-
-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Use TPM2_Quote for attestation #1480
Comments
@DemiMarie Not directly related but #135 (comment) was replicated and works. Also note that tpm-luks is a thing on which we could potentially try to comply to, so that unsealing of nvram based on sealed secret could be unsealed without heads having to construct cpio and pass to kexec. Rohde-Schwarz/TrustedGRUB2#2 As for Quote, we would have to make the code compliant for both TPM1.2/TPM2 cases, which needs time and effort. Related to #1550 |
This is a great idea. The Nitrokey firmware will have to support this sort of challenge-response in addition to the reverse HOTP mode we currently use (init with the desired PCR state and public key, challenge with a nonce, respond with the quote including the nonce). Seems like something it could do, I couldn't guess the complexity through as I have not dug into the Nitrokey firmware before. |
Password + TPM would be ideal, but only discrete TPMs provide strong enough protection to allow weak passwords to be used. |
Is your feature request related to a problem? Please describe.
TOTP requires synchronizing time, and HOTP requires synchronizing state.
Describe the solution you'd like
Use TPM2_Quote for attestation. TPM2_Quote signs a set of PCRs and a nonce with a key in the TPM. It is possible to have a key that can only be used for TPM2_Quote and cannot be exported from the TPM.
Describe alternatives you've considered
None.
Additional context
This is more secure than TOTP or HOTP for two reasons:
The text was updated successfully, but these errors were encountered: