iCloud 钥匙串的托管安全
Escrow Security for iCloud Keychain

原始链接: https://support.apple.com/guide/security/escrow-security-for-icloud-keychain-sec3e341e75d/web

## iCloud 钥匙串恢复:安全摘要 iCloud 钥匙串恢复是一个高度安全的过程,受到多层系统的保护。包含钥匙串加密密钥的托管记录由硬件安全模块 (HSM) 簇保护,每个模块都使用自己的密钥加密记录。 要恢复钥匙串,用户必须使用他们的 iCloud 凭据成功验证身份——密码、通过短信验证的注册电话号码以及 iCloud 安全码(使用 SRP 协议验证,Apple 无权查看该代码)。大多数 HSM 必须同意用户身份合法且未超过尝试次数限制。 该系统仅允许 10 次恢复尝试。尝试失败会锁定记录,需要 Apple 支持介入。10 次失败后,托管记录将被永久销毁,导致钥匙串数据丢失——这是为了防止暴力破解攻击。 至关重要的是,HSM 固件是不可变的;管理访问卡已被销毁,任何篡改尝试都会触发私钥自毁,并通知受影响的用户重新注册。这确保了对用户钥匙串数据的强大保护。

黑客新闻 新 | 过去 | 评论 | 提问 | 展示 | 招聘 | 提交 登录 iCloud 钥匙串的托管安全 (support.apple.com) 13 分,由 gurjeet 4 小时前发布 | 隐藏 | 过去 | 收藏 | 讨论 帮助 考虑申请YC 2026年夏季项目!申请截止至5月4日 指南 | 常见问题 | 列表 | API | 安全 | 法律 | 申请YC | 联系方式 搜索:
相关文章

原文

iCloud provides a secure infrastructure for keychain escrow to help ensure that only authorized users and devices can perform a recovery. Topographically positioned behind iCloud are clusters of hardware security modules (HSMs) that guard the escrow records. As described previously, each has a key that’s used to encrypt the escrow records under their watch.

To recover a keychain, users must authenticate with their iCloud account and password and respond to an SMS sent to their registered phone number. After this is done, users must enter their iCloud security code. The HSM cluster verifies that a user knows their iCloud security code using the Secure Remote Password (SRP) protocol; the code itself isn’t sent to Apple. Each member of the cluster independently verifies that the user hasn’t exceeded the maximum number of attempts allowed to retrieve their record, as discussed below. If a majority agree, the cluster unwraps the escrow record and sends it to the user’s device.

The device uses the escrowed data to unwrap the random keys used to encrypt the user’s keychain. With that key, the keychain—retrieved from CloudKit and iCloud key-value storage—is decrypted and restored onto the device. The escrow service allows only 10 attempts to authenticate and retrieve an escrow record. After several failed attempts, the record is locked and the user must call Apple Support to be granted more attempts. After the 10th failed attempt, the HSM cluster destroys the escrow record and the keychain is lost forever. This provides protection against a brute-force attempt to retrieve the record, at the expense of sacrificing the keychain data in response.

These policies are coded in the HSM firmware. The administrative access cards that permit the firmware to be changed have been destroyed. Any attempt to alter the firmware or access the private key causes the HSM cluster to delete the private key. Should this occur, the owner of each keychain protected by the cluster receives a message informing them that their escrow record has been lost. They can then choose to reenroll.

Published Date: May 07, 2024
联系我们 contact @ memedata.com