Dear Hal Finney,
Thank you for the feedback. Yes, you are indeed right about the error message - 
its actually a shared library problem which I solved via running : 
#  export LD_LIBRARY_PATH=/usr/local/lib:$LD_LIBRARY_PATHthen I run :# cat 
/home/temp_plain_key | tpm_sealdata -z -p 4 -p 8 -p 9 -p 12 -p14 -o 
/home/sealed_key

Thank you again, for your help.rgdsjyteh.
--- On Sat, 8/14/10, Hal Finney <[email protected]> wrote:

From: Hal Finney <[email protected]>
Subject: Re: [TrouSerS-users] Help in solving error: tpm_sealdata: error while 
loading shared libraries: libtpm_unseal.so.1:
To: "TEH JIA YEW" <[email protected]>
Cc: "[email protected]" 
<[email protected]>
Date: Saturday, August 14, 2010, 1:36 AM

Where did this command tpm_sealdata come from? Where is it located in
the file system? Does the file libtpm_unseal.so.1 exist in a nearby
directory? Probably all you have to do is find the directory holding
this file and add it to your LD_LIBRARY_PATH. That is the usual method
to fix errors where shared libraries are not found.

Hal Finney

On Friday, August 13, 2010, TEH JIA YEW <[email protected]> wrote:
> Dear Users,
> I am a Postgraduate Research Student  working on creating a Rootkit Resistant 
> Filesystem project. I am trying to create a secure loopback partition for 
> securing the linux kernel files as per :
> http://publib.boulder.ibm.com/infocenter/lnxinfo/v3r0m0/index.jsp?topic=/liaai/tpm/liaaitpmstart.htm
> Now, I tried running the "cat /home/temp_plain_key | tpm_sealdata -z -p 4 -p 
> 8 -p 9 -p 12 -p14 -o /home/sealed_key" command trying to use tpm_sealdata 
> tool to seal a generated trusted key to PCR 4,8,9,12,14 of the TPM Emulator 
> ver 0.6.1 and obtained the error: "tpm_sealdata: error while loading shared 
> libraries: libtpm_unseal.so.1:"
>
> TPM Emulator can be found in :
>  https://developer.berlios.de/project/showfiles.php?group_id=2491.
>
> Tried to google for a solution but none found. My system configurations and 
> transactions:
> 1. Guest OS : Ubuntu 9.04 Jaunty running on Virtual Box 3.1.6 with kernel 
> 2.6.30 (IMA &    Tomoyo Linux compiled and enabled) and TrustedGRUB 1.1.4 
> (http://sourceforge.net/projects/trustedgrub) installed and checkfile 
> function enabled to measure hash of all boot related files in /boot, namely 
> System.map initrd and vmlinuz. The Rootkit Resistant Filesystem is built upon 
> this Guest OS.
> 2. Host OS : Ubuntu 9.04 Jaunty
> 3. Trousers 0.3.6 and tpm_tools 1.3.5 successfully installed and compiled 
> from source.
> 4. TPM Emulator module "tpmd_dev" is configured to load at boot time.
> 5. Emulator already has ownership taken and SRK password set by using takeown
>  tool from : 
>http://www.trust.rub.de/projects/linux-device-driver-infineon-tpm/linuxinfineontpmdriver_details#buildingthemodule.
> Pls inform if more info is required. Can some kind user pls help to point out 
> what went wrong and hopefully the solution? I am really stuck here.
> Thanks in advance.
> Rgdsjyteh.
>
>
>
>
>



      
------------------------------------------------------------------------------
This SF.net email is sponsored by 

Make an app they can't live without
Enter the BlackBerry Developer Challenge
http://p.sf.net/sfu/RIM-dev2dev 
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to