Dear Hal Finney, Thank you for the feedback. Yes, you are indeed right about the error message - its actually a shared library problem which I solved via running : # export LD_LIBRARY_PATH=/usr/local/lib:$LD_LIBRARY_PATHthen I run :# cat /home/temp_plain_key | tpm_sealdata -z -p 4 -p 8 -p 9 -p 12 -p14 -o /home/sealed_key
Thank you again, for your help.rgdsjyteh. --- On Sat, 8/14/10, Hal Finney <[email protected]> wrote: From: Hal Finney <[email protected]> Subject: Re: [TrouSerS-users] Help in solving error: tpm_sealdata: error while loading shared libraries: libtpm_unseal.so.1: To: "TEH JIA YEW" <[email protected]> Cc: "[email protected]" <[email protected]> Date: Saturday, August 14, 2010, 1:36 AM Where did this command tpm_sealdata come from? Where is it located in the file system? Does the file libtpm_unseal.so.1 exist in a nearby directory? Probably all you have to do is find the directory holding this file and add it to your LD_LIBRARY_PATH. That is the usual method to fix errors where shared libraries are not found. Hal Finney On Friday, August 13, 2010, TEH JIA YEW <[email protected]> wrote: > Dear Users, > I am a Postgraduate Research Student working on creating a Rootkit Resistant > Filesystem project. I am trying to create a secure loopback partition for > securing the linux kernel files as per : > http://publib.boulder.ibm.com/infocenter/lnxinfo/v3r0m0/index.jsp?topic=/liaai/tpm/liaaitpmstart.htm > Now, I tried running the "cat /home/temp_plain_key | tpm_sealdata -z -p 4 -p > 8 -p 9 -p 12 -p14 -o /home/sealed_key" command trying to use tpm_sealdata > tool to seal a generated trusted key to PCR 4,8,9,12,14 of the TPM Emulator > ver 0.6.1 and obtained the error: "tpm_sealdata: error while loading shared > libraries: libtpm_unseal.so.1:" > > TPM Emulator can be found in : > https://developer.berlios.de/project/showfiles.php?group_id=2491. > > Tried to google for a solution but none found. My system configurations and > transactions: > 1. Guest OS : Ubuntu 9.04 Jaunty running on Virtual Box 3.1.6 with kernel > 2.6.30 (IMA & Tomoyo Linux compiled and enabled) and TrustedGRUB 1.1.4 > (http://sourceforge.net/projects/trustedgrub) installed and checkfile > function enabled to measure hash of all boot related files in /boot, namely > System.map initrd and vmlinuz. The Rootkit Resistant Filesystem is built upon > this Guest OS. > 2. Host OS : Ubuntu 9.04 Jaunty > 3. Trousers 0.3.6 and tpm_tools 1.3.5 successfully installed and compiled > from source. > 4. TPM Emulator module "tpmd_dev" is configured to load at boot time. > 5. Emulator already has ownership taken and SRK password set by using takeown > tool from : >http://www.trust.rub.de/projects/linux-device-driver-infineon-tpm/linuxinfineontpmdriver_details#buildingthemodule. > Pls inform if more info is required. Can some kind user pls help to point out > what went wrong and hopefully the solution? I am really stuck here. > Thanks in advance. > Rgdsjyteh. > > > > >
------------------------------------------------------------------------------ This SF.net email is sponsored by Make an app they can't live without Enter the BlackBerry Developer Challenge http://p.sf.net/sfu/RIM-dev2dev
_______________________________________________ TrouSerS-users mailing list [email protected] https://lists.sourceforge.net/lists/listinfo/trousers-users
