Posts
5020
Following
329
Followers
500
Linux kernel hacker and maintainer etc.

OpenPGP: 3AB05486C7752FE1

Jarkko Sakkinen

In Himmelblau evolution it will be interesting to see if there's someday perhaps a subset of graph API to provide "the service' too.
0
0
0
@suihkulokki i'm not sure if that page has anything to do with clients. looks like it is related to vms hosted in azure.
0
0
0

Jarkko Sakkinen

Couple of new features:

1. Creates and loads both 'loadable' and 'importable' keys from external keys.
2. tpm2sh load has now --load flag to load a generated keyedhash key as a trusted key to the kernel keyring.

#linux #kernel #tpm #rustlang
0
0
2

Jarkko Sakkinen

Cool, got ssh logins through Azure/Intune working to built Ms after fighting for some time with systemd-creds :-) Himmelblau 2.0 feels surprsingly stable environment.
1
0
1

Jarkko Sakkinen

This is how wrap get_compile_commands.py:

https://gist.github.com/jarkkojs/00d4fb05474d00bd64df51b4b0028a3b

Sometimes I feel that this should be made somehow a bit more convenient :-)
0
0
0

Jarkko Sakkinen

One bottleneck in HMAC encryption that would be easy to solve if TPMKey ASN.1 format would store 'parentPublic', or alternatively 'parentPublicName'.

HMAC encryption requires "extra" TPM2_ReadPublic per unseal transaction because it cannot be stored to the key data.

If it had the field it would be trivial to calculate cryptographic name for the parent object without roundtrip to TPM2 chip when the key is used after creation.

I.e. it is classic value not cached that would be constantly required.

RT @Foxboron
0
0
0
and has a cool wait progress validaton for the remote tag ;-)
0
0
0

Jarkko Sakkinen

3rd PR for 6.19: https://lore.kernel.org/linux-integrity/aSthHCovbsDZANsa@kernel.org/T/#u

at least i'm on schedule this time :-)
0
0
0

Jarkko Sakkinen

This is how I manage my pull requests ATM (creating and pushing signed tags, request-pull etc.):

https://git.kernel.org/pub/scm/linux/kernel/git/jarkko/linux-pull-request.git/tree/?h=main

I’m happy with the tiny jq based templating engine for moustache templates. Has worked surprisingly well.

#linux #kernel

1
1
0

Jarkko Sakkinen

Edited 12 days ago
I've been fine-tuning the policy and caching engine in tpm2sh a lot and next version will allow to:

1. View policy as an expression via 'tpm2sh memory -p <handle>'
2. Create primary keys with arbitrary policies (was not just done nothing special in it).
3. Creating, viewing and maintaining policies for persistent keys.

These sort of come as "side-effect" of just cleaning up and polishing the groundwork :-)

#linux #tpm #rustlang
0
0
1

Jarkko Sakkinen

What are known good workarounds with systemd-creds for situations like this:

https://github.com/himmelblau-idm/himmelblau/issues/901

I can admit that I don't really know what I'm doing ATM :-)

#systemd
0
0
0
@vbabka @hrw I love what SUSE is doing overall, I have many good friends at SUSE, and it's IMHO a great company, and that out of the way, SUSE's account systems suck badly ;-)
0
0
2
@tris @Foxboron @mjg59

Actually the point of all this to be NOT interested what everyone is doing.

That's what standards are great for. We can ignore each other and still everything works together.
0
0
1

Jarkko Sakkinen

tdf is superb with e.g. Intel SDM, ACPI and TCG specs :-)
1
0
1
@Foxboron I'll bring up the IETF draft topic on the next TPM-RS meeting, which is on 8th of Dec. TPM-RS is like TSS2 type of project driven by Google, Microsoft and well the "usual suspects". I'd like to think that there is common mutual interest to drive this further.
1
0
1
@Foxboron Thanks for bringing me up on speed where things stand. Helps me to do rights things right :-)
1
0
0
@Foxboron OK that is great. Once there is a IETF draft I don't consider it as a Microsoft proprietary product :-)

As a disclaimer, it's not that I would necessarily want to comment on that. I rather adapt and perhaps workaround key spec in my implementation that proactively drive it because it is simply not my thing :-) This is what happend with parentPublic as cache internally handles it. However, as a maintainer I feel safer to accept change if a key type is driven by a real spec, which is not the case with TPMKey ASN.1 definition (YET).
1
0
0
Show older