![]() |
|
![]() |
| This is an entire class of attacks known since almost forever. So yeah, some of us already considered this so we'd like to gross over it this time. |
![]() |
| Ledger literally supports key extraction as a feature and pushes hard the firmware updates. Last S firmware w/o key extraction still works, while the same X version cannot be used anymore. |
![]() |
| On the bright side, this bug seems to require an ECDSA operation, and I would guess that most ePassports are using RSA. Can't seem to find any statistics but the standards support both. |
![]() |
| It is not extremely unlikely, all it takes is for you to unlock your password database on a device with some malware.
The point of a second separate factor is to reduce that risk. |
![]() |
| Yes, but I don’t need/want 2FA everywhere, and it’s still a strictly better single factor than a password (since WebAuthN is resilient against server-side database leaks and phishing). |
![]() |
| The entire point of Yubikeys is that such a device should be impossible, and vice versa, if such a device were to exist, the Yubikey is nothing but an expensive USB flash drive. |
![]() |
| I wonder if you can phone the phone number, explain the situation and offer to venmo/paypal the new assignee money for the 2FA code
You could try every 3 - 5 years or so as it gets reassigned again |
![]() |
| I mean, that's the security story around it. You solve this and buying multiple yubikeys. Google and others support multiple keys, which gives you the backup story (I have 4 keys in various places). |
![]() |
| It is really annoying that more sites don't support multiple security keys, though. As far as I can tell, it's not encouraged by the FIDO Alliance and I can't think of a good technical reason for it. |
![]() |
| Any idea why this was changed? The big advantage of non-residential keys is that they do not take up any space on the Fido token and thus you can have an unlimited number of them. |
![]() |
| If you're using a yubikey solely for its PGP key stuff and you have a backup of the key or have a key hierarchy then replacing a yubikey is pretty trivial.
(I know because it's my specific usecase.) |
![]() |
| The last time Infineon chips had a crypto-breaking bug, Estonians got new ID cards for free. Meanwhile my less than two months old Yubikey 4 stopped working as a hardware attested PIV smartcard. |
![]() |
| > Meanwhile my less than two months old Yubikey 4 stopped working as a hardware attested PIV smartcard.
As in that the hardware broke? Or software stopped supporting it? |
![]() |
| > You can inspect a yubikeys identity with
Who's going to do that? Most of the time, when I use my Yubikey, I'm using it in a text field in a website. But, to quote https://news.ycombinator.com/item?id=41439400 > Seriously, it's trivial to fry a key and swap it with the working spare if you have access to it So all an attacker needs to do is swap my Yubikey with a fried one. Maybe someone will figure it out if they're tracking the numbers written on the outside. |
![]() |
| I see the Yubico website says 5.7 or greater not affected.
Elsewhere on the Yubico website[1] they state that a feature of 5.7 release was ...
Hopefully they've had lots of eyes looking at that ! Not sure why anybody feels the need to write their own crypto libraries these days, there are so many implementations out there, both open and closed source.[1] https://www.yubico.com/blog/now-available-for-purchase-yubik... |
![]() |
| Additionally, it looks like this vulnerability exist on on all Infineon trusted X (platform modules, microcontrollers, etc...) that use the same internal crypto libraries. |
![]() |
| As distinct from the attack itself? This is an interesting exercise and worth publishing, but in practice I don't see much real world consequence even for a notionally vulnerable device. |
![]() |
| Don't have high hopes for this but I just requested a replacement device through their support system as the offered mitigations are not something I would like to consider. |
![]() |
| Infineon is a listed company, not sure how much news will be published on this before German and Austrian markets open in a couple of hours so could be a profitable short selling opportunity. |
![]() |
| From a practical perspective, what protection does the use of a fido2 PIN provide here? Is the EM side channel exposed without knowledge of the PIN?
In any case this is a tremendous attack, good job! |
![]() |
| really never got the whole concept of what is basically is a tpm that advertises "money here"
software otp in a phone or something that is able to be updated seems to be a better choice |
An attacker not only needs your username and password, they also need physical access to your key. They then have to disassemble the device. If they want to give it back to you, they'll need to reassemble it.
So not exactly trivial!
A blob of nail-varnish over a plastic seam might be a useful canary.
But this does highlight one weakness of these FIDO tokens - you have to manually maintain a list of where you've registered them. And if your token is lost or stolen, you have to manually revoke every single one.