I built a PC from scratch a while ago, and after learning the recommended requirements for UEFI Secure Boot and Microsoft's Bitlocker, I installed an Infineon TPM in my motherboard. My understanding is that a TPM is supposed to be a software-independent source of trust which securely stores encryption keys (and possibly certificates?). I have a basic understanding of the "public key authentication idea" and I'm not looking for an explanation of the cryptography at work here, but I am wondering what is being referred to when the UEFI system asks me to "initialize factory default keys"? I did this, and doing so seems to have satisfied the Secure Boot requirements, but:
- Are these factory default keys something created by the TPM manufacturer?
- Shouldn't I generate my own keys? 2b. If I initialize Bitlocker using these factory default keys, does that mean I'm using Infineon (TPM manufacturer) private keys?
- In my research for this question I have found several guides to Secure Boot/TPMs for various Linux distributions, but the only guide I could find for Windows was this, which A) appears to be intended for OEM PC manufacturers, and B) is more of a conceptual guide than an explanation of how to properly set up a TPM for Secure Boot and Bitlocker encryption.
Edit:
Motherboard: MSI Z390-A PRO
The TPM & motherboard support the TPM2.0 specs
Output of tpmtool getdeviceinformation command:
-TPM Present: True
-TPM Version: 2.0
-TPM Manufacturer ID: IFX
-TPM Manufacturer Full Name: Infineon
-TPM Manufacturer Version: 5.63.3353.0
-PPI Version: 1.3
-Is Initialized: True
-Ready For Storage: True
-Ready For Attestation: True
-Is Capable For Attestation: True
-Clear Needed To Recover: False
-Clear Possible: True
-TPM Has Vulnerable Firmware: False
-PCR7 Binding State: 0
-Maintenance Task Complete: True
-TPM Spec Version: 1.16
-TPM Errata Date: Wednesday, September 21, 2016
-PC Client Version: 1.00
-Is Locked Out: False
tpmtool getdeviceinfomation? – fpmurphy Nov 26 '20 at 18:30