From: <cw...@xm...> - 2007-08-03 23:10:36
|
Quoting Oliver Welter <ma...@ol...>: > Hi C. - would be nice to have a real name.... > > a student of mine did - I guess - exactly what you are looking for. We > built a system that uses the TPM to protect the key of the root > partition. We sealed it to the bootloader/kernel to get make sure that > no one tampers with them. > > The whole setup is only a few lines of shell scripting - if you are > interessted, I can provide you with the necessary script and setup > procedures on monday (dont have access to the material here) > > Oliver > --=20 Oliver, This sounds like what I am looking for. I would greatly appreciate =20 any tips and scripts you may have. I haven't spent too much time yet looking at hardware, I wanted to see =20 if this was doable before spending time evaluating hardware with TPM =20 that works well under linux. Anybody have any suggestions? I'd =20 prefer to be able to buy an off-the-shelf box that I can setup how I =20 would like (Dell, HP, etc). I need good reliable equipment. C. I'm trying to go through life anonymously. ;) |