Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

TODO list for libtpms v0.10 #431

Open
5 tasks done
stefanberger opened this issue Jul 20, 2024 · 0 comments
Open
5 tasks done

TODO list for libtpms v0.10 #431

stefanberger opened this issue Jul 20, 2024 · 0 comments

Comments

@stefanberger
Copy link
Owner

stefanberger commented Jul 20, 2024

  • [] Merge all outstanding rev180/183 changes:
  • deferred: Support for RuntimeAttributes as used for support of FIPS: Add support for FIPS restrictions on more crypto algorithms #428
  • KDFe support via OpenSSL: Implement KDFe using OpenSSL's SSKDF #424
  • [] KDFa support via OpenSSL: unlikely to work
  • Determine whether CrypEccEncrypt/Decrypt can be implemented with OpenSSL functions: no know API
  • [] Check that algorithm and command filtering is done where necessary
  • No: Enable SvnLimited and FirmwareLimited hierarchies? What would libtpms need to enable these?
    • No to FirmwareLimited: different versions of compilers compiling the same code may lead to different binaries and therefore measuring the libtpms binary may lead to different measurements even if the source is the same -- what should the firmware hash then be?
    • Deferring SvnLimited support
  • [] FIPS-compliance: Support FIPS-140-3 guidance document? How?
    • Easy to handle:
      • Disablement of algorithms (ecdaa, ecschnorr) and curves (ecc-bn, ecc-bn-p*, ecc-sm2-p*)
      • Min. RSA key size: rsa-min-size=2048
      • Min. EC key suze: ecc-min-size=224
      • HMAC min. key size 112 bits : are there any keys smaller than 128bits when only AES symmetric crypto is supported?
      • ECC and RSA signature generation not allowed with SHA1: see code in FIPS 140 branch
    • Others:
      • Does preventing ECC key derivation solve the problem of prohibiting ECDSA signatures with derived ECC keys?
      • XOR usage described in 5.5
    • Missing:
      • Pair-wise consistency tests for RSA are missing
      • SHA1 etc. are used for HMAC testing but not tested on their own
      • See table 39 of FIPS 140-3 guidance document
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant