are you using the Windiws stack or the Linux one? if Linux, is the file
where the keys are registered present in all cases? Look in trousers.conf
to find where it is.
On Tuesday, August 14, 2012, Segall, Ariel E wrote:
> I'm seeing some very odd behavior, and even though it's not *technically*
> a trousers problem, I was hoping that other folks here might perhaps have
> seen something similar in the past and solved it, or have some good
> suggestions for tracking down the root cause.
>
> We've put together a set of programs designed to provision a TPM
> automatically-- create the EK if necessary, take ownership, create some
> utility keys-- and collect some miscellaneous information about the TPM.
> In the course of testing, however, we've noticed something weird. On three
> different machines, the provisioning runs without any errors, and test
> code that uses OwnerAuth and the SRK works just fine. However, upon
> rebooting the machine, on *two* of the three machines, running code that
> uses the SRK gets TSS_E_PS_KEY_NOTFOUND errors. This happens both with the
> nice, solid tpm_tools programs and with my own code.
>
> Now, normally, SRK not found errors would mean that ownership hadn't been
> taken successfully. But it has been; on all of these machines, I can run
> the SRK-using code immediately after taking ownership with no trouble, and
> they all still acknowledge the owner auth even after reboot. But the SRK
> is in a standard location. So why on earth would two of these machines be
> unable to locate it after a reboot? The fact that the third machine
> *works* is in many ways even more confusing; they're all Dell machines
> with Broadcom TPMs, and although they differ in age, it's the one in the
> middle that works just fine. If it were a driver problem, or some
> confusing misunderstanding on my part about expected behavior, I'd expect
> it to be consistent among the three; it's possible that this is some
> strange TPM failure mode, but having two out of three of my first set of
> test machines fail that way would surprise me.
>
> Any ideas?
>
> Ariel
>
>
>
> ------------------------------------------------------------------------------
> Live Security Virtual Conference
> Exclusive live event will cover all the ways today's security and
> threat landscape has changed and how IT managers can respond. Discussions
> will include endpoint security, mobile security and the latest in malware
> threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
> _______________________________________________
> TrouSerS-users mailing list
> [email protected] <javascript:;>
> https://lists.sourceforge.net/lists/listinfo/trousers-users
>
------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and
threat landscape has changed and how IT managers can respond. Discussions
will include endpoint security, mobile security and the latest in malware
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users