Subversion Repositories configs

Rev

Details | Last modification | View Log | RSS feed

Rev Author Line No. Line
192 - 1
 
2
#
3
# This is the configuration file for the trousers tcsd. (The Trusted Computing
4
# Software Stack Core Services Daemon).
5
#
6
# Defaults are listed below, commented out
7
#
8
# Send questions to: trousers-users@lists.sourceforge.net
9
#
10
 
11
# Option: port
12
# Values: 1 - 65535
13
# Description: The port that the tcsd will listen on.
14
#
15
# port = 30003
16
#
17
 
18
# Option: num_threads
19
# Values: 1 - 65535
20
# Description: The number of threads that the tcsd will spawn internally.
21
#
22
# num_threads = 10
23
#
24
 
25
# Option: system_ps_file
26
# Values: Any absolute directory path
27
# Description: Path where the tcsd creates its persistent storage file.
28
#
29
# system_ps_file = /var/lib/tpm/system.data
30
#
31
 
32
# Option: firmware_log_file
33
# Values: Any absolute directory path
34
# Description: Path to the file containing the current firmware PCR event
35
#  log data. The interface to this log is usually provided by the TPM
36
#  device driver.
37
#
38
# firmware_log_file = /sys/kernel/security/tpm0/binary_bios_measurements
39
#
40
 
41
# Option: kernel_log_file
42
# Values: Any absolute directory path
43
# Description: Path to the file containing the current kernel PCR event
44
#  log data. By default, this data will be parsed in the format provided
45
#  by the Integrity Measurement Architecture LSM. See
46
#  http://sf.net/projects/linux-ima for more info on getting IMA.
47
#
48
#
49
# kernel_log_file = /sys/kernel/security/ima/binary_runtime_measurements
50
#
51
 
52
# Option: firmware_pcrs
53
# Values: PCR indices, separated by commas (no whitespace)
54
# Description: A list of PCR indices that are manipulated only by the system
55
#  firmware and therefore are not extended or logged by the TCSD.
56
#
57
# firmware_pcrs =
58
#
59
 
60
# Option: kernel_pcrs
61
# Values: PCR indices, separated by commas (no whitespace)
62
# Description: A list of PCR indices that are manipulated only by the kernel
63
#  and therefore are not extended or logged by the TCSD.
64
#
65
# kernel_pcrs =
66
#
67
 
68
# Option: platform_cred
69
# Values: Any absolute directory path (example: /path/to/platform.cert)
70
# Description: Path to the file containing your TPM's platform credential.
71
#  The platform credential may have been provided to you by your TPM
72
#  manufacturer. If so, set platform_cred to the path to the file on disk.
73
#  Whenever a new TPM identity is created, the credential will be used. See
74
#  Tspi_TPM_CollateIdentityRequest(3) for more information.
75
#
76
# platform_cred =
77
#
78
 
79
# Option: conformance_cred
80
# Values: Any absolute directory path (example: /path/to/conformance.cert)
81
# Description: Path to the file containing your TPM's conformance credential.
82
#  The conformance credential may have been provided to you by your TPM
83
#  manufacturer. If so, set conformance_cred to the path to the file on disk.
84
#  Whenever a new TPM identity is created, the credential will be used. See
85
#  Tspi_TPM_CollateIdentityRequest(3) for more information.
86
#
87
# conformance_cred =
88
#
89
 
90
# Option: endorsement_cred
91
# Values: Any absolute directory path (example: /path/to/endorsement.cert)
92
# Description: Path to the file containing your TPM's endorsement credential.
93
#  The endorsement credential may have been provided to you by your TPM
94
#  manufacturer. If so, set endorsement_cred to the path to the file on disk.
95
#  Whenever a new TPM identity is created, the credential will be used. See
96
#  Tspi_TPM_CollateIdentityRequest(3) for more information.
97
#
98
# endorsement_cred =
99
#
100
 
101
# Option: remote_ops
102
# Values: TCS operation names, separated by commas (no whitespace)
103
# Description: A list of TCS commands which will be allowed to be executed
104
#  on this machine's TCSD by TSP's on non-local hosts (over the internet).
105
#  By default, access to all operations is denied.
106
#
107
# possible values:  seal - encrypt data bound to PCR values
108
#		    unseal - decrypt data bound to PCR values
109
#		    registerkey - store keys in system persistent storage [Disk write access!]
110
#		    unregisterkey - remove keys from system persistent storage [Disk write access!]
111
#		    loadkey - load a key into the TPM
112
#		    createkey - create a key using the TPM
113
#		    sign - encrypt data using a private key
114
#		    random - generate random numbers
115
#		    getcapability - query the TCS/TPM for its capabilities
116
#		    unbind - decrypt data
117
#		    quote - request a signed blob containing all PCR values
118
#		    readpubek - access the TPM's Public EndorsementKey
119
#		    getregisteredkeybypublicinfo - Search system persistent storage for a public key
120
#		    getpubkey - Retrieve a loaded key's public data from inside the TPM
121
#		    selftest - execute selftest and test results ordinals
122
#
123
# remote_ops =
124
#
125
 
126
# Option: enforce_exclusive_transport
127
# Values: 0 or 1
128
# Description: When an application opens a transport session with the TPM, one
129
#  of the options available is an "exclusive" session, meaning that the TPM
130
#  will not execute any commands other than those coming through the transport
131
#  session for the lifetime of the session. The TCSD can choose to enforce this
132
#  option or not. By default, exclusive sessions are not enforced, since this
133
#  could allow for a denial of service to the TPM.
134
#
135
#  enforce_exclusive_transport = 0
136
#
137
 
138
# Option: host_platform_class
139
# Values: One of the TCG platform class specifications
140
#	PC_11 - PC Client System, version 1.1
141
#	PC_12 - PC Client System, version 1.2
142
#	PDA_12 - PDA System, version 1.2
143
#	SERVER_12 - Server System, version 1.2
144
#	MOBILE_12 - Mobile Phone System, version 1.2
145
#
146
# Description: This option determines the host platform (host the TCS system
147
# is running on) class, among those specified by the Trusted Computing group
148
# on https://www.trustedcomputinggroup.org/specs/. This class will be reported
149
# by the TCS daemon when an application queries it using the
150
# TSS_TCSCAP_PROP_HOST_PLATFORM sub-capability. The default is PC_12.
151
#
152
# host_platform_class = PC_12
153
#
154
 
155
# Option: all_platform_classes
156
# Values: TCG Platform class names, separated by commas (no whitespaces)
157
#	PC_11 - PC Client System, version 1.1
158
#	PC_12 - PC Client System, version 1.2
159
#	PDA_12 - PDA System, version 1.2
160
#	SERVER_12 - Server System, version 1.2
161
#	MOBILE_12 - Mobile Phone System, version 1.2
162
#
163
# Description: This option determines all the platform classes supported by the
164
# TCS daemon. This list must not include the value set as "host_platform_class"
165
# specified above. Since by default TrouSerS supports all TPM 1.2 functionality,
166
# the default is all 1.2 and 1.1 platform classes.
167
#
168
# all_platform_classes = PC_11,PDA_12,SERVER_12,MOBILE_12
169
#
170
 
171
#
172
# Option: disable_ipv4
173
# Values: 0 or 1
174
# Description: This options determines if the TCSD will bind itself to the
175
# machine's local IPv4 addresses in order to receive requisitions through
176
# its TCP port. Value of 1 disables IPv4 support, so clients cannot reach
177
# TCSD using that protocol.
178
#
179
#  disable_ipv4 = 0
180
#
181
 
182
#
183
# Option: disable_ipv6
184
# Values: 0 or 1
185
# Description: This options determines if the TCSD will bind itself to the
186
# machine's local IPv6 addresses in order to receive requisitions through
187
# its TCP port. Value of 1 disables IPv6 support, so clients cannot reach
188
# TCSD using that protocol.
189
#
190
#  disable_ipv6 = 0
191
#