Skip to content

Commit 029b3f1

Browse files
authored
Merge pull request #314 from Ledger-Donjon/fix-genuineness
few fixes in genuineness article
2 parents d23bda0 + 76e0c87 commit 029b3f1

1 file changed

Lines changed: 6 additions & 6 deletions

File tree

src/content/threat-model/device-genuineness.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -3,21 +3,21 @@ layout: threat-model
33
title: Threat Model - Genuineness
44
---
55

6-
The ability to prove genuineness of the device is one of the main security features, from both hardware and firmware points of view. The hardware wallet must have a secure mechanism for this, and this is at the utmost importance. An attacker could otherwise have replaced a genuine device by a fake and backdoored one (through supply chain or evil maid attacks for instance). In this case, he would be able to access to the crypto assets afterwards.
6+
The ability to prove genuineness of the device's secure element is one of the main security features, from both hardware and firmware points of view. The hardware wallet must have a secure mechanism for this, and this is at the utmost importance. An attacker could otherwise have replaced a genuine device by a fake and backdoored one (through supply chain or evil maid attacks for instance). In this case, he would be able to access to the crypto assets afterwards.
77

88
Anti-tampering seals (or holographic seals) can give a false sense of security: not only are they trivial to clone, but it is also easy to open and close a package without damaging the seal.
99

1010
### Ledger Genuine Check
1111

12-
To prove the genuineness of Ledger signers, the following steps take place during the manufacturing (in secure environment):
13-
- Each Ledger signer generates a unique pair of keys: a public key and a private key. The private key is kept secret to the device only and cannot be exported nor retrieved.
14-
- The device sends its public key to Ledger’s HSM (Hardware Security Module). Our HSM signs the public key with the Ledger Root of Trust and sends it back to the device. This signed public key is the device’s attestation, which is stored inside the device.
12+
To prove the genuineness of Ledger signers secure elements, the following steps take place during the manufacturing (in secure environment):
13+
- Each Ledger signer secure element generates a unique pair of keys: a public key and a private key. The private key is kept secret to the device only and cannot be exported nor retrieved.
14+
- The device sends its public key to Ledger’s HSM (Hardware Security Module). Our HSM signs the public key with the Ledger Root of Trust and sends it back to the device. This signed public key is the device’s attestation, which is stored inside the secure element.
1515

16-
After manufacturing, this attestation allows the user (through Ledger Wallet) to verify if the device is genuine. The HSM sends a challenge which must be signed by the device and sent back along the attestation. This allows the HSM to verify the attestation and the challenge signature and eventually tell whether the device is genuine or not. More details can be found in [this blogpost](https://www.ledger.com/a-closer-look-into-ledger-security-the-root-of-trust/).
16+
After manufacturing, this attestation allows the user (through Ledger Wallet) to verify if the device's secure element is genuine. The HSM sends a challenge which must be signed by the secure element and sent back along the attestation. This allows the HSM to verify the attestation and the challenge signature and eventually tell whether the secure element is genuine or not. More details can be found in [this blogpost](https://www.ledger.com/a-closer-look-into-ledger-security-the-root-of-trust/).
1717

1818
### End User Physical Verification
1919

2020
Ledger signers are designed so users can check the integrity of their devices by themselves as detailed in [this support article](https://support.ledger.com/article/4404382029329-zd).
2121

2222

23-
> **Associated Threats**: An attack allowing to extract a device is a major threat to device genuineness security mechanism. Generally speaking, any attack allowing a non genuine device to pass the genuine check is a valid attack.
23+
> **Associated Threats**: An attack allowing to extract a device attestation is a major threat to the genuineness security mechanism. Generally speaking, any attack allowing a non genuine device to pass the genuine check is a valid attack.

0 commit comments

Comments
 (0)