mirror of
https://github.com/tailscale/tailscale.git
synced 2025-12-01 23:42:12 +01:00
feature/tpm: disable dictionary attack protection on sealing key (#17952)
DA protection is not super helpful because we don't set an authorization password on the key. But if authorization fails for other reasons (like TPM being reset), we will eventually cause DA lockout with tailscaled trying to load the key. DA lockout then leads to (1) issues for other processes using the TPM and (2) the underlying authorization error being masked in logs. Updates #17654 Signed-off-by: Andrew Lytvynov <awly@tailscale.com>
This commit is contained in:
parent
f1cddc6ecf
commit
26f9b50247
@ -59,10 +59,12 @@ func newAttestationKey() (ak *attestationKey, retErr error) {
|
||||
SensitiveDataOrigin: true,
|
||||
UserWithAuth: true,
|
||||
AdminWithPolicy: true,
|
||||
NoDA: true,
|
||||
FixedTPM: true,
|
||||
FixedParent: true,
|
||||
SignEncrypt: true,
|
||||
// We don't set an authorization policy on this key, so
|
||||
// DA isn't helpful.
|
||||
NoDA: true,
|
||||
FixedTPM: true,
|
||||
FixedParent: true,
|
||||
SignEncrypt: true,
|
||||
},
|
||||
Parameters: tpm2.NewTPMUPublicParms(
|
||||
tpm2.TPMAlgECC,
|
||||
|
||||
@ -414,6 +414,9 @@ func tpmSeal(logf logger.Logf, data []byte) (*tpmSealedData, error) {
|
||||
FixedTPM: true,
|
||||
FixedParent: true,
|
||||
UserWithAuth: true,
|
||||
// We don't set an authorization policy on this key, so DA
|
||||
// isn't helpful.
|
||||
NoDA: true,
|
||||
},
|
||||
}),
|
||||
}
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user