summary refs log tree commit diff
path: root/lib/customisation.nix
diff options
context:
space:
mode:
authorMoritz Maxeiner <moritz@ucworks.org>2014-02-03 22:50:17 +0100
committerMoritz Maxeiner <moritz@ucworks.org>2014-02-03 22:50:17 +0100
commit8e74e1fdedbadd58e218d99f215ef91e6b84e3e7 (patch)
tree90191b32ca0f7e96549027a7a0f0af62535dda1b /lib/customisation.nix
parente96bc485dba4cbae35f0dc9215b07b96b5491329 (diff)
downloadnixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.tar
nixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.tar.gz
nixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.tar.bz2
nixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.tar.lz
nixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.tar.xz
nixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.tar.zst
nixlib-8e74e1fdedbadd58e218d99f215ef91e6b84e3e7.zip
Replace the current Yubikey PBA implementation with the previous one.
Rationale:
  * The main reason for choosing to implement the PBA in accordance
    with the Yubico documentation was to prevent a MITM-USB-attack
    successfully recovering the new LUKS key.
  * However, a MITM-USB-attacker can read user id and password when
    they were entered for PBA, which allows him to recover the new
    challenge after the PBA is complete, with which he can challenge
    the Yubikey, decrypt the new AES blob and recover the LUKS key.
  * Additionally, since the Yubikey shared secret is stored in the
    same AES blob, after such an attack not only is the LUKS device
    compromised, the Yubikey is as well, since the shared secret
    has also been recovered by the attacker.
  * Furthermore, with this method an attacker could also bruteforce
    the AES blob, if he has access to the unencrypted device, which
    would again compromise the Yubikey, should he be successful.
  * Finally, with this method, once the LUKS key has been recovered
    once, the encryption is permanently broken, while with the previous
    system, the LUKS key itself it changed at every successful boot,
    so recovering it once will not necessarily result in a permanent
    breakage and will also not compromise the Yubikey itself (since
    its secret is never stored anywhere but on the Yubikey itself).

Summary:
The current implementation opens up up vulnerability to brute-forcing
the AES blob, while retaining the current MITM-USB attack, additionally
making the consequences of this attack permanent and extending it to
the Yubikey itself.
Diffstat (limited to 'lib/customisation.nix')
0 files changed, 0 insertions, 0 deletions