[tor-project] Advisory regarding your Yubikey
Antoine Beaupré
anarcat at torproject.org
Thu Sep 5 19:37:53 UTC 2024
As some of you have already noticed, a security issue regarding the
Yubikey 5 series has been released two days ago. Sadly, the Yubikeys
distributed at the 2023 Tor Meeting in Costa Rica are affected.
### The issue at hand
To work their magic, Yubikeys store a secret key inside them that is
never supposed to leave the device. Researches at Ninjalab found out
that by physically probing one of the chips inside a Yubikey, it is
possible to acquire this secret key. Once an adversary has acquired such
a secret key, they can use this to perform two-factor authentication
and/or OpenPGP operations, as if they were the owner of the device.
In practice, abusing this vulnerability is quite costly. It requires:
- having physical access to your Yubikey
- knowing a password(s) to one of your accounts protected by two-factor
authentication (and/or your PIN if you use passkey) to get to your
two-factor secret key
- knowing your PIN to get to your OpenPGP secret key
Nevertheless, it's not unthinkable that adversaries with sufficient
resources may be targeting Torproject.
### Am I affected?
- Was the Yubikey you use given to you in Costa Rica? Then yes, you are
affected.
- Are you using a Yubikey 5 that was purchased before May this year?
Then yes, you are affected.
- Are you using a Yubikey 5 that was purchased after May this year?
Then you should check the firmware version to see if you are
affected. Keys with firmware prior to 5.7 are affected.
For instructions on how to find out which firmware your Key has, see the
[Where to find YubiKey Firmware][] guide from Yubico. Command-line users
can use the `ykman info` command to view the firmware version.
[Where to find YubiKey Firmware]: https://support.yubico.com/hc/en-us/articles/12420838928284-Where-to-find-YubiKey-Firmware
### What does this mean for me?
The impact for you depends on what you use your Yubikey for.
#### For two-factor authentication
If you use your Yubikey for two-factor authentication, this attack can
be used on top of a regular phishing attack to permanently break the
second factor and compromise your accounts, without you noticing.
#### For OpenPGP signing and decryption
If you use your Yubikey for OpenPGP signing or authentication, you
should check what type of key you have:
- If it's an RSA key, you are not affected by this vulnerability.
- If it's an elliptic curve key, and the attacker knows your PIN, this
attack can be used to gain access to and make a copy of your secret
key. An attacker could then forge signatures, authenticate to servers,
or possibly decrypt other secrets.
### What should I do?
First of all, in the wise words of Douglas Adams: don't panic.
We advise you to take care of the following:
- Keep using your Yubikey for two-factor authentication, it is still
much safer than TOTP (e.g., google authenticator) or not having any
two-factor authentication.
- Do make sure you don't leave your Yubikey unattended, especially
during conferences, in hotel rooms, etc.
- Avoid using passkey (passwordless authentication).
- Apply multi-coloured glitter nail polish on the casing of your Yubikey
(yes, really) and store a photo of it. If you have reason to believe
the device has been tampered with, check if the glitter is still the
same.
- If you use your Yubikey for OpenPGP and have an elliptic curve key,
please ensure you have a strong PIN. You may consider switching to an
RSA key or switching to a newer Yubikey using firmware 5.7 or higher,
depending on the impact a compromise of your key may have.
### References
- YubiCo advisory YSA-2024-03: https://www.yubico.com/support/security-advisories/ysa-2024-03/
- Technical paper: https://ninjalab.io/wp-content/uploads/2024/09/20240903_eucleak.pdf .
### Further questions
If you have any questions about the safety of your Yubikey, please feel
free to contact TPA, see:
https://gitlab.torproject.org/tpo/tpa/team/-/wikis/support
--
Antoine Beaupré
torproject.org system administration
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 227 bytes
Desc: not available
URL: <http://lists.torproject.org/pipermail/tor-project/attachments/20240905/2252d326/attachment.sig>
More information about the tor-project
mailing list