GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 21-Jan-2025 06:03:57 JST Lennart Poettering Lennart Poettering
    in reply to
    • Jarkko Sakkinen

    @jarkko … then you have only a very weak model, probably to the point it's not worth it.

    What matters is that distributions actually start deploying UKIs like this, and enable systemd-pcrlock by default. This is not trivial, but some distros are further ahead there then others.

    In conversation about 5 months ago from mastodon.social permalink
    • James Morris likes this.
    • Embed this notice
      Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Tuesday, 21-Jan-2025 06:03:58 JST Jarkko Sakkinen Jarkko Sakkinen
      in reply to
      • Jarkko Sakkinen
      @pid_eins any thoughts on this one?
      In conversation about 5 months ago permalink
    • Embed this notice
      Lennart Poettering (pid_eins@mastodon.social)'s status on Tuesday, 21-Jan-2025 06:03:58 JST Lennart Poettering Lennart Poettering
      in reply to
      • Jarkko Sakkinen

      @jarkko It's a long text, but the person writing this is basically saying that a TPM2 policy for a disk that only locks to PCR 7 or not even that is not secure? I mean, no shit sherlock, of course it doesn't. If you policy doesn't lock to anything then it doesn't lock to anything...

      A full boot chain that gets things right would include at least a UKI with a signed PCR policy + a dynamic systemd-pcrlock policy. The combination should be reasonably secure, I'd claim, but if you have neither…

      In conversation about 5 months ago permalink
    • Embed this notice
      Jarkko Sakkinen (jarkko@social.kernel.org)'s status on Tuesday, 21-Jan-2025 06:03:59 JST Jarkko Sakkinen Jarkko Sakkinen
      https://oddlama.org/blog/bypassing-disk-encryption-with-tpm2-unlock/ #systemd #tpm #tpm2
      In conversation about 5 months ago permalink

      Attachments

      1. No result found on File_thumbnail lookup.
        Bypassing disk encryption on systems with automatic TPM2 unlock | oddlama's blog
        oddlama's personal web page and blog

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.