Trusted Computing Group

From Wikipedia, the free encyclopedia
Trusted Computing Group
Type Consortium
Founded 2003[1]
Founder(s) AMD, Hewlett-Packard, IBM, Intel, Microsoft
Headquarters Ontario, Ottawa[2], Canada
Website trustedcomputinggroup.org

The Trusted Computing Group (TCG), successor to the Trusted Computing Platform Alliance (TCPA), is an initiative started by AMD, Cisco, Hewlett-Packard, IBM, Intel, Microsoft and Wave Systems Corp. to implement Trusted Computing. Many others followed.

Overview

TCG's original goal was the development of a Trusted Platform Module (TPM), a semiconductor intellectual property core or integrated circuit that conforms to the trusted platform module specification put forward by the Trusted Computing Group and is to be included with computers to enable trusted computing features. TCG-compliant functionality has since been integrated directly into certain mass-market chipsets.

TCG also recently released the first version of their Trusted Network Connect ("TNC") protocol specification, based on the principles of AAA, but adding the ability to authorize network clients on the basis of hardware configuration, BIOS, kernel version, and which updates that have been applied to the OS and anti-virus software, etc.[3]

In 2009, TCG released a set of specifications that describe the protocol to communicate with self encrypting disk drives. The TCG Storage Work Group (SWG) Storage Core Architecture Specification describes in detail how to implement and utilize trust and security services on storage devices. Security Subsystem Class (SSC) Specifications describe the requirements for specific classes of devices; specifically, the Enterprise SSC defines minimum requirements for Data Center and Server Class devices while the Opal SSC defines minimum requirements for client devices.

The vendor of a TPM-enabled system has complete control over what software does and does not run on the owner's system.[4] In some cases the vendor may choose to grant permission to the owner to configure hardware they have legally purchased. This does include the possibility that a system owner would choose to run a version of an operating system (OS) that refuses to load unsigned or unlicensed software, but those restrictions would have to be enforced by the operating system and not by the TCG technology. What a TPM does provide in this case is the capability for the OS to lock software to specific machine configurations, meaning that "hacked" versions of the OS designed to get around these restrictions would not work. There is legitimate concern that OS vendors could use these capabilities to restrict what software would load under their OS (hurting small software companies or open source/shareware/freeware providers, and causing vendor lock-in for some data formats), and Microsoft has already stated they will begin restricting what software they will allow to run on Windows, starting with Windows 8 on ARM.[5]

The TPM can be used in conjunction with the boot loader to ensure only vendor-approved operating systems are running. This could restrict alternative operating systems from running, including free or open source operating systems. For example, Microsoft is requiring x86/x64 machines which come with Windows 8 to have Secure Boot enabled by default, which has caused alternative OS vendors to make payments through Microsoft to ensure their OS will be able to be installed by the user;[6] additionally any ARM machine shipped with Windows 8 is banned from allowing another OS to be installed.[7]

At the same time, there are several projects which are experimenting with TPM support in free operating systems; examples of such projects include a TPM device driver for Linux,[8] an open source implementation of the TCG's Trusted Software Stack called TrouSerS[9] (also ported to Windows Vista and Windows 7 in 2010[10]), a Java interface to TPM capabilities called TPM/J,[11] and a TPM-supporting version of the Grub bootloader called TrustedGrub.[12] Watch a video to understand working of TCPA.

Related projects

The TPM 1.1 specification envisioned a standard PC platform equipped with a TPM chip. In this scenario, the TPM chip can serve as a hardware key storage. Additionally, it can keep track of so-called measurements of the platform (i.e. hashes of various software) and be able to produce signed statements about the running software chain. Particularly the latter mode of operation proved unfeasible in practice, since the amount of software that has to be measured and trusted is very large; it includes (in addition to the system firmware) the operating system, drivers and application programs. Therefore, numerous other TPM-related projects are in progress, the purpose of which is to make it possible to launch and measure a trusted subenvironment from within an untrusted environment. The TPM specification 1.2 has been enhanced to accommodate this mode of operation. Additionally, hardware changes are required in the CPU and chipset (note that this should not be confused with the inclusion of TPM functionality into the chipset even though this is a possibility too). Intel's approach is called Trusted Execution Technology (TXT). Many of Intel's Core 2 Duo CPUs are advertised to support these extensions. However, chipset support is required for the extensions to be operational. Currently, Intel's chipset Q35 Express supports TXT. In addition to chipset support, the mainboard must also feature a TPM 1.2 chip. Intel currently advertises DQ35MP and DQ35JO as being compliant with the technology. The first application of the technology will be a set of manageability enhancements under the brand name vPro. AMD's platform is called Secure Execution Mode.[13]

In 2002-2003, Microsoft announced an initiative called Next-Generation Secure Computing Base (formerly Palladium). This was basically a vision of how a TPM 1.2 chip, CPU, chipset and software could provide an environment and a software ecosystem in which trusted applications (launched from within "regular" Windows) could be developed. Intel's TXT and AMD's SEM can be seen as realizations of the hardware side of the NGSCB vision. Owing to significant difficulties in creating a working implementation that third-party developers were interested in using and in unavailability of the enhancements to CPU and chipset, NGSCB was not included with Microsoft Windows Vista. Instead, Vista ships with a few technologies that can make use of a subset of the functions of the TPM chip (but not of Intel's TXT or AMD's SEM), such as BitLocker Drive Encryption, and a new version of the Microsoft Cryptography API.[14]

Criticism

The group has faced widescale opposition from the free software community on the grounds that the technology they are developing has a negative impact on the users' privacy and can create customer lock-in, especially if it is used to create DRM applications. It has received criticism from the GNU/Linux and FreeBSD communities, as well as the software development community in general. Significant backlash amongst the Trusted Computing Group was present during Richard Stallman's speech at the Hackers on Planet Earth conference in July 2006, in New York. Richard Stallman and the Free Software Foundation have also criticized the group publicly in other speeches. The criticism calls Trusted Computing "Treacherous Computing" instead and warns that vendors can lock out software that is not officially signed by specific vendors, rendering it unusable.[15]

Privacy concerns with the TCG revolve around the fact that each TPM has a unique keypair, called the "endorsement key", that identifies the platform. In initial versions of the TPM (version 1.1), the TCG addressed privacy concerns by suggesting the use of a "Privacy CA" that could certify pseudonymous machine credentials. By having separate credentials for interacting with different parties, actions could not be linked, and so some level of privacy is provided. However, this requires trust in the Privacy CA, who could still link pseudonyms to the common, identifying machine credential. Since this left unresolved privacy concerns, version 1.2 of the TPM specification introduced "Direct anonymous attestation": a protocol based on the idea of a zero-knowledge proof which allows a TPM user to receive a certification in such a way that the Privacy CA would not be able to link requests to a single user or platform, while still being able to identify rogue TPMs.

Privacy concerns for TPM were heightened when Christopher Tarnovsky presented methods to access and compromise the Infineon TPM non-volatile memory capacity which contains user data at Black Hat 2010.[16]

ISO standardization

Efforts to have the TCG specifications standardized by ISO was active for a first part in October 2007. Member states of the ISO/DIS JTC1 were expected to send their opinion to ISO by July 24, 2008. On May 18, 2009, TCG managed to achieve standardization for their TPM specifications:

  • ISO/IEC 11889-1:2009 Information technology—Trusted Platform Module—Part 1: Overview
  • ISO/IEC 11889-2:2009 Information technology—Trusted Platform Module—Part 2: Design principles
  • ISO/IEC 11889-3:2009 Information technology—Trusted Platform Module—Part 3: Structures
  • ISO/IEC 11889-4:2009 Information technology—Trusted Platform Module—Part 4: Commands

Members

As of June 2011,[17] about 110 enterprises are promoters of, contributors to, or adopters of TCG specifications.

Membership fees vary by level. Promoters pay annual membership fees of $55,000, contributors pay $16,500, and depending upon company size, adopters pay annual membership fees of either $1,000 or $8,250.[18]

Promoters

  1. AMD
  2. Cisco
  3. Fujitsu
  4. Hewlett-Packard
  5. IBM
  6. Infineon
  7. Intel Corporation
  8. Juniper Networks, Inc.
  9. Lenovo Holdings Limited
  10. Microsoft
  11. Wave Systems Corp

Contributors

  1. Absolute Software
  2. American Megatrends, Inc.
  3. AMOSSYS
  4. Atmel
  5. BAE Systems
  6. Bertin Technologies
  7. Broadcom Corporation
  8. Cypress Semiconductor
  9. Dell, Inc.
  10. Digital Management
  11. Enterasys Networks
  12. Ericsson Mobile Platforms AB
  13. Freescale Semiconductor
  14. Fritz Technologies
  15. Fujitsu Xerox
  16. Gemalto NV
  17. General Dynamics C4 Systems
  18. Hitachi, Ltd.
  19. Huawei Technologies Co., Ltd.
  20. Infoblox
  21. Insight
  22. InterDigital Communications, LLC
  23. LSI Corporation
  24. Lumeta
  25. Marvell Semiconductor, Inc.
  26. Micron Technology, Inc.
  27. NetApp
  28. Nokia
  29. Nuvoton technologies
  30. NVIDIA
  31. Oracle
  32. Panasonic Corporation
  33. Phoenix Technologies
  34. PMC-Sierra
  35. Qualcomm
  36. Renesas Electronics Corporation
  37. Ricoh Company LTD
  38. SafeNet
  39. Samsung Electronics
  40. SandForce
  41. SanDisk Corporation
  42. Seagate Technology
  43. Security Innovation, Inc.
  44. SMSC
  45. Sony Corporation
  46. Sophos
  47. STMicroelectronics
  48. Symantec
  49. Texas Instruments
  50. Thales Communications
  51. The Boeing Company
  52. Toshiba Corporation
  53. ULINK
  54. Western Digital
  55. WinMagic

Adopters

  1. Access Layers LTD
  2. Aruba Networks
  3. AUCONET GmbH
  4. Bit9, Inc.
  5. BlueCat Networks, Inc.
  6. BlueRISC, Inc.
  7. Bradford Networks
  8. Byres Security
  9. Certicom Corp.
  10. CoSoSys
  11. Credant Technologies
  12. Cryptomathic Ltd.
  13. CryptoMill Technologies LTD
  14. DECOIT GmbH
  15. F5 Networks
  16. ForeScout Technologies
  17. Giesecke & Devrient
  18. GlobalSign nv-sa
  19. Great Bay Software, Inc
  20. Hagiwara Sys-Com Co., Ltd.
  21. Harris Corporation
  22. High Density Devices AS
  23. Hirsch Electronics
  24. Imation
  25. Insightix, Ltd.
  26. Insyde Software Corp.
  27. mikado soft GmbH
  28. NCP engineering GmbH
  29. nSolutions, Inc.
  30. NXP Semiconductors
  31. Penza Research Electrotechnical Institute (FGUP "PNIEI")
  32. Phison Electronics Corporation
  33. Q1 Labs
  34. Sirrix AG Security Technologies
  35. Softex, Inc.
  36. STEC, Inc.
  37. StillSecure
  38. Sypris Electronics
  39. Triumfant Inc.
  40. Tuscany Networks Ltd
  41. Valicore Technologies, Inc.
  42. ViaSat, Inc.

See also

References

External links

This article is issued from Wikipedia. The text is available under the Creative Commons Attribution/Share Alike; additional terms may apply for the media files.