Hi John,

This is excellent news. It for sure can be made part of the tpm-tools 
package. I'll read it carefully and provide back a review/inclusion 
feedback if you're fine with this approach.

Thanks,
Rajiv Andrade
Security Development
IBM Linux Technology Center

On 01/19/2011 06:38 PM, John D. Ramsdell wrote:
> TPM Quote Tools is a collection of programs that provide support for TPM
> based attestation using the TPM quote operation.  I am wondering if this
> user community is interested in this kind of tool suite.  I submitted a
> feature request that includes a source distribution that I hope will
> serve as a starting point for a useful collection of tools.
>
> https://sourceforge.net/tracker/?func=detail&atid=704361&aid=3161939&group_id=126012
>
> John
>
> TPM QUOTE TOOLS(8)                             TPM QUOTE TOOLS(8)
>
>
>
> NAME
>         TPM Quote Tools
>
> PROGRAMS
>         tpm_mkuuid,    tpm_mkaik,    tpm_loadkey,   tpm_unloadkey,
>         tpm_getpcrhash, tpm_updatepcrhash, tpm_getquote, tpm_veri-
>         fyquote
>
> DESCRIPTION
>         TPM  Quote  Tools is a collection of programs that provide
>         support for TPM based  attestation  using  the  TPM  quote
>         operation.
>
>         A  TPM  contains a set of Platform Configuration Registers
>         (PCRs).  In a well configured machine, some of these  reg-
>         isters  are set to known values during the boot up process
>         or at other times.  For example, a PCR might  contain  the
>         hash of a boot loader in memory before it is run.
>
>         The  TPM quote operation is used to authoritatively verify
>         the contents of a TPM's Platform  Configuration  Registers
>         (PCRs).   During  provisioning,  a  composite  hash  of  a
>         selected set of PCRs is computed.  The TPM quote operation
>         produces  a  composite  hash that can be compared with the
>         one computed while provisioning.
>
>         To use the TPM quote operation, keys  must  be  generated.
>         During  provisioning, an Attestation Identity Key (AIK) is
>         generated for each TPM, and the public part of the key  is
>         made available to entities that validate quotes.
>
>         The  TPM  quote operation returns signed data and a signa-
>         ture.  The data that is signed contains the PCRs  selected
>         for  the  operation,  the  composite hash for the selected
>         PCRs, and a nonce provided as input, and used  to  prevent
>         replay  attacks.   At  provisioning time, the data that is
>         signed is stored, not just the composite hash.  The signa-
>         ture is discarded.
>
>         An  entity  that  wishes to evaluate a machine generates a
>         nonce, and sends it along with the set of PCR used to gen-
>         erate  the  composite  PCR hash at provisioning time.  For
>         this use of the TPM quote operation, the  signed  data  is
>         ignored,  and  the  signature returned is used to validate
>         the state of the TPM's PCRs.   Given  the  signature,  the
>         evaluating  entity  replaces  the nonce in the signed data
>         generated at provisioning time, and checks to see  if  the
>         signature  is  valid  for  the  data.   If  so, this check
>         ensures the selected PCRs contain values  that  match  the
>         ones measured during provisioning.
>
>         A  typical  scenario  for  an enterprise using these tools
>         follows.  The tools expect AIKs to be referenced  via  one
>         enterprise-wide Universally Unique Identifier (UUID).  The
>         program tpm_mkuuid creates one.
>
>         For each machine being checked, an AIK  is  created  using
>         tpm_mkaik.   The key blob produced is bound to the UUID on
>         its machine using tpm_loadkey.  The public key  associated
>         with  the  AIK is sent to the entities that verify quotes.
>         Finally, the expected PCR composite hash is obtained using
>         tpm_getpcrhash.   When  the  expected PCR values change, a
>         new hash can be generated with tpm_updatepcrhash.
>
>         The program to obtain a quote, and thus measure  the  cur-
>         rent  state of the PCRs is tpm_getquote.  The program that
>         verifies the quote describes the same PCR  composite  hash
>         as was measured initially is tpm_verifyquote.
>
> SEE ALSO
>         tpm_mkuuid(8),  tpm_mkaik(8),  tpm_loadkey(8), tpm_unload-
>         key(8),      tpm_getpcrhash(8),      tpm_updatepcrhash(8),
>         tpm_getquote(8), tpm_verifyquote(8)
>
>
>
>                               Oct 2010          TPM QUOTE TOOLS(8)
>
> ------------------------------------------------------------------------------
> Protect Your Site and Customers from Malware Attacks
> Learn about various malware tactics and how to avoid them. Understand
> malware threats, the impact they can have on your business, and how you
> can protect your company and customers by using code signing.
> http://p.sf.net/sfu/oracle-sfdevnl
> _______________________________________________
> TrouSerS-users mailing list
> [email protected]
> https://lists.sourceforge.net/lists/listinfo/trousers-users


------------------------------------------------------------------------------
Protect Your Site and Customers from Malware Attacks
Learn about various malware tactics and how to avoid them. Understand 
malware threats, the impact they can have on your business, and how you 
can protect your company and customers by using code signing.
http://p.sf.net/sfu/oracle-sfdevnl
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to