has anyone implemented any sort of 'secure boot' using TPM 1.2 modules on the server boards using CentOS 6.x ? I'm not finding much concrete stuff on how to setup and manage a system like this, but I've been asked to research it for a security application internally at my job. our primary application for the TPM is for client authentication certificates in an SSL application (the machine with the TPM is an unmanned embedded client, that accesses webservices on a remote server which needs to authenticate this client). We've already done similar client authentication using USB Tokens, but would like to use TPM for this in the future. I think the client authentication part is pretty straight forward, using Trousers and so forth and PKCS#11 to access the keys. Once we get the client authentication side working, we'd like to also secure the OS itself to prevent tampering, presumably using trusted grub and such? is this typically used in conjunction with disk encryption such that the TPM module supplies the decryption keys? does linux have any concept of signed executables, kernel, and so forth? would replacing the RPM keys with keys signed by our own certificate authority such that the TPM would be involved in RPM authentication be practical? (yes, I know, this would mandate using a private yum repository, and building/signing all our own system components). I realize this will greatly complicate system management, security is always a tightrope act. -- john r pierce 37N 122W somewhere on the middle of the left coast