On Sat, Jan 05, 2019 at 07:22:36PM -0800, Mat wrote:

Good morning, I hope the week is starting well for everyone.

> How would a device vendor use tboot to implement secure/trusted boot
> on their networking devices like routers and switches?
>
> If someone can also clarify diff between secure boot and trusted
> boot, when to use what.

Let me invert the order of these questions and then expand on the
former.

Simplistically, secure boot is a firmware based solution for
implementing cryptographically signed boot images.  A public key is
available to the firmware that is used to authenticate the signature
on a kernel image.  This provides a platform security architect an
assurance that the system has been booted with a known state of an
operating system image.

TBOOT is the software component of a larger body of technology
referred to as Trusted eXecution Technology (TXT).  It is a cohort of
processor/chipset/hardware/software technology that provides a
framework for validating that the platform is in a known state up to
and through the operating system load.

The intent of both technologies is to provide a 'root of trust' that
platform architects can use to create inferences (attestations) about
the integrity of an application stack running on a platform.
TXT/tboot provides a more comprehensive guarantee as to the quality of
that trust root.

How to effectively leverage this 'root of trust' to create a secure
device is a large, complex and arguably immature topic.  I direct
engineering for a company that uses both of these technologies, and to
a much larger extent Intel's Software Guard Extensions (SGX), to
provide platform security guarantees for devices such as you describe.
We refer, generically, to these types of devices as Intelligent
Network Endpoint Devices (INED's).

We use a trust root to support something we refer to as Autonomous
Introspection (the 'other' AI).  The notion of AI involves running a
modeling engine that can make deterministic decisions about whether or
not the platform is operating in a manner consistent with the intent
of the developer.  If not, the introspection engine can take very
precise and targeted actions in order to discipline the context of
execution that is attempting to engage in an extra-dimensional
behavior.

Technically, neither TXT/Tboot or Secure Boot, make a platform
'secure'.  What they provide is a guarantee that there is a known
'good' state on which a security architecture can be crafted.

> -c

Hopefully the above is a helpful summary.  We can go into more detail
on any of these issues if you have more specific questions.

Have a good remainder of the week.

Dr. Greg

As always,
Dr. G.W. Wettstein, Ph.D.   Enjellic Systems Development, LLC.
4206 N. 19th Ave.           Specializing in information infra-structure
Fargo, ND  58102            development.
PH: 701-281-1686
FAX: 701-281-3949           EMAIL: g...@enjellic.com
------------------------------------------------------------------------------
"Human beings, who are almost unique in having the ability to learn
 from the experience of others, are also remarkable for their apparent
 disinclination to do so."
                                -- Douglas Adams


_______________________________________________
tboot-devel mailing list
tboot-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/tboot-devel

Reply via email to