Client key replacement attack #40

Closed
opened 2026-03-29 09:53:37 +00:00 by Skipper · 0 comments
Owner

Suppose vault was created locally.
Useragent unseal the vault and disconnects / idles.

Malware could:

  1. Open database
  2. Rewrite pubkey of useragent
  3. Connect with it and pass authentication
  4. Do whatever

Proposed solutions:

  1. Ask client for unseal password after passing challenge
  2. Derive signing key from seal key inside the server and sign each pubkey entry with that key

First solution is more straightforward, but second is better in terms of UX.
useragent pubkey entry couldn't be verified before unseal, but this doesn't matter because vault is sealed either way and malicious client would need to know unseal password.

Suppose vault was created locally. Useragent unseal the vault and disconnects / idles. Malware could: 1. Open database 2. Rewrite pubkey of useragent 3. Connect with it and pass authentication 4. Do whatever Proposed solutions: 1. Ask client for unseal password after passing challenge 2. Derive signing key from seal key inside the server and sign each pubkey entry with that key First solution is more straightforward, but second is better in terms of UX. useragent pubkey entry couldn't be verified before unseal, but this doesn't matter because vault is sealed either way and malicious client would need to know unseal password.
Skipper added the
Difficulty
Medium
2
Priority
Critical
1
Kind
Security
labels 2026-03-29 09:53:37 +00:00
Sign in to join this conversation.
1 Participants
Notifications
Due Date
No due date set.
Dependencies

No dependencies set.

Reference: MarketTakers/arbiter#40