<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/rss-style.xsl" type="text/xsl"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	    xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	     xmlns:dc="http://purl.org/dc/elements/1.1/"
	   xmlns:atom="http://www.w3.org/2005/Atom"
	     xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	  xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>
<channel>
	<title>cyb &#8211; Terence Eden’s Blog</title>
	<atom:link href="https://shkspr.mobi/blog/tag/cyb/feed/" rel="self" type="application/rss+xml" />
	<link>https://shkspr.mobi/blog</link>
	<description>Regular nonsense about tech and its effects 🙃</description>
	<lastBuildDate>Wed, 04 Sep 2024 10:17:38 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://shkspr.mobi/blog/wp-content/uploads/2023/07/cropped-avatar-32x32.jpeg</url>
	<title>cyb &#8211; Terence Eden’s Blog</title>
	<link>https://shkspr.mobi/blog</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title><![CDATA[Some thoughts on the YubiKey EUCLEAK Vulnerability]]></title>
		<link>https://shkspr.mobi/blog/2024/09/some-thoughts-on-the-yubikey-eucleak-vulnerability/</link>
					<comments>https://shkspr.mobi/blog/2024/09/some-thoughts-on-the-yubikey-eucleak-vulnerability/#comments</comments>
				<dc:creator><![CDATA[@edent]]></dc:creator>
		<pubDate>Wed, 04 Sep 2024 11:34:57 +0000</pubDate>
				<category><![CDATA[/etc/]]></category>
		<category><![CDATA[cyb]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[yubikey]]></category>
		<guid isPermaLink="false">https://shkspr.mobi/blog/?p=52897</guid>

					<description><![CDATA[It looks like everyone&#039;s favourite FIDO token provider might have an unpatchable vulnerability! Much Sturm und Drang from the usual sources. But how bad is it really?  Not so bad - but it does expose some weaknesses in the very idea of having physical tokens.  First up, as the research paper&#039;s abstract says:  The attack requires physical access to the secure element  So, straight off the bat,…]]></description>
										<content:encoded><![CDATA[<p>It looks like everyone's favourite FIDO token provider might have an unpatchable vulnerability! Much <i lang="de">Sturm und Drang</i> from the usual sources. But how bad is it really?  Not so bad - but it does expose <a href="https://shkspr.mobi/blog/2024/09/some-thoughts-on-the-yubikey-eucleak-vulnerability/#the-real-issue-with-fido-tokens">some weaknesses in the very idea of having physical tokens</a>.</p>

<p>First up, <a href="https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf">as the research paper's abstract says</a>:</p>

<blockquote><p>The attack requires physical access to the secure element</p></blockquote>

<p>So, straight off the bat, this reduces the likelihood of attack. Someone would need to actively target you. Of course, if you're the sort of person who secures all their secrets and cryptowallets with a FIDO token, you may be a juicy target!</p>

<p>Secondly, the attack relies on:</p>

<blockquote><p>the adversary steal[ing] the login and password of a victim’s application account protected with FIDO</p></blockquote>

<p>So, you need to lose your username, password, <em>and</em> token for this attack to be successful. Again, this is unlikely to happen as a "drive-by" attack.</p>

<p>Once the attacker gets your FIDO token, they need to analyse it using "expensive equipment". A cost of approximately <a href="https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/">$11,000 according to Ars</a>.</p>

<p>That moves the attack away from the hands of casual criminals. It isn't an insurmountable barrier for organised crime or nation states.</p>

<p>Finally, <a href="https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf#%5B%7B%22num%22%3A121%2C%22gen%22%3A0%7D%2C%7B%22name%22%3A%22XYZ%22%7D%2C89.292%2C740.862%2Cnull%5D">Appendix A</a> discusses how difficult it is to actually get the equipment close enough to the circuitry:</p>

<blockquote><p>[…] capturing the EM signal with a small EM probe would not work if this probe is too far from the chip. We hence have to open the YubiKey plastic case to access its logic board.
[…]
In both cases however, the device needs to be re-packaged if the adversary wants to give it back to legitimate user without him noticing. We did not study further this issue.</p></blockquote>

<p>Here's what it looks like when that probe is placed next to the circuitry:</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/09/probe.jpg" alt="Photo of electrical equipment placed very close to a circuit board." width="1600" height="1000" class="aligncenter size-full wp-image-52898">

<p>If you suddenly find your Yubikey smashed or cracked, then you <em>may</em> have been a victim of this attack!</p>

<p>A reasonable way to defend against this is to get some glittery nail polish. No, seriously! Put a blob of glitter polish on the seam of your device. Something like this:</p>

<p><a href="https://flickr.com/photos/effika/11377767954/"><img src="https://shkspr.mobi/blog/wp-content/uploads/2024/09/11377767954_d03903ee67_c.jpg" alt="Nails painted with polish. An intricate pattern has formed." width="800" height="600" class="aligncenter size-full wp-image-52900"></a></p>

<p>Take a photo. If the baddies grab your YubiKey and crack it open, they won't easily be able to get the pattern correct when they re-seal it. Regularly compare your photo to your device.</p>

<h2 id="the-real-issue-with-fido-tokens"><a href="https://shkspr.mobi/blog/2024/09/some-thoughts-on-the-yubikey-eucleak-vulnerability/#the-real-issue-with-fido-tokens">The <em>Real</em> Issue With FIDO Tokens</a></h2>

<p>Physical tokens require physical security. I've moved to a <a href="https://shkspr.mobi/blog/2024/02/giving-the-finger-to-mfa-a-review-of-the-z1-encrypter-ring-from-cybernetic/">an Encrypter Ring</a>. I literally wear my FIDO token. I am <em>extremely</em> likely to notice someone removing my ring (or my finger).</p>

<img src="https://shkspr.mobi/blog/wp-content/uploads/2024/02/Ring-width.jpg" alt="Photo of my fingers stretched out so you can see the width of the ring." width="512" height="512" class="aligncenter size-full wp-image-49605">

<p>Is your token on your keyring? Where is your keyring right now? In your pocket or hanging up somewhere?  Most people either leave their FIDO token laying around out of sight or have it permanently plugged in to their machine. I'm not sure which is worse.</p>

<p>The other major issue is that <a href="https://shkspr.mobi/blog/2022/12/how-do-i-revoke-a-fido-webauthn-token-from-every-service/">it is <em>impossible</em> to revoke a FIDO token from all your accounts at once</a>!</p>

<p>You've used your token to register with a few dozen sites, you either lose your key or discover it has been tampered with. What do you do?</p>

<p>There is no way to tell which sites you have used a FIDO token with. You have to remember (or keep a list somewhere). You will need to manually go to each site and revoke the stolen token.  If you've forgotten one, you can't revoke it from your key, which means attackers could have unfettered access to that account.</p>

<h2 id="what-should-i-do"><a href="https://shkspr.mobi/blog/2024/09/some-thoughts-on-the-yubikey-eucleak-vulnerability/#what-should-i-do">What should I do?</a></h2>

<p>The <a href="https://ninjalab.io/eucleak/">discoverers of this vulnerability take great pains to say</a>:</p>

<blockquote><p>it is still safer to use your YubiKey or other impacted products as FIDO hardware authentication token to sign in to applications rather than not using one.</p></blockquote>

<p>I think they are correct. But there are still a few things you should do to secure yourself against this class of attack.</p>

<ol start="0">
<li>Ensure the physical <em>security</em> of your token. Either wear it as jewellery, <a href="https://dangerousthings.com/">implant it in your skin</a>, or reduce the likelihood of it being taken.</li>
<li>Ensure the physical <em>integrity</em> of your token. Use nail-varnish or something similar to help you detect if it has been physically compromised.</li>
<li>Ensure that you know <em>which</em> sites have been secured with a Yubikey. Make a note of it in your password manager or other secure vault.</li>
<li>Ensure that you are less of a target. Don't brag about your security. Certainly don't post on the Internet about which security products you use and the countermeasures you take.  Oh shit.</li>
</ol>
<img src="https://shkspr.mobi/blog/wp-content/themes/edent-wordpress-theme/info/okgo.php?ID=52897&HTTP_REFERER=RSS" alt="" width="1" height="1" loading="eager">]]></content:encoded>
					
					<wfw:commentRss>https://shkspr.mobi/blog/2024/09/some-thoughts-on-the-yubikey-eucleak-vulnerability/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
