> -Original Message-
> From: John R Pierce [mailto:pie...@hogranch.com]
> Sent: Sunday, May 19, 2013 17:57
> To: CentOS mailing list
> Subject: Re: [CentOS] TPM and secure boot
>
> On 5/19/2013 2:41 PM, Reindl Harald wrote:
> > your question was*clearly* secu
On Sun, 2013-05-19 at 14:38 -0700, John R Pierce wrote:
> On 5/19/2013 2:06 PM, Reindl Harald wrote:
> > Am 19.05.2013 22:59, schrieb John R Pierce:
> >> >is this typically used in conjunction with disk encryption such that the
> >> >TPM module supplies the decryption keys? does linux have any conc
On 5/19/2013 2:41 PM, Reindl Harald wrote:
> your question was*clearly* secure boot
> and before UEFI secure boot*nobody* cared about TPM on OS systems
so basically, you're saying you can't use a TPM to secure a linux
system? hey, saves me a lot of work. I'll tell my boss it can't be
don
On 5/19/2013 2:06 PM, Reindl Harald wrote:
> Am 19.05.2013 22:59, schrieb John R Pierce:
>> >is this typically used in conjunction with disk encryption such that the
>> >TPM module supplies the decryption keys? does linux have any concept
>> >of signed executables, kernel, and so forth? would repla
has anyone implemented any sort of 'secure boot' using TPM 1.2 modules
on the server boards using CentOS 6.x ? I'm not finding much concrete
stuff on how to setup and manage a system like this, but I've been asked
to research it for a security application internally at my job.
our primary app
5 matches
Mail list logo