tpm Plugin
Purpose
The tpm
plugin for libtpmtss
allows to access persistent RSA and ECDSA
private keys bound to a TPM 2.0. Optionally, the
TPM 2.0 can be enabled as a true random number source.
Keys bound to a TPM 2.0 can only be used with IKEv2, because IKEv1’s legacy signature schemes are not supported. |
The plugin is disabled by default and can be enabled with the
./configure
option
--enable-tpm
Configuration
The tpm
plugin is configured using the following options in the
charon.plugins.tpm
section of strongswan.conf
:
Key | Default | Description |
---|---|---|
ek_handle |
Handle of the RSA or ECC Endorsement Key (EK) to be used to set up an
authenticated session with a TPM 2.0 (e.g. |
|
fips_186_4 |
|
Is the TPM 2.0 FIPS-186-4 compliant, which forces e.g. the use of the default salt length instead of maximum salt length with RSA-PSS padding |
tcti.name |
[→] |
Name of TPM 2.0 TCTI library. Valid values: |
tcti.opts |
[→] |
Options for the TPM 2.0 TCTI library. Defaults are |
use_rng |
|
Whether the TPM 2.0 should be used as RNG. For security reasons enable
only if an authenticated session can be set up (see |