Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow using a TPM module as a key source #2

Open
tjohns opened this issue Jan 9, 2016 · 2 comments
Open

Allow using a TPM module as a key source #2

tjohns opened this issue Jan 9, 2016 · 2 comments

Comments

@tjohns
Copy link

tjohns commented Jan 9, 2016

Looking at the docs, it seems that the only secure option for storing the master key is Amazon's KMS. (The other options are all potentially vulnerable to key extraction by a rouge admin or hacker.)

It would be nice if support was added for using a key stored on a hardware TPM chip. This would provide similar functionality to KMS, and is available on almost any modern bare-metal server.

For an example of how to interact with a TPM: https://www.cylab.cmu.edu/tiw/slides/challener-TPM.pdf

@TomFrost
Copy link
Owner

Are you aware of any TPM bindings available for node? All I was able to find on short order is https://github.com/jplyle/node-tss, however after brief review it looks like this use case isn't directly supported by that library. C bindings to the TPM headers are beyond the scope of Cryptex, but I agree with the feature need and would love to support a module that provided a TPM API Cryptex could take advantage of.

@tjohns
Copy link
Author

tjohns commented Jan 17, 2016 via email

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants