Secure key handling using the TPM
Secure key handling using the TPM
Posted Oct 17, 2018 19:57 UTC (Wed) by rdoty (guest, #39529)In reply to: Secure key handling using the TPM by mjg59
Parent article: Secure key handling using the TPM
Posted Oct 17, 2018 21:40 UTC (Wed)
by mjg59 (subscriber, #23239)
[Link] (8 responses)
Posted Oct 18, 2018 6:43 UTC (Thu)
by smurf (subscriber, #17840)
[Link] (7 responses)
If they can "only" get away with [a copy of] the disk, the TPM approach does improve security.
Posted Oct 18, 2018 7:25 UTC (Thu)
by mjg59 (subscriber, #23239)
[Link] (6 responses)
a) Having physical access to the system, or
Posted Oct 18, 2018 16:46 UTC (Thu)
by smurf (subscriber, #17840)
[Link] (5 responses)
Then you borrow the disk for a couple of hours – while they're asleep, off on a date, or whatever.
Posted Oct 18, 2018 16:51 UTC (Thu)
by mjg59 (subscriber, #23239)
[Link] (4 responses)
Posted Oct 19, 2018 7:54 UTC (Fri)
by jgg (subscriber, #55211)
[Link] (3 responses)
If I borrow your computer, disassemble it, clone the disk, then put it back, you have no idea it was stolen and I can access your data as soon as I observe the passphrase through some means.
With the TPM even if I do all of these steps I can't decrypt the copy of the drive as I need the physical TPM as well.
Of course if I steal the entire computer then more options are possible, but at least you'll know the computer was stolen and can take counter-mesaures, ie re-keying online accounts, etc.
Posted Oct 19, 2018 8:42 UTC (Fri)
by mjg59 (subscriber, #23239)
[Link] (2 responses)
Posted Oct 19, 2018 15:44 UTC (Fri)
by jejb (subscriber, #6654)
[Link] (1 responses)
Firstly neither system protects the case where the attacker got the passphrase by looking over your shoulder and then runs off with your laptop because even in the bitlocker case the measurements won't change when the attacker unlocks.
Secondly, I think there is value to having the TPM dictionary attack protections against brute forcing the password. I don't buy the argon2id brute forcing argument because most people do have insecure passphrases which a dictionary attack will eventually crack given enough compute power. I also don't buy the idea that training people not to use memorable words is the way forward because then they tend to write them down (especially if you force them to change their unmemorable passphrase every couple of months), so TPM DA protections do give benefits in the average user case where they're using a memorable word as the passphrase.
Plus simply placing the decryption key in the TPM is a big step towards implementing policy based protections around it, so it would be a good first step to take regardless of any additional security benefits.
Posted Oct 20, 2018 12:58 UTC (Sat)
by mjg59 (subscriber, #23239)
[Link]
Secure key handling using the TPM
Secure key handling using the TPM
Secure key handling using the TPM
b) Having enough control over the system to be able to exfiltrate the contents of the disk after it's been unlocked
Secure key handling using the TPM
Secure key handling using the TPM
Secure key handling using the TPM
Secure key handling using the TPM
Secure key handling using the TPM
Secure key handling using the TPM