top | item 19388565

(no title)

thisacctforreal | 7 years ago

Honestly it feels like splitting hairs, unless I'm misunderstanding something.

What is there to gain "cracking" the TPM itself, if you can get the keys fine by sniffing?

Apple's Secure Enclaves aren't vulnerable to sniffing, as the AES keys used for encryption live only in silicon, with access to use them granted to the Enclave.

The keys never exist in a software-readable form, even to the coveted Enclave firmware. Do TPMs offer this functionality, and Bitlocker needs to take advantage of it? Or do TPMs just not protect their keys against physical access?

discuss

order

rstuart4133|7 years ago

> What is there to gain "cracking" the TPM itself, if you can get the keys fine by sniffing?

Sniffing requires the TPM be unlocked first. If you can't get it unlocked (poor wording, but it will do), no amount if sniffing is going to get you anywhere. They sort of acknowledge that here:

> Don’t want to be vulnerable to this? Enable additional pre-boot authentication.

If they really could just extract keys from a TPM without if being unlocked there would be little point in having a TPM at all. "Little point in having a TPM at all" would be big news, and the reason many of use read the article is because the headline implied it was describing a way to do just that.

In reality the TPM remains perfectly capable of keeping it's secrets secret until someone with the right credentials comes along, and proves they have them to the TPM itself. But in the scenario described the only "credentials" required to make Bitlocker unlock the TPM was was someone pressing the on switch.

So it doesn't sound like someone extracted the keys from the TPM to me. Once the software has unlocked it and asked it to send the keys, they will exist in multiple locations. The LPC bus is one, but they will also end up in RAM, or for that matter intercept the keying material when it is sent via the SATA bus to the drives.

dlgeek|7 years ago

> What is there to gain "cracking" the TPM itself, if you can get the keys fine by sniffing?

The ability to forge remote attestations by extracting the endorsement key or various attestation identity keys that never leave the TPM in plaintext.

thisacctforreal|7 years ago

Ah I see, they can successfully protect asymmetric crypto but not symmetric.

close04|7 years ago

> What is there to gain "cracking" the TPM itself

The technical achievement itself. :) It would be a world first, unlike sniffing. Hacking the TPM chip itself could open the door to even more interesting stuff. I think the analogy I gave before perfectly illustrates the difference between the 2 ideas. Getting to the same end result doesn't mean the paths are equivalent.

Would you find it equally interesting to read about getting Bitlocker keys using the legendary xkcd $5 wrench [0]?

[0] https://xkcd.com/538/

als0|7 years ago

I’m not convinced it would be a world first. Certainly not for nation states :) but you should definitely check out the amazing work by Chris Tarnovsky on YouTube. The level of detail he goes into when decamping the chip... and the way he explains it all leaves me in a state of awe.