TPM – How the integrity of the system configuration is guaranteed if the PCR hash is overwritten on each "Measurement"?

In the TPM architecture, we know that after a "Measurement" procedure is performed, it is followed by a "PCR Extend" procedure, in which the resulting system configuration metrics data (20 bytes) are appended to the val… Continue reading TPM – How the integrity of the system configuration is guaranteed if the PCR hash is overwritten on each "Measurement"?

Posted in TPM

How did ntpd got pacthed to prevent NTP time synchronization attacks?

I recently tested the NTP Time Synchronization Attack as desribed and demonstrated by Jose Selvi in 2015.
Basically, the attack was mostly used to send the victim’s clock in the future, so the already cached HTTP Strict Transport Security … Continue reading How did ntpd got pacthed to prevent NTP time synchronization attacks?