LinuxQuestions.org
Review your favorite Linux distribution.
Home Forums Tutorials Articles Register
Go Back   LinuxQuestions.org > Forums > Linux Forums > Linux - Security
User Name
Password
Linux - Security This forum is for all security related questions.
Questions, tips, system compromises, firewalls, etc. are all included here.

Notices


Reply
  Search this Thread
Old 04-01-2017, 05:59 AM   #1
rokyo
Member
 
Registered: Oct 2012
Distribution: Ubuntu Mate 18.04 (production), Arch rolling (tinkering)
Posts: 102

Rep: Reputation: Disabled
A question about TPM


Hello everybody,

I recently accuired an older ThinkPad and came across the TPM option in the BIOS, where you can disable the TPM chip and such.

I read up a little on TPM and came across this quote from http://thinkwiki.org/wiki/Embedded_Security_Subsystem which states:

Quote:
You can disable the TPM chip in the BIOS, and not worry about someone using it behind your back. But they will be able to know that there is a TPM in the system (the chip can still be found, and will report its version, manufacturer, and disabled state), unless you remove all the kernel TPM support, including tpm_bios
Does this mean that a third party (software, a website, some remote 'attacker') can easily (?) gather identifying information from the TPM if they desire? For example, could a browser or operating system identify the unique (?) ID of my TPM module and therefore link it (and my computer) to visiting a certain website, even when the TPM is disabled in BIOS?

Wouldn't that mean that any hardware with TPM is automatically deanonymizable by default? I mean, of course, your computer is also identifyable by your IP or the MAC address of your network interface, but there are tools with which you can spoof those two. But can you spoof a TPM ID?

Even if such an identifying system isn't explicitly implemented by the manufacturer of the hardware, the existence of a unique identifier in your computer that cannot be spoofed and that can potentially be accessed in some way, would pose a huge privacy problem, right?

Sorry for the tinfoil but just wanted to be sure what that quote from ThinkWiki meant.

Greetings,
rokyo
 
Old 04-01-2017, 09:43 AM   #2
smallpond
Senior Member
 
Registered: Feb 2011
Location: Massachusetts, USA
Distribution: Fedora
Posts: 4,140

Rep: Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263Reputation: 1263
The kernel code creates a set of entries in the /sys filesystem which provide general info on model, version and firmware rev that is readable by any user. Software running on your system, other than browser code which is restricted, could read this info. It would need root access to be able to operate the chip and do TPM key operations. JS code in your browser should not be able to read the contents of any file without your cooperation.

The point about being unspoofable is interesting. I can wipe my hard drive and nobody can tell I was the source of an SSH session, because the keys are gone. I can't easily get rid of the TPM chip. If it is used to identify a piece of hardware, then I'd have to incinerate the laptop to cover my tracks.
 
Old 04-02-2017, 02:30 AM   #3
rokyo
Member
 
Registered: Oct 2012
Distribution: Ubuntu Mate 18.04 (production), Arch rolling (tinkering)
Posts: 102

Original Poster
Rep: Reputation: Disabled
It would also be interesting if the TPM chip could be remotely activated, even when it was turned off by the user.

In the light of recent developments where Microsoft activated certain functions in Windows 10 with a Windows Update, even when the user had deactivated them before, I wouldn't be surprised if TPM could also be remotely activated... Microsoft does issue Windows Certified Hardware batches for PCs that have a TPM 2.0 installed, even when it is deactivated at shipping. Kinda makes me wonder if they could theoretically tamper with that chip remotely...
 
Old 04-02-2017, 02:57 AM   #4
hazel
LQ Guru
 
Registered: Mar 2016
Location: Harrow, UK
Distribution: LFS, AntiX, Slackware
Posts: 7,574
Blog Entries: 19

Rep: Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452Reputation: 4452
Quote:
Originally Posted by smallpond View Post
The point about being unspoofable is interesting. I can wipe my hard drive and nobody can tell I was the source of an SSH session, because the keys are gone.
That's not quite true. I couldn't find the lost keys on your machine but the police could. When you wipe a disk (for example by overwriting it with zeros), the previous content doesn't disappear completely. Physically it's still there as a kind of ghost image. The police and counter-espionage bodies have ways of recovering that lost information.
 
  


Reply



Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

BB code is On
Smilies are On
[IMG] code is Off
HTML code is Off



Similar Threads
Thread Thread Starter Forum Replies Last Post
How to use the tpm-tools on linux? poplinux Linux - Security 2 10-24-2015 07:26 PM
How to fix TPM Error in Redhat Linux? samsad Linux - Enterprise 6 02-13-2015 08:38 AM
LXer: For Tech Geeks Only - What Device Do You Use to Visit TPM? LXer Syndicated Linux News 0 10-21-2013 01:30 AM
Trying to understand Trusted Computing? TPM module .. ysatxh Linux - Security 4 05-24-2011 03:56 PM
tpm keyring >># make smsoft Linux - Software 2 06-10-2010 10:56 AM

LinuxQuestions.org > Forums > Linux Forums > Linux - Security

All times are GMT -5. The time now is 03:05 PM.

Main Menu
Advertisement
My LQ
Write for LQ
LinuxQuestions.org is looking for people interested in writing Editorials, Articles, Reviews, and more. If you'd like to contribute content, let us know.
Main Menu
Syndicate
RSS1  Latest Threads
RSS1  LQ News
Twitter: @linuxquestions
Open Source Consulting | Domain Registration