<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>http://kernsec.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=PeterHuewe</id>
	<title>Linux Kernel Security Subsystem - User contributions [en]</title>
	<link rel="self" type="application/atom+xml" href="http://kernsec.org/wiki/api.php?action=feedcontributions&amp;feedformat=atom&amp;user=PeterHuewe"/>
	<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php/Special:Contributions/PeterHuewe"/>
	<updated>2026-04-04T14:09:04Z</updated>
	<subtitle>User contributions</subtitle>
	<generator>MediaWiki 1.36.1</generator>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Linux_Kernel_Integrity&amp;diff=3920</id>
		<title>Linux Kernel Integrity</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Kernel_Integrity&amp;diff=3920"/>
		<updated>2017-10-31T00:18:51Z</updated>

		<summary type="html">&lt;p&gt;PeterHuewe: &lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''linux-integrity@vger.kernel.org''' is the mailing list for TPM and IMA targeted patches and discussion.&lt;br /&gt;
&lt;br /&gt;
* Subscription information is here: http://vger.kernel.org/vger-lists.html#linux-integrity&lt;br /&gt;
&lt;br /&gt;
For non-trivial patch sets, such as patch sets that touch multiple subsystems, it is recommended to CC the '''linux-security-module@vger.kernel.org''' mailing list for more broad screening.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TPM and IMA have have their own maintainers and GIT trees:&lt;br /&gt;
&lt;br /&gt;
* '''IMA:''' Mimi Zohar, git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git&lt;br /&gt;
* '''TPM:''' Jarkko Sakkinen, git://git.infradead.org/users/jjs/linux-tpmdd.git&lt;br /&gt;
&lt;br /&gt;
== TPM 2.0 ==&lt;br /&gt;
The TPM 2.0 infrastructure in and around linux is currently moving fast.&lt;br /&gt;
Here is a link list which tries to capture the current situation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Books &amp;amp; Links ===&lt;br /&gt;
* A Practical Guide toTPM 2.0, free PDF, https://link.springer.com/book/10.1007/978-1-4302-6584-9&lt;br /&gt;
* TPM2.0 in Context, http://www.springer.com/de/book/9783319087436&lt;br /&gt;
* TCG Links https://trustedcomputinggroup.org/resources-using-trusted-platform-module-2-0-library-specification/&lt;br /&gt;
* Matthew Garrett's blog https://mjg59.dreamwidth.org/ (not only about tpm)&lt;br /&gt;
* James Bottomley's blog https://blog.hansenpartnership.com (not only about tpm)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Intel TSS Stack ===&lt;br /&gt;
The Intel TSS Stack, compliant with the TCG SAPI specifications consists of &lt;br /&gt;
* The Stack: https://github.com/01org/tpm2-tss&lt;br /&gt;
* The Tools: https://github.com/01org/tpm2-tools&lt;br /&gt;
* The Broker: https://github.com/01org/tpm2-abrmd (Access Broker &amp;amp; Resource Management Daemon)&lt;br /&gt;
&lt;br /&gt;
Interesting Links can be found here:&lt;br /&gt;
* https://lenovopress.com/lp0599-technical-introduction-tpm-20-with-linux&lt;br /&gt;
* http://www.jwsecure.com/2017/02/07/implementing-platform-protection-for-linux/&lt;br /&gt;
* https://github.com/01org/tpm2-tools/wiki/How-to-use-tpm2-tools (needs to be updated)&lt;br /&gt;
* RSA signatures with TPM2.0 and OpenSSL https://dguerriblog.wordpress.com/&lt;br /&gt;
* https://archive.fosdem.org/2017/schedule/event/tpm2/attachments/slides/1517/export/events/attachments/tpm2/slides/1517/FOSDEM___TPM2_0_practical_usage.pdf&lt;br /&gt;
* https://elinux.org/images/6/6e/ELC2017_TPM2-and-TSS_Tricca.pdf&lt;br /&gt;
&lt;br /&gt;
==== Interesting Projects using Intel TSS Stack ====&lt;br /&gt;
Automated Full Disk De/Encryption with Clevis/Tang+TPM+Luks&lt;br /&gt;
* http://redhat.slides.com/npmccallum/sad&lt;br /&gt;
* https://github.com/latchset/clevis/pull/17&lt;br /&gt;
* https://github.com/martinezjavier/clevis/blob/tpm2-pin/doc/clevis-bind-luks-tpm2.md&lt;br /&gt;
&lt;br /&gt;
StrongSwan VPN Server + IMA + TPMSupport (Remote Attestation)&lt;br /&gt;
* https://wiki.strongswan.org/projects/strongswan/wiki/TPMPlugin&lt;br /&gt;
&lt;br /&gt;
Others:&lt;br /&gt;
* Remote Attestation https://01.org/opencit &lt;br /&gt;
* https://github.com/irtimmer/tpm2-pk11&lt;br /&gt;
* https://github.com/rqou/tpm2-luks&lt;br /&gt;
* https://robertou.com/tpm2-sealed-luks-encryption-keys.html&lt;br /&gt;
* https://github.com/WindRiver-OpenSourceLabs/cryptfs-tpm2&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== IBM TSS Stack === &lt;br /&gt;
The IBM Stack follows a more pragmatic approach - the code can be found at&lt;br /&gt;
* https://sourceforge.net/projects/ibmtpm20tss/&lt;br /&gt;
including tools and everything.&lt;br /&gt;
&lt;br /&gt;
James Bottomley has been actively developing against it&lt;br /&gt;
* https://blog.hansenpartnership.com/using-your-tpm-as-a-secure-key-store/&lt;br /&gt;
* https://blog.hansenpartnership.com/tpm-enabling-gnome-keyring/&lt;br /&gt;
* https://blog.hansenpartnership.com/tpm2-and-linux/&lt;br /&gt;
&lt;br /&gt;
It comes with its own&lt;br /&gt;
* TPM2.0 Simulator https://sourceforge.net/projects/ibmswtpm2/&lt;br /&gt;
* Attestation client/server http://ibmswtpm.sourceforge.net/ibmacs.html &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
== IMA ==&lt;br /&gt;
See https://sourceforge.net/p/linux-ima/wiki/Home/ for details.&lt;/div&gt;</summary>
		<author><name>PeterHuewe</name></author>
	</entry>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Linux_Kernel_Integrity&amp;diff=3919</id>
		<title>Linux Kernel Integrity</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Linux_Kernel_Integrity&amp;diff=3919"/>
		<updated>2017-10-31T00:16:54Z</updated>

		<summary type="html">&lt;p&gt;PeterHuewe: Added a bunch of useful links to capture the current situation of TPM under Linux, maybe move to it's own page in the future.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;'''linux-integrity@vger.kernel.org''' is the mailing list for TPM and IMA targeted patches and discussion.&lt;br /&gt;
&lt;br /&gt;
* Subscription information is here: http://vger.kernel.org/vger-lists.html#linux-integrity&lt;br /&gt;
&lt;br /&gt;
For non-trivial patch sets, such as patch sets that touch multiple subsystems, it is recommended to CC the '''linux-security-module@vger.kernel.org''' mailing list for more broad screening.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
TPM and IMA have have their own maintainers and GIT trees:&lt;br /&gt;
&lt;br /&gt;
* '''IMA:''' Mimi Zohar, git://git.kernel.org/pub/scm/linux/kernel/git/zohar/linux-integrity.git&lt;br /&gt;
* '''TPM:''' Jarkko Sakkinen, git://git.infradead.org/users/jjs/linux-tpmdd.git&lt;br /&gt;
&lt;br /&gt;
== TPM 2.0 ==&lt;br /&gt;
The TPM 2.0 infrastructure in and around linux is currently moving fast.&lt;br /&gt;
Here is a link list which tries to capture the current situation.&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Books &amp;amp; Links ===&lt;br /&gt;
* A Practical Guide toTPM 2.0, free PDF, https://link.springer.com/book/10.1007/978-1-4302-6584-9&lt;br /&gt;
* TPM2.0 in Context, http://www.springer.com/de/book/9783319087436&lt;br /&gt;
* TCG Links https://trustedcomputinggroup.org/resources-using-trusted-platform-module-2-0-library-specification/&lt;br /&gt;
* Matthew Garrett's blog https://mjg59.dreamwidth.org/ (not only about tpm)&lt;br /&gt;
* James Bottomley's blog https://blog.hansenpartnership.com (not only about tpm)&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
=== Intel TSS Stack ===&lt;br /&gt;
The Intel TSS Stack, compliant with the TCG SAPI specifications consists of &lt;br /&gt;
* The Stack: https://github.com/01org/tpm2-tss&lt;br /&gt;
* The Tools: https://github.com/01org/tpm2-tools&lt;br /&gt;
* The Broker: https://github.com/01org/tpm2-abrmd (Access Broker &amp;amp; Resource Management Daemon)&lt;br /&gt;
&lt;br /&gt;
Interesting Links can be found here:&lt;br /&gt;
* https://lenovopress.com/lp0599-technical-introduction-tpm-20-with-linux&lt;br /&gt;
* http://www.jwsecure.com/2017/02/07/implementing-platform-protection-for-linux/&lt;br /&gt;
* https://github.com/01org/tpm2-tools/wiki/How-to-use-tpm2-tools (needs to be updated)&lt;br /&gt;
* RSA signatures with TPM2.0 and OpenSSL https://dguerriblog.wordpress.com/&lt;br /&gt;
* https://archive.fosdem.org/2017/schedule/event/tpm2/attachments/slides/1517/export/events/attachments/tpm2/slides/1517/FOSDEM___TPM2_0_practical_usage.pdf&lt;br /&gt;
* https://elinux.org/images/6/6e/ELC2017_TPM2-and-TSS_Tricca.pdf&lt;br /&gt;
&lt;br /&gt;
==== Interesting Projects using Intel TSS Stack ====&lt;br /&gt;
Automated Full Disk De/Encryption with Clevis/Tang+TPM+Luks&lt;br /&gt;
* http://redhat.slides.com/npmccallum/sad&lt;br /&gt;
* https://github.com/latchset/clevis/pull/17&lt;br /&gt;
* https://github.com/martinezjavier/clevis/blob/tpm2-pin/doc/clevis-bind-luks-tpm2.md&lt;br /&gt;
&lt;br /&gt;
StrongSwan VPN Server + IMA + TPMSupport (Remote Attestation)&lt;br /&gt;
* https://wiki.strongswan.org/projects/strongswan/wiki/TPMPlugin&lt;br /&gt;
&lt;br /&gt;
Others:&lt;br /&gt;
* Remote Attestation https://01.org/opencit &lt;br /&gt;
* https://github.com/irtimmer/tpm2-pk11&lt;br /&gt;
* https://github.com/rqou/tpm2-luks&lt;br /&gt;
* https://robertou.com/tpm2-sealed-luks-encryption-keys.html&lt;br /&gt;
* https://github.com/WindRiver-OpenSourceLabs/cryptfs-tpm2&lt;br /&gt;
&lt;br /&gt;
=== IBM TSS Stack === &lt;br /&gt;
The IBM Stack follows a more pragmatic approach - the code can be found at&lt;br /&gt;
* https://sourceforge.net/projects/ibmtpm20tss/&lt;br /&gt;
including tools and everything.&lt;br /&gt;
&lt;br /&gt;
James Bottomley has been actively developing against it&lt;br /&gt;
* https://blog.hansenpartnership.com/using-your-tpm-as-a-secure-key-store/&lt;br /&gt;
* https://blog.hansenpartnership.com/tpm-enabling-gnome-keyring/&lt;br /&gt;
* https://blog.hansenpartnership.com/tpm2-and-linux/&lt;br /&gt;
&lt;br /&gt;
It comes with its own&lt;br /&gt;
* TPM2.0 Simulator https://sourceforge.net/projects/ibmswtpm2/&lt;br /&gt;
* Attestation client/server http://ibmswtpm.sourceforge.net/ibmacs.html &lt;br /&gt;
&lt;br /&gt;
 &lt;br /&gt;
 &lt;br /&gt;
== IMA ==&lt;br /&gt;
See https://sourceforge.net/p/linux-ima/wiki/Home/ for details.&lt;/div&gt;</summary>
		<author><name>PeterHuewe</name></author>
	</entry>
	<entry>
		<id>http://kernsec.org/wiki/index.php?title=Main_Page&amp;diff=3918</id>
		<title>Main Page</title>
		<link rel="alternate" type="text/html" href="http://kernsec.org/wiki/index.php?title=Main_Page&amp;diff=3918"/>
		<updated>2017-10-30T23:37:25Z</updated>

		<summary type="html">&lt;p&gt;PeterHuewe: Added Link to Linux Integrity, as more pages will follow under that entry page.&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;= Linux Kernel Security Subsystem =&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
This is the Linux kernel security subsystem wiki, a resource for developers and users.&lt;br /&gt;
&lt;br /&gt;
It also features resources for the [[Linux Kernel Integrity | Linux Kernel Integrity Subsystem]]&lt;br /&gt;
&lt;br /&gt;
== Resources==&lt;br /&gt;
&lt;br /&gt;
* [[Kernel Repository]]&lt;br /&gt;
&lt;br /&gt;
* [[Projects]]&lt;br /&gt;
&lt;br /&gt;
* [[Events]]&lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;
----&lt;br /&gt;
&lt;br /&gt;
If you would like an account on this site, please email ''jmorris _at namei.org''.&lt;/div&gt;</summary>
		<author><name>PeterHuewe</name></author>
	</entry>
</feed>