Overview
Explore the fundamentals of Trusted Platform Module (TPM) 2.0 and its implementation in Linux systems in this 37-minute conference talk. Learn about the tpm2-software stack, its user-friendly eSAPI and FAPI additions, and how developers can leverage TPM to enhance system security. Discover practical use cases, including shielded key storage, disk encryption, and user authentication for VPNs. Gain insights into the TPM2.0 ecosystem, the TSS APIs, and the tpm2-software core projects. Understand the latest developments, such as the libtss2-fapi.so library, and compare API code and policies. Identify current limitations and future possibilities for TPM implementation in Linux.
Syllabus
Intro
Who am I?
Putting TPMs into things
Introduction to TPMS
The TPM Software Stack 2.0
The TSS APIS
Projects overview
The tpm2-software core projects
People and community
Tags tags tags
Existing TSS things
UC: Shielded key storage and usage
UC: Disk encryption
UC: (VPN) user authentication
What's new ? libtss2-fapi.so!
API Code comparison (Signing)
Policy Comparison
UC: (General) user authentication
What's missing?
Taught by
Linux Foundation