Re: [PATCH v6 6/6] security: keys: trusted: implement counter/timer policy

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, 2020-03-03 at 22:08 +0200, Jarkko Sakkinen wrote:
> On Mon, Mar 02, 2020 at 07:27:59AM -0500, James Bottomley wrote:
> > This is actually a generic policy allowing a range of comparisons
> > against any value set in the TPM Clock, which includes things like
> > the reset count, a monotonic millisecond count and the restart
> > count.  The most useful comparison is against the millisecond count
> > for expiring keys.  However, you have to remember that currently
> > Linux doesn't try to sync the epoch timer with the TPM, so the
> > expiration is actually measured in how long the TPM itself has been
> > powered on ... the TPM timer doesn't count while the system is
> > powered down.  The millisecond counter is a u64 quantity found at
> > offset 8 in the timer structure, and the <= comparision operand is
> > 9, so a policy set to expire after the TPM has been up for 100
> > seconds would look like
> > 
> > 0000016d00000000000f424000080009
> > 
> > Where 0x16d is the counter timer policy code and 0xf4240 is 100 000
> > in hex.
> > 
> > Signed-off-by: James Bottomley <James.Bottomley@HansenPartnership.c
> > om>
> 
> It is techincally possible to merge 1-5 without this and have
> something functional?

Yes: it just adds to the policy types we understand, but we can still
do password and PCR policies without this.

James




[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]
[Index of Archives]     [Linux Kernel]     [Linux Kernel Hardening]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux SCSI]

  Powered by Linux