!agkXCfUrgbadYlQXRj:kack.it

NixOS + TPMs

177 Members
43 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
17 Jul 2021
@mic92:nixos.dev@mic92:nixos.devOk, for device specific credentials this might be helpful but not the classic password manager that is synched across devices.08:01:07
@andi:kack.itandi-Why not? Right now I encrypt my pass database to plenty of GPG keys. One per device and the one on my yubi key 08:02:19
@andi:kack.itandi-IMHO it would just be one more key I encrypt things for08:02:42
@mic92:nixos.dev@mic92:nixos.devAn attack on the password manager would not look much different if an TPM would be involved I would say08:04:45
@mic92:nixos.dev@mic92:nixos.devPasswords need to be at some point in memory08:05:43
@mic92:nixos.dev@mic92:nixos.devIt's different when you use the yubi key to authenticate remotly against a different system.08:06:15
@mic92:nixos.dev@mic92:nixos.devThan you never need to have the key in host memory08:06:32
@andi:kack.itandi-My threat is more about local code execution stealing keys08:09:46
@mic92:nixos.dev@mic92:nixos.devThe key for what?08:11:03
@mic92:nixos.dev@mic92:nixos.devA second use case for TPM would be second factor auth08:15:48
@mic92:nixos.dev@mic92:nixos.devAlso interesting: https://github.com/mtth-bfft/tpm-otp08:18:28
@andi:kack.itandi-
In reply to @mic92:nixos.dev
The key for what?
The key for the passwords.
08:47:47
@mic92:nixos.dev@mic92:nixos.dev
In reply to @andi:kack.it
The key for the passwords.
It seems like a small win in security for an increased complexity, since the passwords itself are still in plain
08:48:57
@andi:kack.itandi-Yeah but it defeats all kinds of offline attacks on my password database08:49:24
@andi:kack.itandi-you can use my entire disk and still have no way to decrypt my passwords. Not even if you also have a memory dump.08:49:38

Show newer messages


Back to Room ListRoom Version: 6