Secure key handling using the TPM
Secure key handling using the TPM
Posted Oct 17, 2018 19:52 UTC (Wed) by mjg59 (subscriber, #23239)In reply to: Secure key handling using the TPM by jejb
Parent article: Secure key handling using the TPM
Password protection makes some sense here, but it ends up depending somewhat on your threat model. If you're using argon2id as the key derivation function (as is supported in recent versions of cryptsetup) then brute-forcing the disk passphrase isn't realistically possible in any case - it'd be cheaper to decap the TPM and read stuff out of it than it would be to throw enough compute at the brute-force job, so using the TPM is then arguably weaker than not doing so. The only real benefit you're getting is that stealing the drive on its own gets you nothing. Using policy-bound keys at least gives you the advantage of being able to boot an encrypted FS without requiring user interaction, at the cost of needing some reasonable way to handle recovery.