Does jtss have the ability to trace the actual TPM command at the lowest 
layer, the actual packets going to and from the TPM?  It would be useful 
to know the exact sequence of commands that are causing the failure.

If not, can it talk to the TPM through a socket rather than directly to 
the TPM driver?  If so, you can use the TPM proxy that comes with the 
TPM tools Kent mentioned to create the trace.

Besides key slots, there are also session slots that might be full.

Does it happen repeatedly after a reboot?  If so, could you have created 
owner evict keys that are consuming key slots 'permanently'.  Again, the 
low level TPM utilities can help debug.

Yes, the TPM specs are imposing, but it looks like some experts monitor 
this forum and have responded.  Of course, we might not be jtss experts.

On 9/4/2012 4:46 PM, Arshad Noor wrote:
> Hi,
>
> I realize I'm on the wrong forum - since we use the TPM with the Trusted
> Java (JTSS) stack - but, I'm hoping for a little more insight, if anyone
> can provide it.  (if someone from Dell TPM Engineering is on the list),
> I would definitely welcome hearing from them directly.
>
> We've been using a TPM with an application without any trouble for 2+
> years.  Two days ago - without any changes to the hardware or software -
> it (presumably the OS driver) started throwing up the following errors
> when the software library attempted loading a binding key:
>
> TSS Error:
> error layer:                0x3000 (TSP)
> error code (without layer): 0x04
> error code (full):          0x3004
> error message: unknown
> additional info: Unable to determine LRU key handle
>
> Subsequent attempts to decrypt other binding keys result in this error:
>
> TSS Error:
> error layer:                0x00 (TPM)
> error code (without layer): 0x15
> error code (full):          0x15
> error message: The TPM has insufficient internal resources to perform
> the requested action.
>
> The details of our configuration:
>
> TPM:  STM v1.2
> OS: CentOS 5.3 (64-bit)
> JDK: 6 Update 16 (64-bit)
> JTSS: 0.5
>
> The people on JTSS have not seen this before either, and have given
> us a few suggestions (using a newer library).  We have also contacted
> Dell for support and are working with them.
>
> I would appreciate any information that forum members can provide that
> sheds light on these errors - finding it within the voluminous TPM
> specs and resources is challenging.
>
> Thanks in advance.
>
> Arshad Noor
> StrongAuth, Inc.
>



------------------------------------------------------------------------------
Live Security Virtual Conference
Exclusive live event will cover all the ways today's security and 
threat landscape has changed and how IT managers can respond. Discussions 
will include endpoint security, mobile security and the latest in malware 
threats. http://www.accelacomm.com/jaw/sfrnl04242012/114/50122263/
_______________________________________________
TrouSerS-users mailing list
[email protected]
https://lists.sourceforge.net/lists/listinfo/trousers-users

Reply via email to