blob: ae3833a6fb2e0c10ddf832f9f808d1dde2557c79 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
|
% Registration Trusted Computing and Linux
% [2]Register/Submit Proposal Emily Ratliff (emilyr@us.ibm.com)
While Trusted Computing and Linux may seem
antithetical on the surface, Linux users can
benefit from the security features, including
system integrity and key confidentiality,
provided by Trusted Computing. The purpose of
this paper is to discuss the work that we have
done to enable Linux users to make use of
their Trusted Platform Module (TPM) in a
non-evil manner. The paper describes the
individual software components which are
required to enable the use of the TPM,
including the TPM device driver and TrouSerS,
the Trusted Software Stack, and TPM
management. Key concerns with Trusted
Computing are highlighted along with what the
Trusted Computing Group has done and what
individual TPM owners can do to mitigate these
concerns. Example beneficial uses for
individuals and enterprises are discussed
including eCryptfs and GnuPG usage of the TPM.
There is a tremendous opportunity for enhanced
security through enabling projects to use the
TPM so we discuss what we see as the most
promising avenues.
|