-
Notifications
You must be signed in to change notification settings - Fork 19
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No common default PINs #79
Comments
Hi! Regarding point 2, Nitrokey App v1.3.x asks for PIN/password change on every use of the default one. Perhaps in v1.4 we will block usage of the latter completely, though I am not sure it will not confuse users. Blocking this in the firmware sounds good to me as well. Point 3 is right. With the recent movement we might reconsider our default password politics. Maybe not by sending the personalized PINs / firmware passwords, but forcing the change should suffice entirely. Against the supply-chain attack and firmware replacement, we have firmware verification procedure, which should show any interference, even done during the production. It would be nice to have it automatized in the future, and done entirely with the Nitrokey App. cc: @jans23 Edit: corrected the link for v3.3, and v2.1. |
Hi, too :) And thank you very much for your extensive reply! Wow, I did not know that these default passwords are even mentioned in the standard. This is somewhat concerning to have such recommendations in security related specs :( Could you elaborate what prevents a supply-chain attacker to use the current default passwords to deploy a custom firmware which always returns a firmware dump which looks like the original one while being compromised? To my understanding this is possible (e.g. by overwriting |
Corrected the links. I have not checked the second one, sorry! I might not understand fully your concern regarding the PINs. Smart card firmware cannot be updated, and if someone would use it, or lock the PINs, it would be visible, and fully reversible. Smart card factory reset could be invoked any time, resetting the PINs and its storage to default state. Regarding the firmware password, at the current state I think this point is valid. There is some space available in the flash, which theoretically could take additional routines. Ideally from security point it would be best to update the firmware, when possible, with latest one, or the same, once received the device. Alternatively, to check for changes, firmware could be downloaded directly using the bootloader and any In general, I believe end-user validation is better, than sending the personalized passwords, since we are an element of the supply-chain as well. You can never know, has any evil maid working in the production company looked at your firmware password by someone's shoulder, and sold your secret to someone. End-user validation on the other hand does not care who had the device, unless any unexpected hardware was glued there. But in that case the personalized password would not help either.
|
All Nitrokey Pro and Storage devices have the same PINs set by default (see "What is the default PIN/password?" in the official FAQ).
I have several issues with this:
In my opinion it would be best to ship each device with individual passwords and provide the default keys via a separate channel (e.g. encrypted/signed email or probably more practicable: a secure web portal). The accompanying software should force the user to change these inital passwords to make sure that the manufacturer does not know the password anymore.
The text was updated successfully, but these errors were encountered: