2017-12-11 13:57 GMT+01:00 Stefan Krah <ste...@bytereef.org>:
> I'm not a fan of hardware key generation. :-)
>
> https://en.wikipedia.org/wiki/YubiKey
>
> "In October 2017, security researchers found a vulnerability (known as ROCA) 
> in the implementation of RSA keypair generation in a cryptographic library 
> used by a large number of Infineon security chips. The vulnerability allows 
> an attacker to reconstruct the private key by using the public key.[18][19] 
> All YubiKey 4, YubiKey 4C, and YubiKey 4 nano within the revisions 4.2.6 to 
> 4.3.4 are affected by this vulnerability.[20] Yubico publicized a tool to 
> check if a Yubikey is affected and replaces affected tokens for free.[21]"

FYI it seems like only RSA private key generated by old Yubikey keys
are vulnerable to the ROCA attack. OTP authentication is not affected.
See https://www.yubico.com/keycheck/ for more information.

"ROCA: Return Of the Coppersmith Attack": https://lwn.net/Articles/738896/

As I wrote, I chose to use ed25519 for my new SSH key. Maybe it was a
good idea :-)

Victor
_______________________________________________
python-committers mailing list
python-committers@python.org
https://mail.python.org/mailman/listinfo/python-committers
Code of Conduct: https://www.python.org/psf/codeofconduct/

Reply via email to