Go to file
2024-05-04 01:27:52 +02:00
.gitattributes Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
harden_tpm2-abrmd.service.patch Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
README.SUSE Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
tpm2-abrmd-3.0.0.tar.gz Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
tpm2-abrmd-3.0.0.tar.gz.asc Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
tpm2-abrmd.keyring Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
tpm2.0-abrmd.changes Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
tpm2.0-abrmd.rpmlintrc Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00
tpm2.0-abrmd.spec Sync from SUSE:SLFO:Main tpm2.0-abrmd revision 613f1638190d809896a915be6acbcd2a 2024-05-04 01:27:52 +02:00

The tpm2-abrmd by upstream default allows every local users in the system to
access the TPM chip and modify its settings (bsc#1197532). Upstream suggests
to use the TPM's internal security features (e.g. password protection) to
prevent local users from manipulating the chip without authorization. Still
the default behaviour that every user in the system can access TPM features
without any authentication could come as a surprise to end users and system
integrators alike.

For this reason on SUSE only members of the 'tss' group are allowed to access
the tpm2-abrmd D-Bus interface, thereby mirroring the access permissions of
the /dev/tpm0 and /dev/tpmrm0 character devices.