1Trusted Execution Technology andTboot Implementation2008 Mobile PlatformsTable of Contents:Introduction .................................................................................................................................... 1System Requirements .................................................................................................................. 2BIOS TXT Settings ............................................................................................................................ 2Fedora Installation .......................................................................................................................... 2XEN 3.3.0 Installation ..................................................................................................................... 3TBOOT Installation .......................................................................................................................... 4TPM TOOLS 1.3.1 Installation .......................................................................................................... 5LCP: Define Platform Owner Policy ................................................................................................... 5Appendix A .................................................................................................................................... 7Appendix B ................................................................................................................................... 19For more information .................................................................................................................... 20IntroductionHP has implemented the Trusted eXecution Technology (TXT), part of Intel’s Safer Computing Initiative,on certain models of 2008 commercial notebooks. The purpose of this document is to provide a stepby step guideline to setup a TXT enabled environment.The document will cover the following areas:• BIOS settings related to TXT,• Intel’s Trusted Execution Technology,• Trusted Boot and• Launch Control PoliciesTrusted eXecution Technology (http://www.intel.com/technology/security/), a hardware-basedmechanism that helps to protect against software-based attacks and protects the confidentiality andintegrity of data stored or created on the client PC by means of measured launch and protectedexecution. In other words, TXT provides only the launch-time protection, i.e. ensure that the code weload, is really what we intended to load - secure and not compromised by any virus attacks.(http://download.intel.com/technology/security/downloads/315168.pdf).The technology mainly depends on set of hardware extensions to Intel processors and chipsets thatboost the platform with security capabilities. Trusted Platform Module is another important hardwarecomponent. The TPM module is used to store and compare hash values (of launched environment),which provides much greater security than storing them in software or on the hard disk