• BaalInvokerA
    link
    fedilink
    arrow-up
    27
    ·
    10 months ago

    This shit again… I moved to LTS kernel exactly because of this bug and now it reached LTS kernel as well…

  • argv_minus_one@beehaw.org
    link
    fedilink
    arrow-up
    11
    arrow-down
    2
    ·
    edit-2
    10 months ago

    Good. TPM firmware is a high-value attack surface that, if penetrated, gives the attacker complete and irreversible control over the entire machine. It’s also proprietary code and only receives security updates for a small fraction of its service life, so it’s most likely riddled with vulnerabilities. It should be disabled, as much as possible, if you at all value the security of your system.

  • jungleben@infosec.pub
    link
    fedilink
    arrow-up
    5
    ·
    10 months ago

    I’ve had fTPM issues with the bios because I changed CPUs and lost key attestation. Maybe it’s my fault, but the reset process isn’t documented anywhere clearly and it’s not worth digging up my old CPU to reset the Mobo.

    • exi@feddit.de
      link
      fedilink
      arrow-up
      5
      arrow-down
      1
      ·
      10 months ago

      You can’t trust any full disk encryption without it because only a TPM can verify that your bootloader and initrd are not compromised.

    • planish@sh.itjust.works
      link
      fedilink
      arrow-up
      1
      ·
      10 months ago

      It sound like what’s broken is the TPM. So if it is shut off it would be both broken and off, and you might not care about the broken.