• thingsiplay@beehaw.org
    link
    fedilink
    arrow-up
    18
    arrow-down
    1
    ·
    6 days ago

    The intent was on better TPM security after a prior security demonstration showed TPM key recovery from Microsoft Windows BitLocker as well as TPM sniffing attacks.

    I am not sure if this is a good change. Isn’t this “dangerous”?

    The hope is that now it’s disabled by default, the Linux kernel developers can spend more time evaluating the security benefits and performance optimizations to make it worthwhile to re-enabled by default in a future Linux kernel version.

    I’m confused. They disable security feature and then want spend time on the benefits and performance optimizations, to possible enable it again?

    • Truscape@lemmy.blahaj.zone
      link
      fedilink
      arrow-up
      38
      arrow-down
      1
      ·
      6 days ago

      The TPM 2.0 implementation (mandated by Microsoft) is flawed. That much is certain.

      If you’d like to know more details about the “benefits” and vulnerabilities of the standard, feel free to read the relevant wikipedia article: https://en.wikipedia.org/wiki/Trusted_Platform_Module

      In my personal opinion, the TPM as a whole seems like a “solution in search of a problem”, and developments that were able to foil its protection as early as 2010 from state and non-state actors should be a massive red flag.

      • Possibly linux@lemmy.zip
        link
        fedilink
        English
        arrow-up
        4
        ·
        4 days ago

        Physical security is very hard

        TPM is a useful to help ensure physical security. TPM isn’t perfect but it is decent for what it is.

        • eleitl@lemmy.zip
          link
          fedilink
          arrow-up
          5
          ·
          4 days ago

          That assumes you can trust the unauditable. I can only accept open hardware, with verification of random samples.

    • nomad@infosec.pub
      link
      fedilink
      arrow-up
      7
      ·
      6 days ago

      If you use TPM for signing, that is not an issue most of the time. But if you store decryption keys for a storage device there that’s not a good idea.

            • nomad@infosec.pub
              link
              fedilink
              arrow-up
              2
              ·
              5 days ago

              AFAIK there is. But even if not, it simulates a keyboard which can input your passphrase. Also modification of the initrd is a matter of providing a bash script or binary to launch which returns the passphrase in the crypttab file and adding it to the correct directory.

              • Mihies@programming.dev
                link
                fedilink
                arrow-up
                2
                ·
                5 days ago

                From what I read so far, hardware key is just another way to decrypting, not the required. So it’s just a convenient method to avoid typing a (long) password and instead just few PIN chars. So, if somebody gets hold of password, can still decrypt the disk even without the hardware key. Not perfect, but still better than only password.