grub-devel.gnu.org archive mirror
 help / color / mirror / Atom feed
From: James Bottomley <jejb@linux.ibm.com>
To: The development of GNU GRUB <grub-devel@gnu.org>
Cc: Gary Lin <glin@suse.com>,
	Hernan Gatta <hegatta@linux.microsoft.com>,
	Daniel Axtens <dja@axtens.net>,
	Daniel Kiper <daniel.kiper@oracle.com>,
	shkhisti@microsoft.com, jaskaran.khurana@microsoft.com,
	christopher.co@microsoft.com, daniel.mihai@microsoft.com,
	jaredz@redhat.com, development@efficientek.com, mchang@suse.com
Subject: Re: [PATCH v8 16/22] tpm2: Support authorized policy
Date: Wed, 07 Feb 2024 09:45:41 +0000	[thread overview]
Message-ID: <83b60c5a18db39f79fa6a48df0d8c89911ff0cfa.camel@linux.ibm.com> (raw)
In-Reply-To: <20240206061211.nmri5s6vcjdceh7i@GaryLaptop>

On Tue, 2024-02-06 at 14:12 +0800, Gary Lin via Grub-devel wrote:
> On Mon, Feb 05, 2024 at 08:48:53AM +0000, James Bottomley wrote:
[...]
> > It was for two reasons: 1) so we all derive the same parent for
> > interoperability and 2) because some TPMs take forever to derive an
> > RSA primary (my current one takes 7s and my previous one took 50s)
> > 
> The default template of SRK is inherited from the original TPM
> patches. Besides, we got some opinions against ECC during internal
> review, so RSA remains default. As for grub2, there is an option for
> the SRK algorithm:
> 
> https://github.com/lcp/grub2/blob/tpm2-unlock-v9/grub-core/tpm2/module.c#L134-L145
> https://github.com/lcp/grub2/blob/tpm2-unlock-v9/grub-core/tpm2/args.c#L79-L138
> 
> So that the user can choose the preferred SRK algorithm like this:
> 
> tpm2_key_protector_init -a ECC_NIST_P256 -T sealed.tpm
> 
> Although the user still can specify the SRK template with the
> persistent handles, I'd try not to occupy those handles since those
> are limited resources. Is it possible to relax the standard a bit to
> allow the SRK algorithm to be chosen?


It's still an evolving standard, so anything reasonable can be added. 
However, what I (and the other people using it) want is that everything
be seamless (the key file says everything and the user doesn't need to
select anything), so if we add an RSA EC primary derivation, everything
just works without the user having to know (so it needs to be a
property in the key file).  If you can come up with a way of doing
this, absolutely it can be added.

James


_______________________________________________
Grub-devel mailing list
Grub-devel@gnu.org
https://lists.gnu.org/mailman/listinfo/grub-devel

  reply	other threads:[~2024-02-07  9:47 UTC|newest]

Thread overview: 43+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-01-16  9:20 [PATCH v8 00/22] Automatic Disk Unlock with TPM2 Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 01/22] posix_wrap: tweaks in preparation for libtasn1 Gary Lin via Grub-devel
2024-01-17  1:47   ` Vladimir 'phcoder' Serbinenko
2024-01-16  9:20 ` [PATCH v8 02/22] libtasn1: import libtasn1-4.19.0 Gary Lin via Grub-devel
2024-01-17  1:47   ` Vladimir 'phcoder' Serbinenko
2024-01-16  9:20 ` [PATCH v8 03/22] libtasn1: disable code not needed in grub Gary Lin via Grub-devel
2024-01-17  2:28   ` Vladimir 'phcoder' Serbinenko
2024-01-17  8:15     ` Gary Lin via Grub-devel
2024-01-18  8:37       ` Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 04/22] libtasn1: changes for grub compatibility Gary Lin via Grub-devel
2024-01-17  2:51   ` Vladimir 'phcoder' Serbinenko
2024-01-18  6:54     ` Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 05/22] libtasn1: compile into asn1 module Gary Lin via Grub-devel
2024-01-17  2:30   ` Vladimir 'phcoder' Serbinenko
2024-01-16  9:20 ` [PATCH v8 06/22] test_asn1: test module for libtasn1 Gary Lin via Grub-devel
2024-01-17  2:55   ` Vladimir 'phcoder' Serbinenko
2024-01-18  6:56     ` Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 07/22] libtasn1: Add the documentation Gary Lin via Grub-devel
2024-01-17  2:56   ` Vladimir 'phcoder' Serbinenko
2024-01-16  9:20 ` [PATCH v8 08/22] protectors: Add key protectors framework Gary Lin via Grub-devel
2024-01-17  2:58   ` Vladimir 'phcoder' Serbinenko
2024-01-18  7:02     ` Gary Lin via Grub-devel
2024-01-19  9:14       ` Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 09/22] tpm2: Add TPM Software Stack (TSS) Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 10/22] protectors: Add TPM2 Key Protector Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 11/22] cryptodisk: Support key protectors Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 12/22] util/grub-protect: Add new tool Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 13/22] tpm2: Add TPM2 types, structures, and command constants Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 14/22] tpm2: Add more marshal/unmarshal functions Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 15/22] tpm2: Implement more TPM2 commands Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 16/22] tpm2: Support authorized policy Gary Lin via Grub-devel
2024-01-16 15:39   ` James Bottomley
2024-01-17  8:13     ` Gary Lin via Grub-devel
2024-02-05  7:27       ` Gary Lin via Grub-devel
2024-02-05  8:48         ` James Bottomley
2024-02-06  6:12           ` Gary Lin via Grub-devel
2024-02-07  9:45             ` James Bottomley [this message]
2024-01-16  9:20 ` [PATCH v8 17/22] protectors: Implement NV index Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 18/22] cryptodisk: Fallback to passphrase Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 19/22] cryptodisk: wipe out the cached keys from protectors Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 20/22] diskfilter: look up cryptodisk devices first Gary Lin via Grub-devel
2024-01-16  9:20 ` [PATCH v8 21/22] tpm2: Enable tpm2 module for grub-emu Gary Lin via Grub-devel
2024-01-16  9:21 ` [PATCH v8 22/22] tests: Add tpm2_test Gary Lin via Grub-devel

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=83b60c5a18db39f79fa6a48df0d8c89911ff0cfa.camel@linux.ibm.com \
    --to=jejb@linux.ibm.com \
    --cc=christopher.co@microsoft.com \
    --cc=daniel.kiper@oracle.com \
    --cc=daniel.mihai@microsoft.com \
    --cc=development@efficientek.com \
    --cc=dja@axtens.net \
    --cc=glin@suse.com \
    --cc=grub-devel@gnu.org \
    --cc=hegatta@linux.microsoft.com \
    --cc=jaredz@redhat.com \
    --cc=jaskaran.khurana@microsoft.com \
    --cc=mchang@suse.com \
    --cc=shkhisti@microsoft.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).