Hello Thibaut,
On 1/21/19 9:16 AM, Thibaut Sautereau wrote:
Hello folks,
I'm experimenting with TPM 2.0 (using swtpm 0.1.0), tpm2-tools 3.1.3,
tpm2-tss 2.1.0 and the Linux 4.19.16 kernel's trusted keys. I found this
thread [1] about the "policydigest" and "policyhandle" options added
to
keyctl but I cannot reproduce the given example [2] using tpm2-tools
instead of the author's Python testing scripts [3]. I wonder if I do
something wrong by executing the following commands:
Did it work for you when using Jarkko's test scripts?
export TPM2TOOLS_TCTI="device:/dev/tpmrm0"
tpm2_takeownership --clear
# I tried fiddling with the object attributes in the following command
# but AIUI the default ones should be OK
tpm2_createprimary --hierarchy=o --halg=sha256 --kalg=rsa \
--context=/tmp/primary.context
tpm2_evictcontrol --auth=o --context=/tmp/primary.context \
--handle=0x80ffffff --persistent=0x81010001
tpm2_createpolicy --policy-file=/tmp/policy.digest --policy-pcr \
--set-list=sha256:0 --policy-digest-alg=sha256
policydigest=$(xxd -p /tmp/policy.digest | tr -d '\n')
keyid=$(keyctl add trusted test \
"new 32 keyhandle=0x81010001 hash=sha256 policydigest=$policydigest" @u)
keyctl link @us @s
keyctl pipe $keyid > /tmp/blob.hex
Until here, everything works fine.
Now for testing I want to reimport the key from the blob file, but I
need a handle to a TPM_SE_POLICY and thus need to directly use the TPM
device, as the in-kernel resource manager I was using so far would
prevent me from keeping a policy session "opened". So I re-export
TPM2TOOLS_TCTI just as Javier Martinez Canillas showed on GitHub [4]:
export TPM2TOOLS_TCTI="device:/dev/tpm0"
# --auth-policy-session implies --extend-policy-session
tpm2_createpolicy --policy-pcr --set-list=sha256:0 \
--policy-digest-alg=sha256 --auth-policy-session
keyctl add trusted test2 \
"load $(cat /tmp/blob.hex) keyhandle=0x81010001 policyhandle=0x03000000" @u
You have the policy handle hardcoded to 0x03000000 here, I guess that's correct
and is the value printed by tpm2_createpolicy in EXTENDED_POLICY_SESSION_HANDLE?
Sorry for saying the obvious, but just in case since I don't see anything wrong
with your commands.
This last command causes: "add_key: Operation not
permitted".
In kernel logs, I have:
[ 1350.287556] tpm tpm0: A TPM error (2466) occurred unsealing
[ 1350.289856] trusted_key: key_unseal failed (-1)
The TPM error is 0x9a2, i.e. TPM2_RC_BAD_AUTH. I cannot see what I'm
doing wrong. Do you see something obvious?
[1]
https://lkml.org/lkml/2015/11/17/520
[2]
https://lkml.org/lkml/2015/11/21/125
[3]
https://github.com/jsakkine-intel/tpm2-scripts
[4]
https://github.com/tpm2-software/tpm2-tools/issues/510#issuecomment-33138...
Thanks a lot for your time and your work!
Best regards,
--
Javier Martinez Canillas
Software Engineer - Desktop Hardware Enablement
Red Hat