!NBBFPbiuttRgTqbrcY:nixos.org

NixOS Security Discussions

363 Members
Discussions around Security | Triaging happens in #security:nixos.org126 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
3 Oct 2024
@emilazy:matrix.orgemily(I haven't actually worked with TPM2 because the API is awful to me, but I believe this is meant to be part of the capabilities.)18:08:01
@elvishjerricco:matrix.orgElvishJerriccoyes but nixos doesn't implement that right now because systemd wants you to be booting ukis for their tpm stuff to work18:08:34
@emilazy:matrix.orgemily well, so we fix that and then kill off initrd secrets :) 18:08:52
@elvishjerricco:matrix.orgElvishJerriccomeh18:09:01
@elvishjerricco:matrix.orgElvishJerriccoinitrd secrets are useful18:09:06
@emilazy:matrix.orgemilynobody should be relying on any of this for security without secure boot anyway18:09:09
@elvishjerricco:matrix.orgElvishJerriccoThere are things to use initrd secrets for, like clevis JWTs, and I'm still unconvinced that it's ok to just toss them in the store.18:09:59
@elvishjerricco:matrix.orgElvishJerricco now, we could implement it way better, but that's another matter 18:10:57
@emilazy:matrix.orgemilyworth nothing that e.g. WebAuthn depends on shipping around blobs of secure element-encrypted private keys18:11:29
@emilazy:matrix.orgemily * worth noting that e.g. WebAuthn depends on shipping around blobs of secure element-encrypted private keys18:11:33
@elvishjerricco:matrix.orgElvishJerriccoI need to learn more about how WebAuthn actually works...18:12:24
@emilazy:matrix.orgemily(technically that's an implementation detail, but it's how all the serious hardware implementations work for non-resident keys)18:13:00
@elvishjerricco:matrix.orgElvishJerriccooh, but resident keys are the default, aren't they?18:13:24
@elvishjerricco:matrix.orgElvishJerriccoand by far more common?18:13:29
@emilazy:matrix.orgemilynah18:13:31
@emilazy:matrix.orgemilythey're the hot new thing in the form of passkeys, but they were very uncommon for a very long time18:13:42
@emilazy:matrix.orgemilyWebAuthn used as a second factor is non-resident18:13:48
@emilazy:matrix.orgemilyit's still an explicit opt-in to get resident keys18:13:58
@emilazy:matrix.orgemilybut yeah "passkeys" are resident18:14:02
@elvishjerricco:matrix.orgElvishJerriccoah, I'm thinking of passkeys18:14:04
@elvishjerricco:matrix.orgElvishJerriccoI thought passkeys was just the marketing term for WebAuthn18:14:12
@emilazy:matrix.orgemilythey're the marketing term for WebAuthn resident keys, usually WebAuthn resident keys that are backed by multi-device-synced cloud storage18:14:40
@elvishjerricco:matrix.orgElvishJerriccoah ok interesting18:15:15
@elvishjerricco:matrix.orgElvishJerriccoi know trying to use passkeys with a yubikey can be a problem because yubikeys can only store like 32 of them or something so it basically sucks. Makes me wonder why browsers don't just store the resident stuff themselves and then use the yubikey for decryption.18:16:33
@emilazy:matrix.orgemily(sometimes very fancy syncing protocols, like "confirming via Secure Enclave attestation that the receiving end is a legitimate device that we want to smuggle our precious private keys directly encrypted to it to")18:16:47
@elvishjerricco:matrix.orgElvishJerricco
In reply to @emilazy:matrix.org
(sometimes very fancy syncing protocols, like "confirming via Secure Enclave attestation that the receiving end is a legitimate device that we want to smuggle our precious private keys directly encrypted to it to")
I'm sure that won't ever get cracked :P
18:17:09
@emilazy:matrix.orgemily(to maintain the "no private key exfiltration" properties of hardware FIDO2 keys)18:17:12
@emilazy:matrix.orgemily
In reply to @elvishjerricco:matrix.org
I'm sure that won't ever get cracked :P
if you have a Secure Enclave vulnerability Apple will pay you a lot of money for it
18:17:31
@emilazy:matrix.orgemilyit's sure better than all the TPM-spec stuff you can buy18:17:45

Show newer messages


Back to Room ListRoom Version: 9