←back to thread

189 points arjvik | 2 comments | | HN request time: 0.417s | source
Show context
staff3203 ◴[] No.42734355[source]
On my system, I used `tpm2-measure-pcr=yes` in `/etc/crypttab.initramfs`, then used `--tpm2-pcrs=0+2+7+15:sha256=0000000000000000000000000000000000000000000000000000000000000000` with `systemd-cryptenroll`.

As soon as a volume is decrypted, initrd will write `volume-key` to PCR 15, so any further executables can no longer access the data stored in the TPM.

replies(2): >>42735476 #>>42736760 #
1. usr1106 ◴[] No.42735476[source]
Yes, that seems a good extra level of defense. Allow unsealing only once. We extend a PCR with random data.
replies(1): >>42736171 #
2. dist-epoch ◴[] No.42736171[source]
This is what Bitlocker does. There was a recent article about it.