!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

180 Members
44 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
17 Jul 2021
@mic92:nixos.devMic92Passwords need to be at some point in memory08:05:43
@mic92:nixos.devMic92It's different when you use the yubi key to authenticate remotly against a different system.08:06:15
@mic92:nixos.devMic92Than you never need to have the key in host memory08:06:32
@andi:kack.itandi-My threat is more about local code execution stealing keys08:09:46
@mic92:nixos.devMic92The key for what?08:11:03
@mic92:nixos.devMic92A second use case for TPM would be second factor auth08:15:48
@mic92:nixos.devMic92Also interesting: https://github.com/mtth-bfft/tpm-otp08:18:28
@andi:kack.itandi-
In reply to @mic92:nixos.dev
The key for what?
The key for the passwords.
08:47:47
@mic92:nixos.devMic92
In reply to @andi:kack.it
The key for the passwords.
It seems like a small win in security for an increased complexity, since the passwords itself are still in plain
08:48:57
@andi:kack.itandi-Yeah but it defeats all kinds of offline attacks on my password database08:49:24
@andi:kack.itandi-you can use my entire disk and still have no way to decrypt my passwords. Not even if you also have a memory dump.08:49:38
@andi:kack.itandi-You only obtain what you can observe me requesting.08:50:02
@mic92:nixos.devMic92I can imangine for most people the risk of loosing access to all their passwords is higher when their hardware breaks than the added security.08:51:56
@mic92:nixos.devMic92 * I can imagine for most people the risk of loosing access to all their passwords is higher when their hardware breaks than the added security.08:52:18
@andi:kack.itandi- I would only loose access to keys on that machine and not all my passwords. 08:52:50

Show newer messages


Back to Room ListRoom Version: 6