Crostini: Support SSH keys in TPM on the host
Reported by
alex.gay...@gmail.com,
Sep 18
|
||||
Issue descriptionUserAgent: Mozilla/5.0 (X11; CrOS x86_64 10895.56.0) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.95 Safari/537.36 Steps to reproduce the problem: 1. Use Crostini 2. Want to SSH places 3. Want to have hardware backed keys What is the expected behavior? There's an easy, out of the box, way to get SSH with a key set up in the TPM on the host. The implementation is probably a PKCS#11 device that uses the kernel's crypto APIs, which in turn use virtio to have the parent provide the TPM. This should _not_ result in the entire host TPM's keys being available to the guest! What went wrong? You have to have a file with a key in it, like some sort of person who doesn't care about security! Did this work before? No Chrome version: 69.0.3497.95 Channel: stable OS Version: 10895.56.0 Flash Version:
,
Sep 18
vTPM meaning "it looks like a TPM inside the guest, but actually it's just a file on disk on the host"? The support linked there is for the SSH app; for a variety of reasons I want to have hardware backed keys inside the VM, most importantly scripting and VCS integration.
,
Oct 8
,
Oct 17
,
Oct 17
> vTPM meaning "it looks like a TPM inside the guest, but actually it's just a file on disk on the host"? basically. the file would live in the user's encrypted storage which is backed by the real tpm. Tom hasn't responded, so I'm just going to create a bug and dupe into that. if you look through the docs I linked, the hwkeys work with any ssh client. so once we have USB pass thru, you can use that to pass the hwkey in. or if you're creative, could probably have an ssh-agent app expose access over the local network for the VM to use. either way, direct access to the real TPM from VMs is off the table.
,
Oct 18
,
Oct 18
Ok. I think that reasonably meets my threat model -- I'd like to be resilient to path traversal and other arbitrary read vulnerabilities. Obviously doesn't protect against them on the host, but that should be a significantly thicker attack surface (no curl | bash there!). |
||||
►
Sign in to add a comment |
||||
Comment 1 by vapier@chromium.org
, Sep 18Labels: -Pri-2 Pri-3