Linux kernel & Trusted Computing


 
Thread Tools Search this Thread
Operating Systems Linux Linux kernel & Trusted Computing
# 1  
Old 06-14-2012
Linux kernel & Trusted Computing

Anyone have a current/cumulative list of all Trusted Computing-based drivers, modules, etc., that have been added to the kernel?
Login or Register to Ask a Question

Previous Thread | Next Thread

8 More Discussions You Might Find Interesting

1. UNIX for Beginners Questions & Answers

Adding an application in trusted computing base

How to add new application/ code into trusted computing base in linux? or How to bind new command for IMA-measurement at boot time in Ubuntu? (0 Replies)
Discussion started by: iambharatmanral
0 Replies

2. Red Hat

Gnome3 locksup on new Linux kernel 12.6.xxx & 12.5.xxx

Hi Forum Ive been having a problem with the kernal(s) for some strange reason it every time I try and access the date and time/calendar or system settings it locks up the whole laptop and nothing responds. :(. This doesn't happen 11.10.xxx kernel . Any help would be much appreciated and thank you... (1 Reply)
Discussion started by: ShinTec
1 Replies

3. Homework & Coursework Questions

Trusted connection between windows and linux

Use and complete the template provided. The entire template must be completed. If you don't, your post may be deleted! I neeed to establish a trusted connection b/w windows and unix. Are there any links which guides me to do that. I know that we should have a public key. Did this b/w... (1 Reply)
Discussion started by: santh08
1 Replies

4. UNIX for Dummies Questions & Answers

trusted connection between windows and linux

Hi, I need to establish a trusted connection b/w unix and windows. I did this b/w unix to unix. i.e by using ssh -keygen command, entering the passphrase and file in which public key is to be stored. Now, I need to do this b/w unix and windows. How can I achieve this ? Any help, l... (0 Replies)
Discussion started by: santh08
0 Replies

5. SuSE

SuSE Linux Kernel & Veritas MultiNIC Configuration...!!!

Dear All, I would like to install VERITAS Cluster 4.1 on SuSE Linux 10 with SP1 & following is the requirement of the kernel from VERITAS side; SUSE Linux Enterprise Server 10 with SP1 with following kernel level: 2.6.16-37-0.18-smp/2.6.16-37-0.18-bigsmp After installing the SuSE 10 with... (1 Reply)
Discussion started by: jumadhiya
1 Replies

6. AIX

Switch off TCB (Trusted Computing Base)

I wanted to do an "Alternate Disk Migration" via my NIM server to update several clients (all LPARs in a p670) from 5.1 ML6 to 5.2 ML3. As a prerequisite the procedure says "if the system has the Trusted Computing Base enabled it has to be switched off before". Well, i didn't give this too much... (3 Replies)
Discussion started by: bakunin
3 Replies

7. Cybersecurity

Trusted Computing

About a year ago, a friend of mine who worked on the OReilly Snort book took a propsal he and I had worked on for a book on Trusted Computing. Though the editor thought the content was good and worthwhile, he felt that there wasn't enough of a market to justify printing such a work. How many... (0 Replies)
Discussion started by: kduffin
0 Replies

8. UNIX for Advanced & Expert Users

2.4.9 Linux Kernel & PCMCIA Wireless Problems

We are installing a PrismII chipset wireless PCMCIA card with a new 2.4.9 linux kernel. The card is a D-Link DWL-650. The 2.4.9 kernel uses the orinoco_cs.o driver. Anyone running this configuration? The 2.4.9 Linux kernel has built in PCMCIA support and the README says it supports the... (1 Reply)
Discussion started by: Neo
1 Replies
Login or Register to Ask a Question
tcsd(8) 						      System Manager's Manual							   tcsd(8)

								TCG Software Stack

NAME
tcsd - daemon that manages Trusted Computing resources SYNOPSIS
tcsd [-f] [-e] [-c <configfile> ] [-h] DESCRIPTION
Trousers is an open-source TCG Software Stack (TSS), released under the BSD License. Trousers aims to be compliant with the current (1.1b) and upcoming (1.2) TSS specifications available from the Trusted Computing Group website: http://www.trustedcomputinggroup.org. tcsd is a user space daemon that should be (according to the TSS spec) the only portal to the TPM device driver. At boot time, tcsd should be started, it should open the TPM device driver and from that point on, all requests to the TPM should go through the TSS stack. The tcsd manages TPM resources and handles requests from TSP's both local and remote. -f, --foreground run the daemon in the foreground -e attempt to connect to software TPMs over TCP -c, --config <configfile> use the provided configuration file rather than the default configuration file -h, --help display help message ACCESS CONTROL
There are two types of access control for the tcsd, access to the daemon's socket itself and access to specific commands internal to the tcsd. Access to the tcsd's port should be controlled by the system administrator using firewall rules. If using iptables, the following rule will allow a specific host access to the tcsd: # iptables -A INPUT -s $IP_ADDRESS -p tcp --destination-port 30003 -j ACCEPT Access to individual commands internal to the tcsd is configured by the tcsd configuration file's "remote_ops" directive. Each function call in the TCS API is reachable by a unique ordinal. Each labeled "remote op" actually defines a set of ordinals (usually more than one) necessary to accomplish the operation. So, for example, the "random" operation enables the ordinals for opening and closing a context, calling TCS_StirRandom and TCS_GetRandom, as well as TCS_FreeMemory. By default, connections from localhost will allow any ordinals. DATA FILES
TSS applications have access to 2 different kinds of 'persistant' storage. 'User' persistant storage has the lifetime of that of the application using it and therefore is destroyed when an application exits. User PS is controlled by the TSP of the application. 'System' persistent storage is controlled by the TCS and stays valid across application lifetimes, tcsd restarts and system resets. Data registered in system PS stays valid until an application requests that it be removed. User PS files are by default stored as /var/lib/tpm/user.{pid} and the system PS file by default is /var/lib/tpm/system.data. The system PS file is initially created when ownership of the TPM is first taken. CONFIGURATION
tcsd configuration is stored by default in /etc/tcsd.conf DEBUG OUTPUT
If TrouSerS has been compiled with debugging enabled, the debugging output can be supressed by setting the TSS_DEBUG_OFF environment variable. DEVICE DRIVERS
tcsd is compatible with the IBM Research TPM device driver available from http://ibmswtpm.sourceforge.net/ and the TPM device driver available from http://sf.net/projects/tpmdd, which is also available in the upstream Linux kernel and many Linux distros. CONFORMING TO
tcsd conforms to the Trusted Computing Group Software Specification version 1.1 Golden SEE ALSO
tcsd.conf(5) AUTHOR
Kent Yoder REPORTING BUGS
Report bugs to <trousers-tech@lists.sf.net> TSS 1.1 2005-03-15 tcsd(8)