Device Identity

PantherX Device Identity enables you to register you device with Central Management.

usage: .px-device-identity-real [-h] -o {INIT,SIGN,GET_JWK,GET_JWKS,GET_ACCESS_TOKEN} [-s {DEFAULT,TPM}] [-k {RSA:2048,RSA:3072,ECC:p256,ECC:p384,ECC:p521}] [-m MESSAGE] [-a ADDRESS] [-dn DOMAIN] [-t TITLE]
                                [-l LOCATION] [-r {PUBLIC,DESKTOP,SERVER,ADMIN_TERMINAL,REGISTRATION_TERMINAL,OTHER}] [-f {True,False}] [-d DEBUG]
.px-device-identity-real: error: the following arguments are required: -o/--operation


# su - root
guix package -i px-device-identity

Additionally, a service is available to allow non-root users to access signing capabilities:

# su - root
guix package -i px-device-identity-service


Unsupported device. The device is a TPM 1.2

If you use flag -s TPM a TPM 2 device is assumed to be available.

ERROR:sys:src/tss2-sys/api/Tss2_Sys_Execute.c:114:Tss2_Sys_ExecuteFinish() Unsupported device. The device is a TPM 1.2 
ERROR:esys:src/tss2-esys/api/Esys_GetCapability.c:307:Esys_GetCapability_Finish() Received a non-TPM Error 
ERROR:esys:src/tss2-esys/api/Esys_GetCapability.c:107:Esys_GetCapability() Esys Finish ErrorCode (0x00080001) 
Error: Generating key failed

You can check your current version like so:

$ dmesg | grep -i tpm

For TPM 1.2, it will looks something like this:

[    0.010985] ACPI: SSDT 0x00000000CCDD7000 0006B0 (v02 Intel_ TpmTable 00001000 INTL 20120711)
[    0.494929] tpm_tis 00:05: 1.2 TPM (device-id 0x0, rev-id 78)

For TPM 2.0 like this:

[    0.000000] efi: ACPI 2.0=0x6e5f4000 ACPI=0x6e5f4000 TPMFinalLog=0x6e65c000 SMBIOS=0x6eac7000 SMBIOS 3.0=0x6eac6000 ESRT=0x6baffd18 MEMATTR=0x69ccb018 
[    0.008965] ACPI: TPM2 0x000000006E63F498 000034 (v04 ALASKA A M I    00000001 AMI  00000000)
[    0.008992] ACPI: Reserving TPM2 table memory at [mem 0x6e63f498-0x6e63f4cb]

If your device reports a TPM 1.2, you should check if your device supports TPM 2.0. Sometimes it’s possible to enable this in BIOS.

If your device does not support TPM 2.0, you should register with flag -s DEFAULT which will store the keys in files rather than the much more secure TPM.

PantherX & (unofficial) GNU Guix Wiki.

Last update: 2021-10-12 20:09:22 +0000

Inspired by the excellent Arch Linux Wiki