xense-devel
RE: [Xense-devel] Run vTPM in its own VM?
>________________________________
>
>From: Stefan Berger [mailto:stefanb@xxxxxxxxxx]
>Sent: Friday, September 15, 2006 9:34 AM
>To: Scarlata, Vincent R
>Cc: Fischer, Anna; Xense-devel@xxxxxxxxxxxxxxxxxxx;
xense-devel-bounces@xxxxxxxxxxxxxxxxxxx
>Subject: RE: [Xense-devel] Run vTPM in its own VM?
>
>
>
> xense-devel-bounces@xxxxxxxxxxxxxxxxxxx wrote on 09/15/2006 12:18:12
PM:
>
> > This is already supported, even in the single VM model. At any time,
a
>> vtpm can issue a request to the manager (similar to the way you
request
>> save/load state) to access the TPM below. On one of my configurations
>> (not submitted but available upon request) that have the vtpm's copy
>> certain hwpcrs during its initialization steps. Note, however, on
>You will also have to clone the logs related to those PCRs and carry
them with you when you migrate.
>Now if you copy the PCRs upon creation, what do you do with the PCR
register values after migration? Do they still
>reflect the old environment?
The code I mentioned is being used for a very specific environment where
not all of the functions in xen are used. I meant it more as an
illustrative statement that not only is calling the tpm from a vtpm
supported, there exist code that is using it. The code hasn't been
checked in to the tree, because as you point out, it is not necessarily
a general purpose approach to vPCR usage.
>> commands that use authorization digests, it won't be as simple has
>> forwarding the commands down from vtpm to manager to tpm, you'll need
to
>> be more careful to ensure the auth sessions are maintained as the
client
>> expects.
>
>Which commands are you for example forwarding to the hardware TPM? Are
you rooting your key tree to the SRK of
>the hardware TPM?
The current implementation does not forward any commands to the TPM,
however, if one wanted too, you could write the TPM code such that
rather than using openssl for generating key, you called the TPM to
generate keys. Now, my comment about forwarding was that you will not be
able to just forward commands to use these keys down to the TPM. Rather
the vtpm would share an OIAP session with the application in the guest.
The vtpms handles checking that the TPM_Unbind for example is ok. Then
the vtpm makes a separate request down to the TPM to request that the
key owned by the vtpm that resides in the tpm be used to decrypt some
data (that happened to originate from a guest).
-Vinnie
_______________________________________________
Xense-devel mailing list
Xense-devel@xxxxxxxxxxxxxxxxxxx
http://lists.xensource.com/xense-devel
|
<Prev in Thread] |
Current Thread |
[Next in Thread>
|
- RE: [Xense-devel] Run vTPM in its own VM?, (continued)
RE: [Xense-devel] Run vTPM in its own VM?, Scarlata, Vincent R
RE: [Xense-devel] Run vTPM in its own VM?, Scarlata, Vincent R
RE: [Xense-devel] Run vTPM in its own VM?,
Scarlata, Vincent R <=
RE: [Xense-devel] Run vTPM in its own VM?, Scarlata, Vincent R
RE: [Xense-devel] Run vTPM in its own VM?, Scarlata, Vincent R
|
|
|