust (it is a bit much to go 
into via email).

> It would be very kind of you to de-confuse me a little or point me to some 
> useful reading
> material...
> 
> Best regards
> Martin
> 
> ------------------------------------------------------------------------------
> EMC VNX: the world's simplest storage, starting under $10K The only unified 
> storage solution that
> offers unified management Up to 160% more powerful than alternatives and 25% 
> more efficient.
> Guaranteed. http://p.sf.net/sfu/emc-vnx-dev2dev
> _______________________________________________
> Tboot-changelog mailing list
> tboot-change...@lists.sourceforge.net
> https://lists.sourceforge.net/lists/listinfo/tboot-changelog

------------------------------------------------------------------------------
Special Offer -- Download ArcSight Logger for FREE!
Finally, a world-class log management solution at an even better 
price-free! And you'll get a free "Love Thy Logs" t-shirt when you
download Logger. Secure your free ArcSight Logger TODAY!
http://p.sf.net/sfu/arcsisghtdev2dev
_______________________________________________
tboot-devel mailing list
tboot-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tboot-devel

Reply via email to