Difference between revisions of "Embedded Security Subsystem"
(don't panic) |
(don't panic 2) |
||
Line 17: | Line 17: | ||
Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed standards shows some problematic properties. | Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed standards shows some problematic properties. | ||
One of the main problems is that the computer owner is seen as an adversary, who no longer should have the full control over their own computers anymore. | One of the main problems is that the computer owner is seen as an adversary, who no longer should have the full control over their own computers anymore. | ||
− | As Thinkpads of recent generations following the Thinkpad T23 (except the A30) are equipped with this disputed technology, | + | As Thinkpads of recent generations following the Thinkpad T23 (except the A30) are equipped with this disputed technology, it can be interesting, which promises are fulfilled inside your ThinkPad and which still seem to be a privacy issue for users - so please read [[TCPA/TCG - Trusted or Treacherous|this article]]. |
==Linux Support== | ==Linux Support== |
Revision as of 19:23, 5 July 2005
The Embedded Security SubsystemThe Embedded Security Subsystem is nothing but a chip installed on the Thinkpads mainboard that can take care of certain security related tasks conforming to the TCPA standard. It was first introduced among the T23 models and is now under the name Embedded Security Subsystem 2.0 an integral part of most of the modern Thinkpads. The functions of the chip are bound to three main groups:
|
Trusted or Treacherous?
TC - Trusted Computing - will be the biggest change of the information landscape since decades. Besides positive features like a more secure hardware storage for cryptographic keys, an analysis of the proposed standards shows some problematic properties. One of the main problems is that the computer owner is seen as an adversary, who no longer should have the full control over their own computers anymore. As Thinkpads of recent generations following the Thinkpad T23 (except the A30) are equipped with this disputed technology, it can be interesting, which promises are fulfilled inside your ThinkPad and which still seem to be a privacy issue for users - so please read this article.
Linux Support
Two linux drivers are available, a classical one and a newer one. Coverage of functionality of the first is unknown so far, the second is part of a bigger project aiming to provide a usable security framework.
David Stafford (one of the developers of the tpm code at IBM) on March 10, 2005 sent me the most recent version of the tpm-kml code. With his permission, I quote his email:
"I am attaching our latest driver and library. This version is in the process of kernel mailing list review, and will hopefully be accepted into the official kernel. It works much better across various 2.6 kernels. Note that this builds three modules tpm, tpm_atmel, and tpm_nsc. You modprobe the tpm_atmel (for all current shipping atmel based systems), or tpm_nsc (for the coming national based systems).
Also note that there is a conflict with the snd-intel8x0 kernel module (they each try to grab the LPC bus). You can either: load the tpm modules first (such as in initrd or rc.sysinit, before sound), or recompile the snd-intel8x0, turning off the MIDI and JOYSTICK support. The latest 2.6.11 version of snd-intel8x0 also reportedly fixes things."
Compiling this library was easy. Compiling the driver on my 2.6.8-686 (debian testing) laptop failed. But the library works with the driver I compiled from the tpm-2.0 package IBM made available on its pages (see the links below).
Gijs
The T43 requires a patch posted to the LKML by Kylene Jo Hall: LKML posting. An updated patch for linux 2.6.12 is available here.
Related Links
- IBMs ThinkVantageTM Technologies Embedded Security Subsystem page
- IBMs ThinkVantageTM Technologies Flash presentation - Embedded Security Subsystem
- IBM Research TCPA resources page
- Trusted Grub
Models featuring this Technology
IBM Embedded Security Subsystem
IBM Embedded Security Subsystem 2.0