February 2, 2020

242 words 2 mins read

Verifying Device Identity with TPMs

Verifying Device Identity with TPMs

There are many cases where you'd like to know exactly which computer you're talking to. Sometimes it's because you're SSHing to a remote machine and you'd like to verify your connection isn't being in …

Talk Title Verifying Device Identity with TPMs
Speakers Matthew Garrett (Security developer, Google), Brandon Weeks (Security Engineer, Google)
Conference Open Source Summit + ELC Europe
Conf Tag
Location Lyon, France
Date Oct 27-Nov 1, 2019
URL Talk Page
Slides Talk Slides
Video

There are many cases where you’d like to know exactly which computer you’re talking to. Sometimes it’s because you’re SSHing to a remote machine and you’d like to verify your connection isn’t being intercepted. Sometimes it’s because you’re a VPN server and you’d like to ensure that the client is actually one of your computers, not just pretending to be one.But what defines machine identity? You could just issue each machine with a key when it’s initially enrolled, but what stops an attacker from copying it off the machine and creating as many fake computers as they want?Most modern systems include a Trusted Platform Module, a small cryptographic device that has its own unique cryptographic identity and securely stores encryption keys. In this presentation we will demonstrate how the TPM can be used to solve the machine identity problem, making SSH trust on first use a thing of the past and ensuring that only trusted machines are able to gain access to your network infrastructure.

comments powered by Disqus