Ubuntu* OS version 20.04 or 22.04 / RHEL* OS version 8.4 or 8.6 / Debian 11.4
on x86 was used as a development and execution OS. Follow these steps to compile and execute FIDO Device Onboard (FDO).
The FDO Client SDK execution depends on OpenSSL* toolkit 1.1.1s version. Users must install or upgrade the toolkit before compilation if the toolkit is not available by default in the environment.
- For Ubuntu* OS version 20.04 or 22.04 / Debian 11.4:
sudo apt-get install build-essential python-setuptools clang-format dos2unix ruby build-essential \
libglib2.0-dev libpcap-dev autoconf libtool libproxy-dev doxygen cmake mercurial
- For RHEL* OS version 8.4 or 8.6:
sudo subscription-manager repos --enable codeready-builder-for-rhel-8-x86_64-rpms
sudo yum -y install https://dl.fedoraproject.org/pub/epel/epel-release-latest-8.noarch.rpm
sudo yum -y install gcc gcc-c++ python3-setuptools git-clang-format dos2unix ruby gcc gcc-c++ make perl glibc-static \
glib2-devel libpcap-devel autoconf libtool libproxy-devel mozjs52-devel doxygen cmake make mercurial perl
OpenSSL* toolkit version 1.1.1s. Curl version 7.86
-
If libssl-dev, curl and libcurl are installed, uninstall it:
sudo apt-get remove --auto-remove libssl-dev sudo apt-get remove --auto-remove libssl-dev:i386 sudo apt remove curl libcurl4-openssl-dev
In case of RHEL OS, use below commands to uninstall:
sudo yum remove libcurl-devel openssl-devel
-
Pull the tarball:
wget https://www.openssl.org/source/openssl-1.1.1s.tar.gz
-
Unpack the tarball with:
tar -zxf openssl-1.1.1s.tar.gz && cd openssl-1.1.1s
-
Issue the command:
./config
-
Issue the command:
make
-
Check for possible errors:
make test
-
Backup the current OpenSSL* binary:
sudo mv /usr/bin/openssl ~/tmp
-
Issue the command:
sudo make install
-
Create a symbolic link from the newly installed binary to the default location:
sudo ln -s /usr/local/bin/openssl /usr/bin/openssl
-
Run the command to update symlinks and rebuild the library cache:
sudo ldconfig
-
Assuming no errors in executing steps 4 through 10, you should have successfully installed the new version of the OpenSSL* toolkit. Issue the following command from the terminal:
openssl version
Your output should be as follows:
OpenSSL* 1.1.1s 1 Nov 2022
After installing openssl, proceed with the installation of curl.
-
Pull the tarball:
wget https://github.com/curl/curl/releases/download/curl-7_86_0/curl-7.86.0.tar.gz
-
Unpack the tarball with:
tar -zxf curl-7.86.0.tar.gz && cd curl-7.86.0
-
Issue the command to configure the curl with openssl:
./configure --with-openssl --enable-versioned-symbols
-
Issue the command to build curl:
make -j$(nproc)
-
Command to install curl:
sudo make install
-
Assuming no errors in executing steps 1 through 5, you should have successfully installed curl configured with openssl Issue the following command from the terminal:
curl --version
Your output should point to the openssl version which you installed.
curl 7.86.0 (x86_64-pc-linux-gnu) libcurl/7.86.0 OpenSSL/1.1.1s zlib/1.2.11
Note 1: If above command is not successful, then link the path where curl is installed to the system path
sudo ln -s /usr/local/bin/curl /usr/bin/curl
Note 2: If you are using no_proxy environment variable to exclude proxying for any FDO server IP addresses, it may not work with curl 7.86. Workaround for this is to ensure the no_proxy IP is specified in CIDR notation (https://datatracker.ietf.org/doc/html/rfc1519)
Single IP address example: no_proxy="10.60.132.45/32" Two IP addresses example: no_proxy="10.60.132.45/32,10.60.132.46/32" Range of IP addresses example: no_proxy="10.60.0.0/16"
Note 3: On RHEL, Curl could also be installed using yum package manager as shown below:
sudo yum -y install libcurl-devel
TPM* enabled FDO Client SDK uses TPM-TSS 3.0.3, TPM2-ABRMD 2.4.0, and TPM2-TOOLS 5.0 libraries for key and cryptography related operations. The TPM-TSS library is required for compiling the code while all 3 libraries are required for running the code. Create an empty directory, download and execute FDO TPM* TPM-Library-Installation-Script which can be used for both installation and uninstallation of TPM* libraries. Alternatively, perform steps listed in section 2.1 to setup TPM* library without using the TPM* TPM-Library-Installation-Script.
To compile and execute TPM* enabled FDO Client SDK use one of the appropriate commands:
Script usage command
- On Ubuntu OS version 20.04 or 22.04 / Debian 11.4:
sudo ./install_tpm_libs.sh -h
-
TPM-TSS library setup to enable TPM* enabled FDO Client SDK code compilation
- Command to install tpm-tss library
sudo ./install_tpm_libs.sh -t
- Command to uninstall tpm-tss library
sudo ./install_tpm_libs.sh -d
-
TPM* setup to enable TPM* enabled FDO Client SDK code compilation and execution
- Command to install TPM* libraries
sudo ./install_tpm_libs.sh -i
- Command to uninstall TPM* libraries
sudo ./install_tpm_libs.sh -u
-
On RHEL* OS version 8.4 or 8.6:
NOTE: Use TPM-Library-Installation-Script-RHEL for RHEL 8.4 or 8.6.
sudo ./install_tpm_libs_rhel.sh -h
-
TPM-TSS library setup to enable TPM* enabled FDO Client SDK code compilation
- Command to install tpm-tss library
sudo ./install_tpm_libs_rhel.sh -t
- Command to uninstall tpm-tss library
sudo ./install_tpm_libs_rhel.sh -d
-
TPM* setup to enable TPM* enabled FDO Client SDK code compilation and execution
- Command to install TPM* libraries
sudo ./install_tpm_libs_rhel.sh -i
- Command to uninstall TPM* libraries
sudo ./install_tpm_libs_rhel.sh -u
Following steps should be performed if FDO TPM* TPM-Library-Installation-Script script is not used to setup FDO TPM* libraries. Install only tpm2-tss library to enable TPM* enabled FDO Client SDK code compilation. To enable compilation and execution of TPM* enabled FDO Client SDK code, install all libraries namely: tpm2-tss, tpm2-abrmd, tpm2-tools, and tpm2-tss-engine.
-
tpm2-tss-3.0.3
This is the main library that creates commands per Trusted Computing Group (TCG) specification to use the TPM*. It uses release version 3.0.3 of the library.
-
Source Code
The library can be downloaded from tpm2-tss-3.0.3-download
-
Build and Installation Process
The build and installation process can be found at tpm2-tss-3.0.3-install
-
-
tpm2-abrmd-2.4.0
This is an optional but recommended library (daemon) to use TPM* in the device. This daemon will act as a resource manager for the TPM*, for all I/O calls that happen with the device. It uses release version 2.4.0 of the library.
-
Source Code
The library can be downloaded from tpm2-abrmd-2.4.0-download
Alternatively, the in-kernel RM /dev/tpmrm0 can be used. Please see section on Compiling FDO.
-
Build and Installation Process
The build and installation process found at tpm2-abrmd-2.4.0-install
-
-
tpm2-tools-5.0
This library provides the necessary tools to interact and perform operations using the TPM*, to the users. It uses release version 5.0 of the library.
-
Source Code
The library can be downloaded from tpm2-tools-5.0-download
-
Build and Installation Process
The build and installation process can be found at tpm2-tools-5.0-install
-
-
tpm2-tss-engine-1.1.0
This library provides the OpenSSL* engine, which performs the OpenSSL* cryptography operation using the keys inside the TPM*. It uses release version 1.1.0 of the library.
-
Source Code
The library can be downloaded from tpm2-tss-engine-download
-
Build and Installation Process
The build and installation process can be found at tpm2-tss-engine-install
-
FDO Client SDK uses safestringlib for string and memory operations to prevent serious security vulnerabilities (For example, buffer overflows). Download safestringlib from intel-safestringlib and follow these instructions to build: From the root of the safestringlib, do the following:
mkdir obj
make
After this step, libsafestring.a
library will be created.
FDO Client SDK uses TinyCBOR library for Concise Binary Object Representation (CBOR) encoding and decoding. Download TinyCBOR from TinyCBOR, checkout to the tag v0.5.3
and follow these instructions to build:
From the root of the TinyCBOR (named tinycbor
), do the following:
make
Add these environment variables to ~/.bashrc or similar (replace with actual paths). Provide safestringlib and tinycbor path:
export SAFESTRING_ROOT=path/to/safestringlib
export TINYCBOR_ROOT=path/to/tinycbor
The FDO Client SDK build system is based on GNU make. It assumes that all the requirements are set up according to FDO Compilation Setup . The application is built using the make [options]
in the root of the repository for all supported platforms. The debug and release build modes are supported in building the FDO Client SDK.
Refer the TPM* Library Setup steps given in section 2 to compile TPM* enabled FDO Client SDK.
For an advanced build configuration, refer to Advanced Build Configuration .
Example command to build TPM* enabled FDO Client SDK with the Resource Manager as TPM2-ABRMD (tabrmd)
make pristine
cmake -DDA=tpm20_ecdsa256 .
make -j$(nproc)
To use the in-kernel Resource Manager '/dev/tpmrm0', use the following command
make pristine
cmake -DDA=tpm20_ecdsa256 -DTPM2_TCTI_TYPE=tpmrm0 .
make -j$(nproc)
Several other options to choose when building the device are, but not limited to, the following: device-attestation (DA) methods, Advanced Encryption Standard (AES) encryption modes (AES_MODE), and underlying cryptography library to use (TLS). Refer to the section FDO Build configurations
NOTE: Currently, only Elliptic-Curve (EC) cryptography keys based on
NIST P-256
orsecp256r1
are supported for TPM* enabled FDO Client SDK due to limitations on testing with the available hardware that does not support keys based onNIST P-384
. Consequently, this configuration only supports usage of 128-bit key for AES operations (GCM/CCM) and generates 256-bit HMAC.
The TPM* enabled FDO Client SDK Linux device is compatible with FDO PRI components - Manufacturer, Reseller, Rendezvous, and Owner.
To test the FDO Client SDK Linux device, setup the FDO PRI Manufacturer, FDO PRI Rendezvous and FDO PRI Owner.
Refer the TPM* Library Setup steps given in section 2 to compile and execute TPM* enabled FDO Client SDK.
After a successful compilation, the FDO Client SDK Linux device executable can be found at <path-to-client-sdk-fidoiot>/build/linux-client
.
-
Before executing
linux-client
, prepare for Device Initialization (DI) by starting the FDO PRI Manufacturer. Refer to Device Initialization Setup . Then, execute the TPM* make ready script. Refer to TPM Make Ready. Alternatively, perform the steps listed in section 7.1 to initialise the device without using TPM Make Ready script.Script execution command:
./tpm_make_ready_ecdsa.sh -p <FDO Client SDK data folder location>
-
Once the TPM* make ready script is executed successfully, the device is now initialized with the credentials and is ready for ownership transfer. To run the device against the FDO PRI Manufacturer for the DI protocol, do the following:
./build/linux-client
-
To enable the device for Transfer Ownership protocol (TO1 and TO2), configure the FDO PRI Rendezvous and Owner. Refer to Ownership Transfer Setup . After these are set up, execute
linux-client
again../build/linux-client
NOTE: If the
linux-client
was built with flag TPM2_TCTI_TYPE=tpmrm0, running the it along with tpm_make_ready_ecdsa.sh, may require elevated privileges. Please use 'sudo' to execute.
-
Persistent Storage Index in TPM*
Find a persistent storage index that is unused in the TPM* and note it down. It usually starts from 0x81000000. To see the indexes that are already being used, use the following command. FDO uses the 0x81000001 index for the following command examples.
tpm2_getcap handles-persistent
-
Primary Key Generation from Endorsement Hierarchy
tpm2_createprimary -C e -g sha256 -G ecc256:aes128cfb -c data/tpm_primary_key.ctx -V
-
Load the Primary Key into TPM* Persistent Memory
tpm2_evictcontrol -C o 0x81000001 -c data/tpm_primary_key.ctx -V
-
Device ECDSA Key-Pair Generation
tpm2tss-genkey -a ecdsa -c nist_p256 data/tpm_ecdsa_priv_pub_blob.key -v -P 0x81000001
-
Generate Device MString
export OPENSSL_ENGINES=/usr/local/lib/engines-1.1/; openssl req -new -engine tpm2tss -keyform engine -out data/device_mstring -key data/tpm_ecdsa_priv_pub_blob.key -subj "/CN=www.fdoDevice1.intel.com" -verbose; truncate -s -1 data/device_mstring; echo -n "13" > /tmp/m_string.txt; truncate -s +1 /tmp/m_string.txt; echo -n "intel-1234" >> /tmp/m_string.txt; truncate -s +1 /tmp/m_string.txt; echo -n "model-123456" >> /tmp/m_string.txt; truncate -s +1 /tmp/m_string.txt; cat data/device_mstring >> /tmp/m_string.txt; base64 -w 0 /tmp/m_string.txt > data/device_mstring; rm -f /tmp/m_string.txt
-
TPM* Authorization Failure while Running tpm2-tools Command.
Clear TPM* from the BIOS. To run the TPM* enabled FDO Client SDK implementation, the TPM* on the device should not be owned. To reset the TPM*, go to your device BIOS and clear the TPM*. To find the location of the option in the BIOS of your device, refer to your device manual. -
Clear the Used Persistent Index in TPM*.
Use the tpm2_evictcontrol command to delete the content or clear TPM* from the BIOS. To run the TPM* based FDO implementation, the TPM* on the device should not be owned. To reset the TPM*, go to your device BIOS and clear the TPM*. To find the location of the option in the BIOS of your device, refer to your device manual.Assuming that the index is 0x81000001, run the following command to delete the keys.
tpm2_evictcontrol -C o -c 0x81000001 -V
-
OpenSSL* Toolkit Library Linking Related Error While Building FDO Client SDK.
There is a dependency on the OpenSSL* toolkit version 1.1.1s for building and running the FDO Client SDK. Check the version of the OpenSSL* toolkit installed in your machine with the commandopenssl version
If the OpenSSL* toolkit version in your machine is earlier than version 1.1.1s, follow the steps given in section 1 to update the OpenSSL* version to 1.1.1s.