WhyTPM2.0?ReasonsforUpgrade;UseCasesfortheLatestReleaseoftheTPMSpecification06/17/15DaveChallenerLevelSetting:WhatisaTPM?ASecurityCo-ProcessorPublicPrivateKeyOperations–KeyCreation–Keysigning–KeyexchangeNon-VolatileStorage–AccessprotectedSymmetricencryption–HMACoperations–LimitedsymmetricencryptionPurelyPassiveItdoesNOTmonitoryoursystemLevelSetting:WhatisaTPM?1999200020012002200320042005200620072008200920102011201220132014todayBeginworkingonEmbeddedSecurityChipforPCFirstSpecRelease,FirstMachineswithTPMsshippedReleaseofTSS1.10ReleaseofTSS1.20ReleaseofTPM1.20SpecificationReleaseofTSSFAPIfor2.0forPublicreviewReleaseofTSSSAPIfor2.0withCodeReleaseofTPM2.0Specification;FirstdeviceswithinternalTPM2.0ReleaseofTPM1.20asISOSpecificationTwoQuestionsWhywastheSpecificationupgradedfrom1.2?Over1BillionservedWhydoIcare?HowcanImakeuseofTPMstosolvemycurrentproblems?WhytheChangefrom1.2?SecurityTPM1.2wasbuiltaroundSHA-1–Thealgorithmwasembeddedinallstructures–Therewasn’troomenoughtosimplychangetoSHA256ComplexityTPM1.2hadgrown“organically”after1.1bItwasunnecessarilycomplicatedEaseofuseTPM1.2washardtouseComplexityofauthorizationNewFunctionalityAlgorithmflexibilityUnifiedAuthorizationFastKeyloadingFredBrooks:“Themanagementquestion,therefore,isnotwhethertobuildapilotsystemandthrowitaway.Youwilldothat.[…]Henceplantothrowoneaway;youwill,anyhow.”WhyUseaTPM2.0?Problemsthatcanbesolved/amelioratedwithTPMsPoorentropyleadingtoweakkeysSupplychainrisks/CounterfeithardwareKeepingbadguysoffofyourinternalnetworkKeepingmalwareinfectedhardwareoffofyourinternalnetworkMassivepassworddatabasereleasesMulti-factorauthenticationEmailSecurityFIPScertified/CommoncriteriacertifiedencryptionenginesSecuringyourrootcertificatesMergingphysicalandlogicalcontrolsWhyUseaTPM2.0?Problemsthatcanbesolved/amelioratedwithTPMsPoorentropyleadingtoweakkeysSupplychainrisks/CounterfeithardwareKeepingbadguysoffofyourinternalnetworkKeepingmalwareinfectedhardwareoffofyourinternalnetworkMassivepassworddatabasereleasesMulti-factorauthenticationFIPScertified/CommoncriteriacertifiedencryptionenginesSecuringyourrootcertificatesMergingphysicalandlogicalcontrolsPoorEntropySourcesLeadtoWeakKeysFrom“HowNottoGenerateRandomNumbers”VastmajorityofweakkeysgeneratedbynetworkdevicesNetworksecuritydevices/RoutersServermanagementcardsIndustrial-gradefirewalls50manufacturersTaiwanesesmartcardsproduceweakkeysMostcommonfactorappears46times!DebianweakkeysHardwareRandomNumberGeneratorBetterseedingfortheOSRNGAlsoavailablein1.2GoodforserverswhenfirstbootedGoodforembeddeddevicesWhyUseaTPM2.0?Problemsthatcanbesolved/amelioratedwithTPMsPoorentropyleadingtoweakkeysSupplychainrisks/CounterfeithardwareKeepingbadguysoffofyourinternalnetworkKeepingmalwareinfectedhardwareoffofyourinternalnetworkMassivepassworddatabasereleasesMulti-factorauthenticationEmailSecurityFIPScertified/CommoncriteriacertifiedencryptionenginesSecuringyourrootcertificatesMergingphysicalandlogicalcontrolsSupplyChainRiskManagementTPM2.0comeswithaCertificate,whichmatchesakeythatcanberegeneratedinsidetheTPM!CertificatesignedbymanufacturerProofitisagenuineTPMIDevIDcanalsobeprovidedbyanequipmentmanufacturerWithOEMcertificateCanprovechipwasonmotherboardwhenitlefttheOEMfacilityCanbeusedforwarranteeCanbeusedforcreationofLDevIDsWhyUseaTPM2.0?Problemsthatcanbesolved/amelioratedwithTPMsPoorentropyleadingtoweakkeysSupplychainrisks/CounterfeithardwareKeepingbadguysoffofyourinternalnetworkKeepingmalwareinfectedhardwareoffofyourinternalnetworkMassivepassworddatabasereleasesMulti-factorauthenticationEmailSecurityFIPScertified/CommoncriteriacertifiedencryptionenginesSecuringyourrootcertificatesMergingphysicalandlogicalcontrolsVPNpasswordcompromiseHackedViaRDP:ReallyDumbPasswordsUsePublic/privatekeyforauthentication!TPMcangeneratekeys,whichdon’tleavethemachineLDevID:IEEE8021-DEVID-MIB-LMSC,LAN/MANStandardsMaketheCompanyOwnedassetthe“Thingyouhave”TwofactorauthenticationWhyUseaTPM2.0?Problemsthatcanbesolved/amelioratedwithTPMsPoorentropyleadingtoweakkeysSupplychainrisks/CounterfeithardwareKeepingbadguysoffofyourinternalnetworkKeepingmalwareinfectedhardwareoffofyourinternalnetworkMassivepassworddatabasereleasesMulti-factorauthenticationFIPScertified/CommoncriteriacertifiedencryptionenginesSecuringyourrootcertificatesMergingphysicalandlogicalcontrolsAdvancedPersistentThreatsMBRbasedmalwareishardtofindItgetsinbeforetheanti-virusandcanhideUEFIfirmwareisevenhardertofindSMMbasedmalwareisevenhardertofindAllhavebeencompromisedTPM1.2&2.0+NewattestationmodelsIntelhardwarebasedmeasurementofbootblockoffirmwareFirmwaremeasuresrestoffirmware(including,SMM,UEFI,MBR)MeasurementsarestoredinTPMPCRsviaonewayfunctionTPMcanuseaninternalprivatekeytoattesttobootsequence1.2:AIK(AttestationIdentityKeys)2.0:Restri