TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Infineon RSA Key Generation Issue

238 点作者 cimnine超过 7 年前

12 条评论

tauntz超过 7 年前
Relevant: <a href="https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2017&#x2F;10&#x2F;crypto-failure-cripples-millions-of-high-security-keys-750k-estonian-ids&#x2F;" rel="nofollow">https:&#x2F;&#x2F;arstechnica.com&#x2F;information-technology&#x2F;2017&#x2F;10&#x2F;crypt...</a><p>It&#x27;s worth pointing out that GitHub apparently revoked affected certs (generated by Yubikey 4), while the 750k affected national ID cards in Estonia will stay in use and certs won&#x27;t be revoked for now.
评论 #15485368 未加载
评论 #15485477 未加载
imrehg超过 7 年前
Many people mentioned that the Estonian ID card is vulnerable. I have an e-residency card, so I tried it out on <a href="https:&#x2F;&#x2F;keychest.net&#x2F;roca" rel="nofollow">https:&#x2F;&#x2F;keychest.net&#x2F;roca</a><p>If I use &quot;pkcs15-tool --read-ssh-key 1&quot; to read out the public key, (in the &quot;ssh-rsa AAAAB3Nza.....&quot; format), then I get a vulnerable key warning (2048bit SSH key).<p>On the other hand, if I use &quot;pkcs15-tool --read-ssh-key 1 --rfc4716&quot; to output in &quot;---- BEGIN SSH2 PUBLIC KEY ----....&quot; format, then it shows different key tests and tells me it&#x27;s &quot;safe key&quot;.<p>Is this a weakness of the test, or is there really some difference between the &quot;regular&quot; and the &quot;RFC4716 formatted key (I wouldn&#x27;t expect that)? What am I missing?<p>EDIT: using the standalone &quot;roca-detect&quot; (note, Python2 is required), then the first format reports potential vulnerability, while running it on the second format results in &quot;Exception in processing PGP rec file estonia1.asc: Incorrect padding&quot;. So I guess it is indeed that the tool does not handle RFC4716 formatted SSH keys correctly?
评论 #15492183 未加载
评论 #15489090 未加载
packetized超过 7 年前
I use this functionality on a near-daily basis, and received an email from GitHub this morning informing me that two of my older, backup SSH keys generated on Yubikey 4s had been revoked. I&#x27;m going to start the replacement process with Yubico this morning, and probably share my experience with it here.
评论 #15485377 未加载
评论 #15487246 未加载
评论 #15486295 未加载
kuschku超过 7 年前
If you bought your Yubikey on Amazon, you can&#x27;t replace it directly, but have to contact the seller.<p>As Amazon tends to intermingle supply from different resellers for Fulfillment by Amazon products, you might have a Yubikey whose Serial No is registered to a different reseller than the one you paid - as result, replacement is going to be complicated.<p>EDIT: Here the message the Yubico website displays: <a href="https:&#x2F;&#x2F;i.imgur.com&#x2F;FVINcQB.jpg" rel="nofollow">https:&#x2F;&#x2F;i.imgur.com&#x2F;FVINcQB.jpg</a>, and the response from the support: <a href="https:&#x2F;&#x2F;i.imgur.com&#x2F;it8zxgp.png" rel="nofollow">https:&#x2F;&#x2F;i.imgur.com&#x2F;it8zxgp.png</a><p>Now I&#x27;m left with a Yubikey that&#x27;s produces broken RSA keys, and Yubico refuses to take responsibility.
评论 #15486263 未加载
评论 #15485542 未加载
评论 #15485127 未加载
评论 #15485387 未加载
simias超过 7 年前
So this is only a problem if you generate a key directly on your card instead of uploading it? Nothing else?<p>I don&#x27;t really understand why you would do that since there&#x27;s no way to extract the key from the token once generated. It means that you have no backup. For this reason I always generate my keys on a trusted, offline computer, make a few backups and then upload it on the token. I guess that&#x27;s one more reason to do so, at least you don&#x27;t have to trust the RGN of the device.
评论 #15485388 未加载
评论 #15485523 未加载
评论 #15485492 未加载
评论 #15485402 未加载
评论 #15485406 未加载
评论 #15486361 未加载
ecesena超过 7 年前
Remediations so far:<p>- Chromebook <a href="https:&#x2F;&#x2F;sites.google.com&#x2F;a&#x2F;chromium.org&#x2F;dev&#x2F;chromium-os&#x2F;tpm_firmware_update" rel="nofollow">https:&#x2F;&#x2F;sites.google.com&#x2F;a&#x2F;chromium.org&#x2F;dev&#x2F;chromium-os&#x2F;tpm_...</a><p>- Windows <a href="https:&#x2F;&#x2F;portal.msrc.microsoft.com&#x2F;en-US&#x2F;security-guidance&#x2F;advisory&#x2F;ADV170012" rel="nofollow">https:&#x2F;&#x2F;portal.msrc.microsoft.com&#x2F;en-US&#x2F;security-guidance&#x2F;ad...</a>
xur17超过 7 年前
If anyone is wondering if they are affected: <a href="https:&#x2F;&#x2F;keychest.net&#x2F;roca" rel="nofollow">https:&#x2F;&#x2F;keychest.net&#x2F;roca</a>
评论 #15486196 未加载
评论 #15484917 未加载
lvh超过 7 年前
From earlier today, the general bug: <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=15482441" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=15482441</a><p>Cribbing from my comment there...<p>You should only be worried about this if you generated keys on a vulnerable device, such as a smart card (e.g. Yubikey) or a TPM embedded in your computer. You can detect if your card is affected with a variety of tools, both online and offline:<p><a href="https:&#x2F;&#x2F;crocs.fi.muni.cz&#x2F;public&#x2F;papers&#x2F;rsa_ccs17#detection_t.." rel="nofollow">https:&#x2F;&#x2F;crocs.fi.muni.cz&#x2F;public&#x2F;papers&#x2F;rsa_ccs17#detection_t...</a>.<p>Fair word of warning: the offline (as in, on-your-machine) tools use a cornucopia of crypto libraries, meaning that it&#x27;s nontrivial to build. If you&#x27;re on macOS and don&#x27;t know what an LDFLAGS is, you probably want the online checker.<p>Yubikey has their own tool: <a href="https:&#x2F;&#x2F;www.yubico.com&#x2F;keycheck&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.yubico.com&#x2F;keycheck&#x2F;</a><p>How does the attack work? The paper isn&#x27;t released yet, but here&#x27;s an educated guess. The authors have already indicated that this is not another variant of [BCCC13], a paper by Bernstein et al that relied on bugs in the CSPRNG of smart cards to find weak, factorizable keys. It does appear to build on earlier research by the same authors [SNSK16]. The detection tool is released, but that only shows us what the &quot;fingerprints&quot; (symptoms of a weak key) are, not how to factor them.<p>My best guess is that this is a Coppersmith&#x2F;Howgrave-Graham [HG] style attack. The difference between this and previous attacks is that the problem results from poor prime selection algorithms, not limited entropy. Briefly:<p>1. patterns in the small-prime residues of N tell you who made the key with some accuracy (based on 2016 research; I think they&#x27;re probably not detecting the weakness directly but rather just detecting _other_ artifacts of a device that would otherwise, incidentally, generate poor primes) 2. a weak prime generator results in a largely predictable prime 3. Coppersmith allows factoring if you guess sufficient high-order bits of p correctly.<p>So far the results I&#x27;m seeing appear to be cryptographically catastrophic but not so much operationally catastrophic. (please don&#x27;t interpret this as me speaking ill of the paper: the paper is awesome) The range of real keys I&#x27;ve seen is currently between $40k and $4T (yes, trillion). That&#x27;s pretty bad if you&#x27;re running a company CA off of a $40k key, but probably not so bad you can&#x27;t afford to wait for a replacement in most cases. If the fingerprints are to be believed, some keys can be factored in a matter of hours -- but I have no idea yet what the distribution of those keys is (i.e. is it 1 in 10 or 1 in 10k?). Cost estimates given in the checker additionally bolster my belief that it&#x27;s a Coppersmith&#x2F;Howgrave-Graham attack.<p>As usual, the issue here is different with signing keys and encryption keys. If you&#x27;re not using forward-secure ciphersuites and merely signing with a smart card key (as you typically would be with smart card-backed SSH or TLS) and instead are really encrypting with the key itself (GPG), you&#x27;ve lost confidentiality on all messages once that key is compromised. A compromised signing key merely allows for forged signatures, and by then you&#x27;ve hopefully revoked trust in that key.<p>[BCCC13]: <a href="https:&#x2F;&#x2F;smartfacts.cr.yp.to&#x2F;smartfacts-20130916.pdf" rel="nofollow">https:&#x2F;&#x2F;smartfacts.cr.yp.to&#x2F;smartfacts-20130916.pdf</a><p>[SNSK16]: <a href="https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;conference&#x2F;usenixsecurity16&#x2F;sec16_paper_svenda.pdf" rel="nofollow">https:&#x2F;&#x2F;www.usenix.org&#x2F;system&#x2F;files&#x2F;conference&#x2F;usenixsecurit...</a><p>[HG]: <a href="http:&#x2F;&#x2F;citeseerx.ist.psu.edu&#x2F;viewdoc&#x2F;download?doi=10.1.1.144.4244&amp;rep=rep1&amp;type=pdf" rel="nofollow">http:&#x2F;&#x2F;citeseerx.ist.psu.edu&#x2F;viewdoc&#x2F;download?doi=10.1.1.144...</a>
julian_1超过 7 年前
Infineon still haven&#x27;t said how their hardware is vulnerable?
评论 #15485141 未加载
maxerickson超过 7 年前
Discussion overlaps with <a href="https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=15482441" rel="nofollow">https:&#x2F;&#x2F;news.ycombinator.com&#x2F;item?id=15482441</a>
cimnine超过 7 年前
It appears that the blog post was removed shortly after publication. Here&#x27;s what the text has been:<p>&gt; Infineon Technologies, one of Yubico’s secure element vendors, has informed us of a security issue in their cryptographic firmware library. The issue weakens the strength of on-chip RSA key generation, and affects some use cases for the PIV smart card and OpenPGP functionality of the YubiKey 4 platform.<p>&gt; FIDO U2F, OTP, and OATH functions of the YubiKey 4 platform are not affected. The YubiKey NEO, FIDO U2F Security Key and YubiHSM are not impacted, nor are the deprecated products YubiKey standard and YubiKey Edge. Externally generated RSA keys are not affected.<p>&gt; Yubico estimates that approximately 2% of YubiKey customers utilize the functionality affected by this issue. We have addressed this issue in all shipments of YubiKey 4, YubiKey 4 Nano, and YubiKey 4C, since June 6, 2017.<p>&gt; At this time, we are not aware of any security breaches due to this issue. We are committed to always improving how we protect our customers and continuously invest in making our products even more secure.<p>&gt; We offer customers who are affected mitigation recommendations and optional YubiKey replacement. For more information please refer to our dedicated customer portal [1].<p>&gt; The post Infineon RSA Key Generation Issue [2] appeared first on Yubico [3].<p>&gt; [1] <a href="https:&#x2F;&#x2F;www.yubico.com&#x2F;keycheck&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.yubico.com&#x2F;keycheck&#x2F;</a><p>&gt; [2] <a href="https:&#x2F;&#x2F;www.yubico.com&#x2F;2017&#x2F;10&#x2F;infineon-rsa-key-generation-issue&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.yubico.com&#x2F;2017&#x2F;10&#x2F;infineon-rsa-key-generation-i...</a><p>&gt; [3] <a href="https:&#x2F;&#x2F;www.yubico.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.yubico.com&#x2F;</a>
CaliforniaKarl超过 7 年前
The article has been re-posted! I don&#x27;t know if the content is the same, though...<p>mods: Would it be possible to get this article reset, so that it appears at the top of the new list? I was thinking of resubmitting, but I&#x27;d rather cimnine get the votes!