vtpmmgr: add TPM group support
authorDaniel De Graaf <dgdegra@tycho.nsa.gov>
Mon, 21 Apr 2014 17:22:57 +0000 (13:22 -0400)
committerIan Campbell <ian.campbell@citrix.com>
Wed, 23 Apr 2014 10:56:41 +0000 (11:56 +0100)
commit5c3705c900581af6f30be124ab8fb64603bdca03
tree2e294b8b79eaf2ba317d423f9f13bd1c9e89bd70
parent0b182202fef8ebfc093a00ead9414a683eb8807c
vtpmmgr: add TPM group support

This is a complete rewrite of the disk format and key hierarchy for the
TPM Manager. The new format supports multiple groups of vTPMs which
define the permitted configurations where a given vTPM's keys are
available, allowing upgrades of critical components while retaining the
secrecy of cryptographic keys.

New features of the TPM Manager are explained in the README and in the
definitions of the management commands in vtpm_manager.h.

New features for vTPMs:

1. The size of the state blob for a vTPM is expanded from 52 to 64
bytes in order to support future vTPMs using SHA-2/3 instead of SHA-1.

2. vTPMs can obtain a quote from the physical TPM with certain
resettable PCRs set to include information about the vTPM. This can be
used by a vTPM to provide evidence of its integrity, including the
secrecy of its EK, and for deep quotes.

Some additional changes made by this rewrite that may impact existing
users:

1. The value of WELLKNOWN_OWNER_AUTH was incorrect for the physical TPM;
the convention is to use all zero bits for well-known authentication
values, not all one bits.

2. Randomly generating the owner auth value for the physical TPM is no
longer supported, as it prevents later creation or certification of
AIKs (which the old manager did not support).

3. The vTPM Manager needs to be provisioned with a PCR composite and an
upgrade authority's public key before it will save data across boots.

The current implementation still has some limitations:
 * 5 valid system PCR selections per group
 * The vTPM Manager's disk can use at most 2MB of space
 * The vTPM domain's build hash is always set to null/zero

Most of the code relating to upgrade and rollback protection is
currently stubbed out, but future versions can add:
 * Support for using the TPM's monotonic counter to prevent rollback
   of vTPM data by taking and restoring disk snapshots
 * Masking the master disk encryption key using a value stored in the
   TPM's NVRAM so that revocation of old data is possible without
   relying on all previously authorized software stacks to respect the
   monotonic counter's value

Signed-off-by: Daniel De Graaf <dgdegra@tycho.nsa.gov>
Acked-by: Ian Campbell <ian.campbell@citrix.com>
33 files changed:
docs/misc/vtpm-platforms.txt [new file with mode: 0644]
docs/misc/vtpm.txt
docs/misc/vtpmmgr.txt [new file with mode: 0644]
stubdom/vtpm/README [deleted file]
stubdom/vtpmmgr/Makefile
stubdom/vtpmmgr/README [deleted file]
stubdom/vtpmmgr/disk_crypto.c [new file with mode: 0644]
stubdom/vtpmmgr/disk_crypto.h [new file with mode: 0644]
stubdom/vtpmmgr/disk_format.h [new file with mode: 0644]
stubdom/vtpmmgr/disk_io.c [new file with mode: 0644]
stubdom/vtpmmgr/disk_io.h [new file with mode: 0644]
stubdom/vtpmmgr/disk_read.c [new file with mode: 0644]
stubdom/vtpmmgr/disk_tpm.c [new file with mode: 0644]
stubdom/vtpmmgr/disk_tpm.h [new file with mode: 0644]
stubdom/vtpmmgr/disk_write.c [new file with mode: 0644]
stubdom/vtpmmgr/endian_int.h [new file with mode: 0644]
stubdom/vtpmmgr/init.c
stubdom/vtpmmgr/log.h
stubdom/vtpmmgr/marshal.h
stubdom/vtpmmgr/mgmt_authority.c [new file with mode: 0644]
stubdom/vtpmmgr/mgmt_authority.h [new file with mode: 0644]
stubdom/vtpmmgr/tcg.h
stubdom/vtpmmgr/tpm.c
stubdom/vtpmmgr/tpm.h
stubdom/vtpmmgr/tpmrsa.c
stubdom/vtpmmgr/tpmrsa.h
stubdom/vtpmmgr/vtpm_cmd_handler.c
stubdom/vtpmmgr/vtpm_disk.c [new file with mode: 0644]
stubdom/vtpmmgr/vtpm_disk.h [new file with mode: 0644]
stubdom/vtpmmgr/vtpm_manager.h
stubdom/vtpmmgr/vtpm_storage.c [deleted file]
stubdom/vtpmmgr/vtpm_storage.h [deleted file]
stubdom/vtpmmgr/vtpmmgr.h