Received: by 2002:a05:6a10:a0d1:0:0:0:0 with SMTP id j17csp1786062pxa; Sun, 16 Aug 2020 11:02:37 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyThSUKf0v5fB6R8qxiWQ+vBuq9xFcUeANuBduOVpyAcauzrUhDEpLjdKJgLeaY+A6aarZq X-Received: by 2002:a17:907:2115:: with SMTP id qn21mr12208281ejb.157.1597600957142; Sun, 16 Aug 2020 11:02:37 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1597600957; cv=none; d=google.com; s=arc-20160816; b=NjRxCnqZQU0bBCrnAO35srjhzffsDw+PZT7ZTGQsVNiD+k5uZM+Ci3rSyfg3gnCfXZ tZn19nnpjZxprQFX7YHPXOTtas6HPZPhgEF0JK+KC8u+yREqONXvFCJpKS27/Uv+FCmC P3BklTSjm+cdE5JTJbldjOC3fzwu6tPBgP2IOvdyH8D9EovlDxhXqBaIIqUDyKmCsn9w YT0FlOzh58Qu0+wOvx5pwApJK3psXCh+hUYDx+JsITRJC4/Upi/fnMaVlav03rZa0/v/ VmTKtoW6xOKJPYb2gC9peoyP19tTa/NbY8hffXNRnCCAxTCk5X3J7LwIUh0FWjD1Ka+1 W4mg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:subject:autocrypt:from:references:cc:to; bh=KFFjni7okhKION/dbYOAzxc4nS77xtOJI9OrVKBrXxU=; b=EpSnvr8ag9ijFn62aLyU2NF6+hUw1rloVTQ0G2aNp3zBib1bKb5/YS1dtadxxuuipz j3TwIfE3H2L7y7akT//JUPV7NCUKjtTuNwBfFN3uih1XzCxTjdRXT/foD5pCWtbWt6Pi mbub/IUzfQ0vKQ6XU4WZ4at1h7idmxYu8wVaFaMofFHGc6343ackgLR7xUhQSVhop3Fo UA4CRudSHbLzXNNT9H738C3n3HiW5rlOLJUd0M6+9itYYHlx0Mn+io9TEuDD6uLIjBjM liQnAydWHfLYmlxFXzvXxfwV1tFF1L3dxhyMMDBzDjqcJXUh4F8ASk4ZEAWFvGY7xSwk JY8g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id e7si9474287ejn.5.2020.08.16.11.02.14; Sun, 16 Aug 2020 11:02:37 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729408AbgHPRWd (ORCPT + 99 others); Sun, 16 Aug 2020 13:22:33 -0400 Received: from mx2.suse.de ([195.135.220.15]:39286 "EHLO mx2.suse.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726511AbgHPRWd (ORCPT ); Sun, 16 Aug 2020 13:22:33 -0400 X-Virus-Scanned: by amavisd-new at test-mx.suse.de Received: from relay2.suse.de (unknown [195.135.221.27]) by mx2.suse.de (Postfix) with ESMTP id 4A928B020; Sun, 16 Aug 2020 17:22:55 +0000 (UTC) To: jejb@linux.ibm.com Cc: Stefan Berger , keyrings@vger.kernel.org, linux-kernel@vger.kernel.org, Dan Williams , Jarkko Sakkinen , Mimi Zohar References: <20200815075143.47082-1-colyli@suse.de> <096636f4-a928-dd00-dba6-216651c3d63b@suse.de> <1597597699.8344.11.camel@linux.ibm.com> From: Coly Li Autocrypt: addr=colyli@suse.de; keydata= mQINBFYX6S8BEAC9VSamb2aiMTQREFXK4K/W7nGnAinca7MRuFUD4JqWMJ9FakNRd/E0v30F qvZ2YWpidPjaIxHwu3u9tmLKqS+2vnP0k7PRHXBYbtZEMpy3kCzseNfdrNqwJ54A430BHf2S GMVRVENiScsnh4SnaYjFVvB8SrlhTsgVEXEBBma5Ktgq9YSoy5miatWmZvHLFTQgFMabCz/P j5/xzykrF6yHo0rHZtwzQzF8rriOplAFCECp/t05+OeHHxjSqSI0P/G79Ll+AJYLRRm9til/ K6yz/1hX5xMToIkYrshDJDrUc8DjEpISQQPhG19PzaUf3vFpmnSVYprcWfJWsa2wZyyjRFkf J51S82WfclafNC6N7eRXedpRpG6udUAYOA1YdtlyQRZa84EJvMzW96iSL1Gf+ZGtRuM3k49H 1wiWOjlANiJYSIWyzJjxAd/7Xtiy/s3PRKL9u9y25ftMLFa1IljiDG+mdY7LyAGfvdtIkanr iBpX4gWXd7lNQFLDJMfShfu+CTMCdRzCAQ9hIHPmBeZDJxKq721CyBiGAhRxDN+TYiaG/UWT 7IB7LL4zJrIe/xQ8HhRO+2NvT89o0LxEFKBGg39yjTMIrjbl2ZxY488+56UV4FclubrG+t16 r2KrandM7P5RjR+cuHhkKseim50Qsw0B+Eu33Hjry7YCihmGswARAQABtBhDb2x5IExpIDxj b2x5bGlAc3VzZS5kZT6JAlYEEwEIAEACGyMHCwkIBwMCAQYVCAIJCgsEFgIDAQIeAQIXgBYh BOo+RS/0+Uhgjej60Mc5B5Nrffj8BQJcR84dBQkY++fuAAoJEMc5B5Nrffj8ixcP/3KAKg1X EcoW4u/0z+Ton5rCyb/NpAww8MuRjNW82UBUac7yCi1y3OW7NtLjuBLw5SaVG5AArb7IF3U0 qTOobqfl5XHsT0o5wFHZaKUrnHb6y7V3SplsJWfkP3JmOooJsQB3z3K96ZTkFelsNb0ZaBRu gV+LA4MomhQ+D3BCDR1it1OX/tpvm2uaDF6s/8uFtcDEM9eQeqATN/QAJ49nvU/I8zDSY9rc 0x9mP0x+gH4RccbnoPu/rUG6Fm1ZpLrbb6NpaYBBJ/V1BC4lIOjnd24bsoQrQmnJn9dSr60X 1MY60XDszIyzRw7vbJcUn6ZzPNFDxFFT9diIb+wBp+DD8ZlD/hnVpl4f921ZbvfOSsXAJrKB 1hGY17FPwelp1sPcK2mDT+pfHEMV+OQdZzD2OCKtza/5IYismJJm3oVUYMogb5vDNAw9X2aP XgwUuG+FDEFPamFMUwIfzYHcePfqf0mMsaeSgtA/xTxzx/0MLjUJHl46Bc0uKDhv7QUyGz0j Ywgr2mHTvG+NWQ/mDeHNGkcnsnp3IY7koDHnN2xMFXzY4bn9m8ctqKo2roqjCzoxD/njoAhf KBzdybLHATqJG/yiZSbCxDA1n/J4FzPyZ0rNHUAJ/QndmmVspE9syFpFCKigvvyrzm016+k+ FJ59Q6RG4MSy/+J565Xj+DNY3/dCuQINBFYX6S8BEADZP+2cl4DRFaSaBms08W8/smc5T2CO YhAoygZn71rB7Djml2ZdvrLRjR8Qbn0Q/2L2gGUVc63pJnbrjlXSx2LfAFE0SlfYIJ11aFdF 9w7RvqWByQjDJor3Z0fWvPExplNgMvxpD0U0QrVT5dIGTx9hadejCl/ug09Lr6MPQn+a4+qs aRWwgCSHaIuDkH3zI1MJXiqXXFKUzJ/Fyx6R72rqiMPHH2nfwmMu6wOXAXb7+sXjZz5Po9GJ g2OcEc+rpUtKUJGyeQsnCDxUcqJXZDBi/GnhPCcraQuqiQ7EGWuJfjk51vaI/rW4bZkA9yEP B9rBYngbz7cQymUsfxuTT8OSlhxjP3l4ZIZFKIhDaQeZMj8pumBfEVUyiF6KVSfgfNQ/5PpM R4/pmGbRqrAAElhrRPbKQnCkGWDr8zG+AjN1KF6rHaFgAIO7TtZ+F28jq4reLkur0N5tQFww wFwxzROdeLHuZjL7eEtcnNnzSkXHczLkV4kQ3+vr/7Gm65mQfnVpg6JpwpVrbDYQeOFlxZ8+ GERY5Dag4KgKa/4cSZX2x/5+KkQx9wHwackw5gDCvAdZ+Q81nm6tRxEYBBiVDQZYqO73stgT ZyrkxykUbQIy8PI+g7XMDCMnPiDncQqgf96KR3cvw4wN8QrgA6xRo8xOc2C3X7jTMQUytCz9 0MyV1QARAQABiQI8BBgBCAAmAhsMFiEE6j5FL/T5SGCN6PrQxzkHk2t9+PwFAlxHziAFCRj7 5/EACgkQxzkHk2t9+PxgfA//cH5R1DvpJPwraTAl24SUcG9EWe+NXyqveApe05nk15zEuxxd e4zFEjo+xYZilSveLqYHrm/amvQhsQ6JLU+8N60DZHVcXbw1Eb8CEjM5oXdbcJpXh1/1BEwl 4phsQMkxOTns51bGDhTQkv4lsZKvNByB9NiiMkT43EOx14rjkhHw3rnqoI7ogu8OO7XWfKcL CbchjJ8t3c2XK1MUe056yPpNAT2XPNF2EEBPG2Y2F4vLgEbPv1EtpGUS1+JvmK3APxjXUl5z 6xrxCQDWM5AAtGfM/IswVjbZYSJYyH4BQKrShzMb0rWUjkpXvvjsjt8rEXpZEYJgX9jvCoxt oqjCKiVLpwje9WkEe9O9VxljmPvxAhVqJjX62S+TGp93iD+mvpCoHo3+CcvyRcilz+Ko8lfO hS9tYT0HDUiDLvpUyH1AR2xW9RGDevGfwGTpF0K6cLouqyZNdhlmNciX48tFUGjakRFsxRmX K0Jx4CEZubakJe+894sX6pvNFiI7qUUdB882i5GR3v9ijVPhaMr8oGuJ3kvwBIA8lvRBGVGn 9xvzkQ8Prpbqh30I4NMp8MjFdkwCN6znBKPHdjNTwE5PRZH0S9J0o67IEIvHfH0eAWAsgpTz +jwc7VKH7vkvgscUhq/v1/PEWCAqh9UHy7R/jiUxwzw/288OpgO+i+2l11Y= Subject: Re: [PATCH RESEND] docs: update trusted-encrypted.rst Message-ID: <90ce83bf-3547-7ad4-ea6d-40e2e77e29dd@suse.de> Date: Mon, 17 Aug 2020 01:22:26 +0800 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:68.0) Gecko/20100101 Thunderbird/68.11.0 MIME-Version: 1.0 In-Reply-To: <1597597699.8344.11.camel@linux.ibm.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 2020/8/17 01:08, James Bottomley wrote: > On Mon, 2020-08-17 at 01:01 +0800, Coly Li wrote: >> On 2020/8/17 00:06, Stefan Berger wrote: >>> On 8/15/20 3:51 AM, Coly Li wrote: > [...] >>>> Usage:: >>>> @@ -115,7 +114,7 @@ append 'keyhandle=0x81000001' to statements >>>> between quotes, such as >>> >>> >>> A note in this file states this: >>> >>> Note: When using a TPM 2.0 with a persistent key with handle >>> 0x81000001, append 'keyhandle=0x81000001' to statements between >>> quotes, such as "new 32 keyhandle=0x81000001". >>> >>> Now if someone was (still) interested in TPM 1.2 then the below >>> changes you are proposing wouldn't work for them. Maybe you should >>> adapt the note to state that these keyhandle=... should be removed >>> for the TPM 1.2 case. >>> >> >> I agree. Indeed I have no idea why number 0x81000001 is used, and I >> don't have practice experience with TPM 1.2. Now the purpose of this >> patch accomplished: experts response and confirm my guess :-) > > It was the conventional persistent value for the RSA 2048 version of > the primary storage seed. Originally the PC spec required the > manufacturer provision this on all TPM 2.0 based PC class systems. > Unfortunately in spite of it being in the Windows Hardware guide no > manufacturer ever did, meaning you either have to create it yourself or > do something different. Because of usability problems, every consumer > of TPM key function has opted to do something different, namely derive > the EC primary if no parent is specified. Aha, thanks for the hint :-) My motivation is for the NVDIMM security with TPM 2.0 chip on x86 server (Lenovo SR650). To automatically load a trusted key, I encounter the outdated command line in trusted-encrypted.rst. From your response, it seems 0x81000001 is still a working value that I can recommend to other people who want to encrypt/decrypt their NVDIMM banks. Coly Li