Maybe we're talking about different things. Are you thinking of TOTP
2FA tokens? Your arguments do apply to those.

I'm not talking about those. I'm talking about devices like a yubikey,
which is essentially a  a poor person's HSM.
On Mon, Oct 15, 2018 at 7:21 PM robert engels <reng...@ix.netcom.com> wrote:
>
> That is not true. If you lose the key, anyone else can use the device - which 
> is why there is usually an additional requirement beyond the hardware key - I 
> am referring to hardware dongles given to users.
>
> By LOSE I meant unknowingly lost - not that once I lose it and KNOW I’ve lost 
> it I deactivate the keys - and by then the system may be compromised anyway 
> (think murder to steal the hardware device - the victim is not reporting the 
> device stolen).
>
> Now sometimes that secondary info might be a retina or fingerprint scan, but 
> the point is if the machine providing the information has been compromised 
> (root access granted), they are free to alter the binaries and the OS itself, 
> to compromise these procedures, meaning they probably already captured these 
> elements already (prior to the crime).
>
> It is the coupling of the two scenarios - the security cannot be based on the 
> hardware device alone (since it can be lost/stolen), and when there is backup 
> identifying information, that can be compromised (if the machine is 
> compromised).
>
> I know very well how the hardware devices work.
>
>
> > On Oct 15, 2018, at 7:12 PM, Christopher Nielsen <m4dh4t...@gmail.com> 
> > wrote:
> >
> > On Mon, Oct 15, 2018 at 4:33 PM robert engels <reng...@ix.netcom.com> wrote:
> >>
> >> To clarify, this is for a hardware device that protects a local resource - 
> >> a network based protocol that challenges the device for access is a 
> >> different story, and yes, when properly implemented is secure (unless 
> >> someone steals your device! - which is why it is usually password + 
> >> device, and then you are back to the same problem of compromising 
> >> passwords when root access has been compromised).
> >
> > This statement indicates to me you don't understand how hardware
> > security tokens work. It doesn't matter if you have root access. You
> > cannot obtain key material from it. If you lose it, you lose the set
> > of keys on it. That's it. Revoke them and issue new ones using your
> > root cert/key that never touches a networked system and lives in a
> > safe.
> >
> > --
> > Christopher Nielsen
> > "They who can give up essential liberty for temporary safety, deserve
> > neither liberty nor safety." --Benjamin Franklin
> > "The tree of liberty must be refreshed from time to time with the
> > blood of patriots & tyrants." --Thomas Jefferson
> >
> > --
> > You received this message because you are subscribed to the Google Groups 
> > "golang-nuts" group.
> > To unsubscribe from this group and stop receiving emails from it, send an 
> > email to golang-nuts+unsubscr...@googlegroups.com.
> > For more options, visit https://groups.google.com/d/optout.
>


-- 
Christopher Nielsen
"They who can give up essential liberty for temporary safety, deserve
neither liberty nor safety." --Benjamin Franklin
"The tree of liberty must be refreshed from time to time with the
blood of patriots & tyrants." --Thomas Jefferson

-- 
You received this message because you are subscribed to the Google Groups 
"golang-nuts" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to golang-nuts+unsubscr...@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.

Reply via email to