TPM Boot Integrity
Definition
Assuring the integrity of a platform by demonstrating that the boot process starts from a trusted combination of hardware and software and continues until the operating system has fully booted and applications are running. Sometimes called Static Root of Trust Measurement (STRM).
Synonyms: Static Root of Trust Measurement , and STRM .How it works
During the boot process, the BIOS boot block (which with this defense enabled, is the Core Root of Trust for Measurement) measures boot components (firmware, ROM). The TPM hashes those measurements and stores the hashes in Platform Configuration Registers (PCRs). Upon a subsequent boot, these hashes are provided to a verifier which compares the stored measurements to the new boot measurements. Integrity of the boot components is assured if they match.
Attestation of the secure boot occurs when a verifying entity requests a Quote which is a concatenation of the requested PCR values, hashed and signed by the TPM's unique RSA key. The TPM signature is trusted because the private key is stored securely in hardware and never leaves the TPM.
Considerations
- The TPM does not perform the follow-on actions of acting on the PCR value information, it just provides the PCR stored information.
- The current version of TPM is 2.0.; most existing implementations use TPM 1.2.
Citations
[1] TPM 2.0 Library [2] TCG Trusted Attestation Protocol (TAP) Use Cases for TPM Families 1.2 and 2.0 and DICE
References
The following references were used to develop the TPM Boot Integrity knowledge-base article.
(Note: the consideration of references does not imply specific functionality exists in an offering.)