(I don't know if newer YubiKeys do this, because they're a black box. This is part of the problem.)
-
-
Replying to @marcan42 @pavolrusnak
Wrapping keys with a low entropy secret as a PIN does not bring much security. If you can get the wrapped key, it's game over! TBH, I don't know well Yubikey products. But maybe they go through 3rd party audit and cert...
1 reply 0 retweets 1 like -
Replying to @P3b7_ @pavolrusnak
"PIN" in PGP-card terminology means passphrase. It's not just 4 digits, it's up to 127 ASCII characters. It absolutely is not "low entropy" and beyond a certain length would certainly be uncrackable if implemented properly.
2 replies 0 retweets 3 likes -
FWIW, our keys do go through 3rd party audits for security (code, side channel) as well as for certification (FIPS).
1 reply 0 retweets 2 likes -
And I am not sure how effective wrapping really is. The secure element has very low compute performance as it needs to operate with just NFC power. Today brute force attacks run on huge farms of cheap AWS spot instances and even long PINs/Passwords offer little protection.
1 reply 1 retweet 2 likes -
I'm sorry, you work for Yubico and you can't calculate entropy? "Even long PINs offer little protection" is BS. Past a certain point, even with minimal or no key stretching, you are not brute forcing things. Ever.
1 reply 0 retweets 10 likes -
Of course, a completely random 256 bit entropy pass phrase you are fine. Most users though will pick much less. The real problem is that brute force attacks have gotten very cheap.
1 reply 0 retweets 2 likes -
Quick napkin math: A GPU can do ~2^32 hashes/s or ~2^44 hashes/h. A spot g3s.xlarge on AWS goes for 40 cents/h. Let's assume I have a $400k budget (if I steal a key and compromise the secure element, I probably have that). This means I can factor 2^64 bits of entropy.
1 reply 0 retweets 2 likes -
Which is 9 characters of random ASCII. A lot of people use way more than that. Certainly people who care enough to be worried about attackers owning SEs.
2 replies 0 retweets 13 likes -
10 characters, but close enough. The average entropy of user passwords however is 40-50 bits depending on the study. So it's safe to say very few people pick 64 bit+. I can see how this is valuable for a few high-end users. For the average user, it wouldn't help much.
1 reply 0 retweets 1 like
Again, defense in depth. You can't guarantee I can't devise an attack on your SE chip for <$1k, or there could be a firmware issue. Having proper key wrapping would help keep the attack cost high in that scenario.
-
-
I do buy the defense in depth argument. For the average user it makes little difference but I can see how for some high-end users this feature would provide additional security. We'll add it to the engineering backlog.
0 replies 0 retweets 0 likesThanks. Twitter will use this to make your timeline better. UndoUndo
-
Loading seems to be taking a while.
Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.