| ▲ | ajross a day ago | ||||||||||||||||||||||||||||||||||||||||
Or, alternatively, don't. Stuff in a TPM isn't for "security" in the abstract, it's fundamentally for authentication. Organizations want to know that the device used for connection is the one they expect to be connecting. It's an extra layer on top of "Organizations want to know the employee account associated with the connection". "Your SSH keys" aren't really part of that threat model. "You" know the device you're connecting from (or to, though generally it's the client that's the mobile/untrusted thing). It's... yours. Or under your control. All the stuff in the article about how the TPM contents can't be extracted is true, but missing the point. Yes, you need your own (outer) credentials to extract access to the (inner) credentials, which is no more or less true than just using your own credentials in the first place via something boring like a passphrase. It's an extra layer of indirection without value if all the hardware is yours. TPMs and secure enclaves only matter when there's a third party watching[1] who needs to know the transaction is legitimate. [1] An employer, a bank, a cloud service provider, a mobile platform vendor, etc... This stuff has value! But not to you. | |||||||||||||||||||||||||||||||||||||||||
| ▲ | tiberious726 19 hours ago | parent | next [-] | ||||||||||||||||||||||||||||||||||||||||
> TPM isn't for "security" in the abstract, it's fundamentally for authentication What on earth do you think I make my users present keys for??? You know all those guides saying "you should never copy an ssh private key over the network. Make a new one for each device" that every idiot dev ignored? Now I can enforce that. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | Liskni_si a day ago | parent | prev | next [-] | ||||||||||||||||||||||||||||||||||||||||
TPMs can be useful to you as an individual if you're trying to protect against an evil maid attack. Although I think Linux isn't quite there yet with its support for it. The systemd folks are making progress though. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||
| ▲ | red_admiral a day ago | parent | prev [-] | ||||||||||||||||||||||||||||||||||||||||
> TPM isn't for "security" in the abstract, it's fundamentally for authentication. Which is what SSH keys are for? The advantage of this approach is that malware can't just send off your private key file to its servers. | |||||||||||||||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||||||||||||||