Trusted Execution Technology and TBoot Implementation - White Paper

1
2009-2010 p/w Mobile Platforms (Montevina/Calpella)
Table of Contents:
Introduction .................................................................................................................................... 1
System Requirements .................................................................................................................. 2
BIOS TXT Settings ............................................................................................................................ 2
Fedora Installation .......................................................................................................................... 2
XEN 3.4.0 Installation ..................................................................................................................... 3
TBOOT Installation .......................................................................................................................... 4
TPM TOOLS 1.3.4 Installation .......................................................................................................... 5
LCP: Define Platform Owner Policy ................................................................................................... 5
Appendix A .................................................................................................................................... 7
For more information .................................................................................................................... 20
Introduction
HP has implemented the Trusted eXecution Technology (TXT), part of Intel‟s Safer Computing Initiative,
on certain models of 2009-2010 commercial notebooks. The purpose of this document is to provide a
step by step guideline to setup a TXT enabled environment.
The document will cover the following areas:
BIOS settings related to TXT,
Intel‟s Trusted Execution Technology,
Trusted Boot and
Launch Control Policies
Trusted eXecution Technology (http://www.intel.com/technology/security/), a hardware-based
mechanism that helps to protect against software-based attacks and protects the confidentiality and
integrity of data stored or created on the client PC by means of measured launch and protected
execution. In other words, TXT provides only the launch-time protection, i.e. ensure that the code we
load, is really what we intended to load - secure and not compromised by any virus attacks.
(http://download.intel.com/technology/security/downloads/315168.pdf).
The technology mainly depends on set of hardware extensions to Intel processors and chipsets that
boost the platform with security capabilities. Trusted Platform Module is another important hardware
component. The TPM module is used to store and compare hash values (of launched environment),
which provides much greater security than storing them in software or on the hard disk
Trusted boot (Tboot), an open source, pre- kernel/VMM module that uses Intel(R) Trusted Execution
Technology (Intel(R) TXT) to perform a measured and verified launch of an OS kernel/VMM
(http://sourceforge.net/projects/tboot, http://www.bughost.org/repos.hg/tboot.hg).

Summary of content (20 pages)