Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vTPM support #59

Open
drasko opened this issue Aug 17, 2023 · 2 comments
Open

vTPM support #59

drasko opened this issue Aug 17, 2023 · 2 comments

Comments

@drasko
Copy link

drasko commented Aug 17, 2023

Hello,
does linux-svsm already implements vTPM support and are there some examples that show how to use this to achieve vTPM in the Guest OS?

@cclaudio
Copy link
Contributor

Hi @drasko,
I started porting the vTPM proof-of-concept to both the AMDESE/linux-svsm.git and coconut-svsm/svsm.git, but that's not complete.
Do you have any specific use case for it?

@drasko
Copy link
Author

drasko commented Aug 21, 2023

Hi @cclaudio - first, thangs for the exceptional work you are doing!

We (Ultraviolet) are working on cocos.ai, and currently, we are using AMD SEV-SNP. We are capable to do a usual AMD measurement from the guest, but it takes into account only UEFI OVMF block. AMD considers that the integrity of other SW booting phases (notably kernel and rootfs) needs to be established via chain-of-trust. This is where we intend to use vTPM.

Currently, we are changing/configuring EDK2 TianoCore to use a Secure Boot with subsequent artifacts - notably kernel and initramfs, which we try to boot exclusively in RAM, and this might be sufficient for putting trust in the whole CVM. But on the other hand - it might be not, and then only tool we can think that can help is TPM. Probably even when we enable Secure Boot - we will still need TPM or additional check and trust.

As soon as we finish our work on Secure Boot, we will try to help with your work and contribute as much as we can.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants