Activity for TrouSerS

  • deitch deitch posted a comment on ticket #211

    I just stumbled across this problem again when rebuilding trousers, went hunting, and found this issue from 7 years ago. To my surprise, I opened it! Well, I knew it looked familiar. Is there any way we can move it forward?

  • Abhinav MS Abhinav MS posted a comment on ticket #238

    It is not a trousers issue.. TPM module is having more read write hits in the latest kernel causing the crash... Trying to pin point the exact code causing this

  • Abhinav MS Abhinav MS created ticket #238

    TrouSerS not working with linux 6.8 kernel

  • Ken Goldman Ken Goldman posted a comment on ticket #237

    I don't know the implementation of tpm_restrictsrk . It's not a TPM command. At a high level, there is a flag readSRKPub which permits an unauthorized read of the SRK. Once clear, it needs owner auth. TPM 1.2 is old and obsolete, so you may not get any other responses. If you can use a SW TPM and send me the traces (email), I can see what the command is doing and why it's failing.

  • Oskar Enoksson Oskar Enoksson modified a comment on ticket #237

    Although ... the command tpm_restrictsrk -a actually seems non-working: # tpm_restrictsrk -a Enter owner password: # tpm_restrictsrk -s Enter owner password: Storage Root Key readable with: owner auth # I expected the SRK readable without owner auth (with SRK auth) after successful tpm_restrictsrk -a My TPM chip is SLB9660: # tpm_version TPM 1.2 Version Info: Chip Version: 1.2.4.40 Spec Level: 2 Errata Revision: 3 TPM Vendor ID: IFX Vendor Specific data: 04280077 0074706d 3631ffff ff TPM Version:...

  • Oskar Enoksson Oskar Enoksson posted a comment on ticket #237

    Although ... the command tpm_restrictsrk -a actually seems non-working: # tpm_restrictsrk -a Enter owner password: # tpm_restrictsrk -s Enter owner password: Storage Root Key readable with: owner auth # I expected the SRK readable without owner auth after successful tpm_restrictsrk -a My TPM chip is SLB9660: # tpm_version TPM 1.2 Version Info: Chip Version: 1.2.4.40 Spec Level: 2 Errata Revision: 3 TPM Vendor ID: IFX Vendor Specific data: 04280077 0074706d 3631ffff ff TPM Version: 01010000 Manufacturer...

  • Oskar Enoksson Oskar Enoksson posted a comment on ticket #237

    Oops. My mistake. I had the impression that the -z flag to this command would reset the SRK password to all zeros. Not so. tpm_changeownerauth -s -r resets the SRK password. Help text for tpm_restrictsrk as below: Usage: tpm_restrictsrk [options] -h, --help Display command usage info. -v, --version Display command version info. -l, --log [none|error|info|debug] Set logging level. -u, --unicode Use TSS UNICODE encoding for passwords to comply with applications using TSS popup boxes -a, --allow Allow...

  • Ken Goldman Ken Goldman posted a comment on ticket #237

    I don't know what this command does, but the error message implies a bad authorization value. -z says to use all zeros as the authorization value. Perhaps the authorization value is not all zeros. If you use a SW TPM, it will dump internal operations and help you / us debug.

  • Oskar Enoksson Oskar Enoksson created ticket #237

    tpm_restrictsrk -z fails with "Authentication failed"

  • Dhruv Dhruv created ticket #236

    SRK not found in persistent storage after reboot

  • Daniel Daniel created ticket #235

    Impossible to call TPM_Tools tpm_setpresence --disable-hw

  • Fabrice Fontaine Fabrice Fontaine posted a comment on ticket #234

    Duplicate of https://sourceforge.net/p/trousers/bugs/222/ so this one should be closed

  • Fabrice Fontaine Fabrice Fontaine created ticket #234

    Build failure with libressl >= 2.5.0

  • Laurent Bigonville Laurent Bigonville modified a comment on ticket #233

    I see this commit: https://sourceforge.net/p/trousers/tpm-tools/ci/8f253fbc61b8afb6a5d341090bba31dada29dffd/ that fixed an other occurrence of this apparently Edit: Is that patch actually correct?

  • Laurent Bigonville Laurent Bigonville posted a comment on ticket #233

    I see this commit: https://sourceforge.net/p/trousers/tpm-tools/ci/8f253fbc61b8afb6a5d341090bba31dada29dffd/ that fixed an other occurrence of this apparently

  • Laurent Bigonville Laurent Bigonville posted a comment on ticket #199

    Any new about this bug? This breaks the build on x32 architecture as the target is x86_64-pc-linux-gnux32 The compiler should already know what to do for the target architecture without this flag

  • Laurent Bigonville Laurent Bigonville posted a comment on ticket #227

    Isn't openssl 1.1 supported now? That should be closed

  • Laurent Bigonville Laurent Bigonville created ticket #233

    tpm_nvcommon.c:167:31: warning: comparison of constant ‘124’ with boolean expression is always false [-Wbool-compare]

  • Stefan Strogin Stefan Strogin created merge request #2

    trousers: do not re-declare RSA_set0_key with LibreSSL

  • Fabrice Fontaine Fabrice Fontaine created merge request #1

    Check that getpwent_r is available before using it

  • TrouSerS TrouSerS released /tpm-tools/1.3.9.2/tpm-tools-1.3.9.2.tar.gz

  • TrouSerS TrouSerS released /trousers/0.3.15/trousers-0.3.15.tar.gz

  • Debora Velarde Babb committed [bf4383]

    Bumped version to 1.3.9.2

  • Debora Velarde Babb committed [94144b]

    Bumped version to 0.3.15

  • Debora Velarde Babb committed [d3fefa]

    dist: install tcsd.conf as root:tss 0640

  • Debora Velarde Babb committed [af2721]

    Fix build with OpenSSL 1.1 due to EVP_PKEY being an opaque struct

  • Debora Velarde Babb committed [49b9a9]

    Fix build with OpenSSL 1.1 due to RSA being an opaque struct

  • Debora Velarde Babb committed [b7c185]

    tpm-tools: manpage cleanup

  • Debora Velarde Babb committed [331865]

    tpm-tools: don't use __no_optimize

  • Debora Velarde Babb committed [6edef3]

    trousers: don't use __no_optimize

  • Debora Velarde Babb committed [4486c9]

    Support using PCRs 15-23 for sealing data

  • Debora Velarde Babb committed [e74dd1]

    Correct multiple security issues that are present if the tcsd

  • Debora Velarde Babb committed [48d278]

    trousers: fix potential use after free in ima_get_entry

  • Debora Velarde Babb committed [44f582]

    Merge branch 'master' of ssh://git.code.sf.net/p/trousers/trousers

  • Debora Velarde Babb committed [10b338]

    trousers: clean up use after free in Transport_TerminateHandle

  • Debora Velarde Babb committed [0a14b9]

    trousers: clean up use after free in Transport_TerminateHandle

  • fis fis posted a comment on ticket #232

    I forgot to mention it is debian 10.4 package v. 0.3.14+fixed1-1

  • fis fis created ticket #232

    tcsd crashes when DNS server is not available

  • Debora Velarde Babb committed [c9b8c4]

    trousers: resolve build failure

  • klondike klondike created merge request #4

    tpm_sealdata: Allow setting PCR values

  • Dimitris Dimitris created ticket #231

    Retry to transmit data in req_mgr_submit_req causing TDDL_E_INSUFFICIENT_BUFFER incorrectly

  • Ricky Tigg Ricky Tigg created ticket #230

    Hardware with TPM 1.2 chip not supported by Trousers.

  • Debora V. Babb committed [8a867e]

    Added Vicky as a contributor

  • Debora V. Babb committed [5dea0b]

    updated maintainer info

  • Thomas Thomas created ticket #229

    Tspi_Context_Close is blocked when it is called a second time in a process. (Missing MUTEX_UNLOCK in get_user_ps_path function)

  • Alon Bar-Lev Alon Bar-Lev created ticket #228

    [openssl-tpm-enigne] openssl-1.1 support

  • Alon Bar-Lev Alon Bar-Lev created ticket #227

    [tpm-tools] openssl-1.1 support

  • debora debora modified ticket #219

    tpm_nvread - 'No space to load key'

  • Laurent Bigonville Laurent Bigonville posted a comment on ticket #225

    Actually tpm_resetdalock is not the only one, tpm_unsealdata also doesn't list the -u option

  • Laurent Bigonville Laurent Bigonville created ticket #226

    Please indicate in the manpage that tpm_restrictpubek is permanant

  • Laurent Bigonville Laurent Bigonville created ticket #225

    tpm_resetdalock doesn't list -u option

  • Michael Cronenworth Michael Cronenworth posted a comment on ticket #224

    To be specific: src/tspi/ps/ps_utils.c: read_data(int fd, void *data, UINT32 size)

  • Michael Cronenworth Michael Cronenworth created ticket #224

    Rename the shared symbol read_data

  • Tomasz Kazimierczak Tomasz Kazimierczak created ticket #223

    Libtspi der/ber encoding/decoding machinery fails with libssl1.1

  • Alon Bar-Lev Alon Bar-Lev posted a comment on ticket #199

    please, this flag must be removed and determined by the toolchain, packages should not set this flag as it damage some of the configuration, for example building 32bit on amd64 or the new abi of linux. no package should enforce cpu specific flags. at gentoo maintainer I need to patch this package every new release.

  • Bernard Spil Bernard Spil created ticket #222

    Fix build with LibreSSL 2.7

  • Susan Hinrichs Susan Hinrichs posted a comment on ticket #221

    Sorry, it is been a long time since I created a patch file outside of git. I've attached a proper patch file.

  • Susan Hinrichs Susan Hinrichs created ticket #221

    Segfault on tcsd thread shutdown

  • Steffen Steffen created ticket #220

    Issue with handle randomization - getNextHandle()

  • Francis Theodore Catte Francis Theodore Catte posted a comment on ticket #219

    It looks like the NVRAM in this TPM is bad. I tried moving the key to index 2, and got a "Bad memory index error" instead. Same thing occurred at various other indexes. Using an identical laptop (same TPM version and everything) with this workflow worked flawlessly... Guess you can close this ticket.

  • Francis Theodore Catte Francis Theodore Catte posted a comment on ticket #219

    Okay, running the emulated TPM, I can read back the keyfile perfectly fine. So I ran the TPM proxy instead on a cleared TPM, and it fails. I've attached the resulting trace. For future reference , I got the TPM proxy running reliably like this in two terminals: sudo ./tpm_proxy --port 6543 --nodaemon --log ~/tpm_proxy.log --verbose --device /dev/tpm0 --persisttpm sudo tcsd -e -f Then ran my keyfile setup like normal in a third terminal. sudo -i tpm_takeownership -z tpm_nvdefine -i 0xffffffff -s 0...

  • Ken Goldman Ken Goldman posted a comment on ticket #219

    I'm not a trousers expert, but I do know the TPM well. I recommend debugging first with a software TPM (e.g, https://sourceforge.net/projects/ibmswtpm/. The trace should tell you what the TSS is doing and where the bug is. Feel free to send me the trace file if the error isn't obvious.

  • Francis Theodore Catte Francis Theodore Catte created ticket #219

    tpm_nvread - 'No space to load key'

  • Matthias Gerstner Matthias Gerstner created merge request #2

    OpenSSL 1.1 compatibility and autotools improvement

  • debora debora modified ticket #212

    Extra dot after NAME in Tspi_Context_Connect.3 man page

  • debora debora modified ticket #211

    libtspi assumes linux equals glibc

  • Laurent Bigonville Laurent Bigonville created ticket #218

    Shouldn't tpm_resetdalock support unicode?

  • Ken Goldman Ken Goldman posted a comment on ticket #216

    A bit off topic ... Dan Anderson: IBM has a TSS for TPM 2.0. If you would like to test it on Solaris, I'd be happy to fix any bugs you find. kgoldman@us.ibm.com

  • Dan Anderson Dan Anderson created ticket #217

    Fix compiler warnings in tcsd with inproper printf format

  • Dan Anderson Dan Anderson created ticket #216

    TDDL function open_device() fails if fd == 0

  • Dan Anderson Dan Anderson created ticket #215

    Core dump caused by misaligned pointer in tcs get_tpm_metrics()

  • Dan Anderson Dan Anderson posted a comment on ticket #214

    FYI, the downstream Oracle Solaris patch above is trousers/patches/include_tspps.h.patch

  • Dan Anderson Dan Anderson created ticket #214

    Header file tsp_delegate.h missing __spi_freeTable definition

  • Dan Anderson Dan Anderson created ticket #213

    Include Solaris with operating systems using const keyword to remove compiler warnings

  • Dan Anderson Dan Anderson posted a comment on ticket #209

    The above link is dead. It would be better, I think, to file individual bugs for each patch or each problem.

  • Dan Anderson Dan Anderson created ticket #212

    Extra dot after NAME in Tspi_Context_Connect.3 man page

  • Natanael Copa Natanael Copa posted a comment on ticket #211

    Better (untested) variant, without mutex, using getpwuid_r, which also deals with the situation that the euid does not exist: diff --git a/src/tspi/ps/tspps.c b/src/tspi/ps/tspps.c index b5e83d0..4874509 100644 --- a/src/tspi/ps/tspps.c +++ b/src/tspi/ps/tspps.c @@ -51,9 +51,6 @@ static int user_ps_fd = -1; static MUTEX_DECLARE_INIT(user_ps_lock); -#if (defined (__FreeBSD__) || defined (__OpenBSD__)) -static MUTEX_DECLARE_INIT(user_ps_path); -#endif static struct flock fl; @@ -66,9 +63,7 @@ get_user_ps_path(char...

  • Natanael Copa Natanael Copa posted a comment on ticket #211

    Something like: diff --git a/src/tspi/ps/tspps.c b/src/tspi/ps/tspps.c index b5e83d0..838522c 100644 --- a/src/tspi/ps/tspps.c +++ b/src/tspi/ps/tspps.c @@ -51,9 +51,7 @@ static int user_ps_fd = -1; static MUTEX_DECLARE_INIT(user_ps_lock); -#if (defined (__FreeBSD__) || defined (__OpenBSD__)) static MUTEX_DECLARE_INIT(user_ps_path); -#endif static struct flock fl; @@ -66,9 +64,6 @@ get_user_ps_path(char **file) TSS_RESULT result; char *file_name = NULL, *home_dir = NULL; struct passwd *pwp; -#if...

  • Natanael Copa Natanael Copa posted a comment on ticket #211

    Apparently getpwent_r is not re-entrant. From man page: The function getpwent_r() is not really reentrant since it shares the reading position in the stream with all other threads. http://man7.org/linux/man-pages/man3/getpwent_r.3.html#NOTES I think it might be wise to simply drop the #if (defined(__linux) .....) and #if (defined (__FreeBSD__) || ...) and always use the mutex and posix compatible getpwent.

  • deitch deitch created ticket #211

    libtspi assumes linux equals glibc

  • syed mahaboob syed mahaboob created ticket #210

    Trousers on Android -N

  • Laurent Bigonville Laurent Bigonville created ticket #209

    Please considere debian patches

  • Laurent Bigonville Laurent Bigonville created ticket #208

    tpm_version prints non-initialised memory

  • debora debora modified ticket #196

    tpm_nvdefine not ask passwords

  • debora debora posted a comment on ticket #199

    Was able to build on x86_64 with patch. Still need to test on other architectures.

  • Rojikku Rojikku created ticket #207

    Build failed in function readx509Cert

  • Max Resch Max Resch posted a comment on ticket #44

    After some feedback from colleagues, I revised my patch and removed the necesity to decide at compile time, if support for UNIX Socket is compiled, insted it is treated the same as INET and INET6 sockets, with an option in the configuration option, that allows it to be disabled

  • debora debora modified ticket #204

    obj_context: unlock mutex in err path (patch provided)

  • debora debora modified ticket #203

    Seg faults in Test Suite due to hard coded return codes

  • debora debora posted a comment on ticket #204

    Tested and merged patch into my 'dev' branch. Needs to be merged into master.

  • debora debora posted a comment on ticket #203

    Merged patch into my 'dev' branch. Needs to be merged into master.

  • Max Resch Max Resch created ticket #44

    [PATCH] TCSD unix socket

  • debora debora modified ticket #205

    tpm-tools - patches for OpenSSL 1.1

  • debora debora posted a comment on ticket #205

    Unfortunately we won't be able to merge these patches due to the following found in one of the patches: + * Getter functions for OpenSSL < 1.1 compatibility. Based on code from: + * https://wiki.openssl.org/index.php/1.1_API_Changes#Adding_forward-compatible_code_to_older_versions + * and therefore: + * Copyright OpenSSL 2016 + * Contents licensed under the terms of the OpenSSL license + * See http://www.openssl.org/source/license.html for details My understanding is that the OpenSSL license is not...

  • Adam S Adam S created ticket #206

    Problem with Binding/Unbinding

  • debora debora modified ticket #205

    tpm-tools - patches for OpenSSL 1.1

  • debora debora modified ticket #204

    obj_context: unlock mutex in err path (patch provided)

  • debora debora modified ticket #199

    [tpm-tools PATCH] autoconf inject unneeded -m64 to CFLAGS

  • debora debora posted a comment on ticket #205

    Patch contains the following: Getter functions for OpenSSL < 1.1 compatibility. Based...

  • debora debora created ticket #205

    tpm-tools - patches for OpenSSL 1.1

1 >
MongoDB Logo MongoDB