Bare metal trust using Intel TXT
Be able to assert that a host node has a trusted BIOS, OptionROM, and kernel/OS . Be able to detect changes in BIOS, attached PCIe devices, changes to their firmware, and/or kernel. Leverages Intel TXT to "measure" BIOS and OS software and save their hashes on the trusted-
Blueprint information
- Status:
- Started
- Approver:
- None
- Priority:
- Medium
- Drafter:
- Malini Bhandaru
- Direction:
- Approved
- Assignee:
- Tan Lin
- Definition:
- Approved
- Series goal:
- Accepted for mitaka
- Implementation:
- Needs Code Review
- Milestone target:
- None
- Started by
- Jim Rollenhagen
- Completed by
Related branches
Sprints
Whiteboard
Gerrit topic: https:/
Addressed by: https:/
Add a new boot section 'trusted_boot' for PXE
Addressed by: https:/
Support trusted boot with iPXE
Just the iPXE patch needs to land to complete this work. Leaving it open until that happens. I'd like to see that completed during Mitaka.
// jroll 2015-10-15
Hi Malini (or anyone planning to work on this), thanks for the proposal. We're moving from using blueprints to track features to RFE bugs. vdrok filed one for your change - https:/
//rloo 2015-12-15