Replies: 3 comments 2 replies
-
Other than using the host's hardware TPM as a certificate authority for issuing the TPM's EK and platform certificates there is no other (known) way of using the hardware TPM for securing keys, performing crypto ops etc. of swtpm.
This option is for creating an encrypted TPM state file and the file descriptor passed here must be for a file containing the key to use for state file encryption/decryption (symmetric key). From the manpage:
|
Beta Was this translation helpful? Give feedback.
-
Hello, Thank you for your answer ! and sorry for my late reply :( About the first part, well it could be interesting to use an external CA : the hardware TPM chips or a know/trusted local CA. About the second part, thank you, indeed I was not sure, but now I'm, not related to the initial question. |
Beta Was this translation helpful? Give feedback.
-
Hello, Thank you again. Well I have managed to work with a custom CA, and do some tpm hardware and software operations. But, sadly, I must miss understood something (not only one, i know) : how, in the VM, the user could checks that the ek certificate of the swtpm is coming from a CA sign by the hardware tpm ? Is it possible at least ? Hope you have some time to point me to the right direction. Regards, Ben |
Beta Was this translation helpful? Give feedback.
-
Hello,
First thank you for this software, really impressive.
Well I have a question : is there any way to use the hardware tpm of the host to "protect" the swtpm ?
Any research or idea in this direction ?
Perhaps with swtpm_setup --keyfile-fd ? Or I miss understand this options ?
Thank you in advance.
Regards,
Beta Was this translation helpful? Give feedback.
All reactions