Skip to content

Security consideration: MITM #6

@Gigadoc2

Description

@Gigadoc2

Hi, since you mention using this project for remote disk unlocking, I wanted to make you aware of another security risk with this approach.

You already mention how an attacker can read the tailscale authentication key, but focus on their ability on making connections into your tailnet (which you mitigate with ACLs). However, at this point the attacker can also just impersonate the machine in question and wait for you to connect and enter the disk encryption secret, exfiltrating it (possibly transparently as they can modify the initramfs to not connect to your tailnet afterwards, so you won't even see two devices instead of one on the tailnet).

Plain SSH-based initramfs solutions have a similar problem, in that an attacker can read out the SSH host key (alternatively it is generated on the fly and you have no way to verify it).

One way to combat this is to involve the TPM in this: You could encrypt the tailscale authkey with the TPM and bind it to either measured boot or secure boot, but AFAIK Debian neither measures nor verifies the initramfs, so it would require more custom setup.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions