For example, at least old YubiKeys did not cryptographically wrap the PGP private keys with the user PIN, which is insane. Under some threat models, that makes them less secure than an STM32. And in fact they did have a bug where they weren't checking PINs at all.
-
-
(I don't know if newer YubiKeys do this, because they're a black box. This is part of the problem.)
1 reply 0 retweets 3 likes -
Replying to @marcan42 @pavolrusnak
Wrapping keys with a low entropy secret as a PIN does not bring much security. If you can get the wrapped key, it's game over! TBH, I don't know well Yubikey products. But maybe they go through 3rd party audit and cert...
1 reply 0 retweets 1 like -
Replying to @P3b7_ @pavolrusnak
"PIN" in PGP-card terminology means passphrase. It's not just 4 digits, it's up to 127 ASCII characters. It absolutely is not "low entropy" and beyond a certain length would certainly be uncrackable if implemented properly.
2 replies 0 retweets 3 likes -
FWIW, our keys do go through 3rd party audits for security (code, side channel) as well as for certification (FIPS).
1 reply 0 retweets 2 likes -
And I am not sure how effective wrapping really is. The secure element has very low compute performance as it needs to operate with just NFC power. Today brute force attacks run on huge farms of cheap AWS spot instances and even long PINs/Passwords offer little protection.
1 reply 1 retweet 2 likes -
I'm sorry, you work for Yubico and you can't calculate entropy? "Even long PINs offer little protection" is BS. Past a certain point, even with minimal or no key stretching, you are not brute forcing things. Ever.
1 reply 0 retweets 10 likes -
Of course, a completely random 256 bit entropy pass phrase you are fine. Most users though will pick much less. The real problem is that brute force attacks have gotten very cheap.
1 reply 0 retweets 2 likes -
Quick napkin math: A GPU can do ~2^32 hashes/s or ~2^44 hashes/h. A spot g3s.xlarge on AWS goes for 40 cents/h. Let's assume I have a $400k budget (if I steal a key and compromise the secure element, I probably have that). This means I can factor 2^64 bits of entropy.
1 reply 0 retweets 2 likes -
Which is 9 characters of random ASCII. A lot of people use way more than that. Certainly people who care enough to be worried about attackers owning SEs.
2 replies 0 retweets 13 likes
Either way, the point here is, why *wouldn't* you wrap the private key material, even without stretching? Defense in depth. It would've stopped that dumb bug you guys had where PINs were not checked properly. No PIN, no secrets.
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.