Hey,
I saw your talk at 31c3 and I'm quite interested, but I still have some concerns / questions. I've been looking around for a while now for a usb device to use to store pgp/ssh keys and a password manager database. So far I haven't found any device that satisfies all my concerns / requirements. So far the usb armory has the most potential however.
My main concern with the usb armory is; how does this protect you against a key logger?
What prevents a keylogger that logs you typing in your master password / pin from simply dumping all passwords in your password database?
That's something where the yubi key has a big advantage due to the physical button on the device, you have to touch the button when doing authentication. I think this is a great solution to render a lot of key logging ineffective. They might be able to log your master password and some of the passwords you use while the key logger is active, but so long as they don't have physical access to your key, they still can't dump all your passwords. Unfortunately yubi keys are a lot harder to backup and you have to rely on their 3rd party authentication service to get the most out of it. But we could get the best of both worlds if we could add a button to the usb armory.
Would it be possible to connect a button to the gpio pins?
One other thing that for example the nitrokey has is it's 'tamper proof' usb casing. This was also asked during the Q/A after your 31c3 talk by one of the guys and you suggested they prototype a case and sell it. So I guess we as a community could do this. But I'd be perfect if the usb armory were sold with a tamper proof case with a small button in it.
I guess the answer to my question could be to use rfc 4226 OTP passwords with the password manager which reduces the problem of a key logger quite a bit but aside from the lack of support for it, it still doesn't render a key logger 100% unusable like a physical button would. It can still get authentication tokens at any time without physical access to the device.
On Sunday, January 4, 2015 9:58:59 PM UTC+1, Robert Sevat wrote:Hey,
I saw your talk at 31c3 and I'm quite interested, but I still have some concerns / questions. I've been looking around for a while now for a usb device to use to store pgp/ssh keys and a password manager database. So far I haven't found any device that satisfies all my concerns / requirements. So far the usb armory has the most potential however.
My main concern with the usb armory is; how does this protect you against a key logger?
What prevents a keylogger that logs you typing in your master password / pin from simply dumping all passwords in your password database?In standalone mode this is not a concern, when connected in device mode I understand that some are concerned by this.First of all a pure keylogger might be defeated by some scrambling mechanism for pin/passphrase input, however this just raises the bar as at that point capturing the screen would defeat this.The way I see it a robust application does only rely on passphrase to unlock private key material *on* the USB armory itself, while not giving access to it. This means that the passphrase (something you know) takes place in 2 factor authentication as private key material (something you have) remains on the USB armory.This would mean that interception of the mere passphrase would not compromise your private key material and therefore provide only the (weakest) half of your secrets, unusable on their own.This is quite a common pattern and applications that we will develop for the USB armory will take such considerations in mind.
That's something where the yubi key has a big advantage due to the physical button on the device, you have to touch the button when doing authentication. I think this is a great solution to render a lot of key logging ineffective. They might be able to log your master password and some of the passwords you use while the key logger is active, but so long as they don't have physical access to your key, they still can't dump all your passwords. Unfortunately yubi keys are a lot harder to backup and you have to rely on their 3rd party authentication service to get the most out of it. But we could get the best of both worlds if we could add a button to the usb armory.The yubi key provides a single specific functionality which is not comparable to the full spectrum of applications that can be executed *on* the USB armory itself.Would it be possible to connect a button to the gpio pins?Yes.One other thing that for example the nitrokey has is it's 'tamper proof' usb casing. This was also asked during the Q/A after your 31c3 talk by one of the guys and you suggested they prototype a case and sell it. So I guess we as a community could do this. But I'd be perfect if the usb armory were sold with a tamper proof case with a small button in it.Tamper proofing is not an issue on the USB armory, there is no persistent storage on the board and removable storage (microSD) must be encrypted rather than relying on "tamper proofing" to ensure maximum security.I guess the answer to my question could be to use rfc 4226 OTP passwords with the password manager which reduces the problem of a key logger quite a bit but aside from the lack of support for it, it still doesn't render a key logger 100% unusable like a physical button would. It can still get authentication tokens at any time without physical access to the device.A button is no substitute for a passphrase, you are mixing and matching different concepts and applications here. Please make a specific use case example to discuss this further, however I hope I have answered your concerns already.Thanks for the feedback!
--
You received this message because you are subscribed to the Google Groups "USB armory" group.
To unsubscribe from this group and stop receiving emails from it, send an email to usbarmory+...@googlegroups.com.
To post to this group, send email to usba...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/usbarmory/113c5169-af29-4452-a0da-2b898be093e8%40googlegroups.com.