-
Notifications
You must be signed in to change notification settings - Fork 71
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
failed to validate the PCClient event log in VMware #223
Comments
This is not unexpected. See #141 for another example. Basically, this error means the event log located at Feel free to dump that here and I can take a look, or you can also examine the event log yourself by running |
okay, no worries! I can check it. One question though, how risky is it to run this types of routines agains the real TPM? I don't need to do more than a credential activation to verify that the AK comes from a real TPM as shown on the readme of go attestation, and after that do boot measurements. I think it's risk free right? Because I tried this same program on ubuntu 22.04 and it didn't work also. It might be VMware the one causing issues. |
I think the only mutating command you're running above is in creating the AttestationKey: Everything else reads from the TPM or the firmware event log and does not modify the TPM. |
I've created the following script for testing proposes and I'm running it on a VMware VM with a virtualized TPM with RHEL8 as the OS. I got the following error when running
server.VerifyAttestation
:failed to validate the PCClient event log:
failed to replay event log: event log failed to verify: the following registers failed to replay: [0]
Is this expected to happen? I'm thinking about testing this on my real machine with the actual TPM but I afraid to break something.
The code is pretty much the same as the verify_test.go one but using VMwares virtualized TPM.
`package main
import (
"crypto"
"fmt"
)
func main() {
}`
The text was updated successfully, but these errors were encountered: