Gnuk Extractor

Simon Josefsson simon at josefsson.org
Tue May 28 10:16:42 CEST 2019


On Tue, 2019-04-30 at 19:45 +0100, Gary wrote:
> On 30/04/2019 16:45, Markus Reichelt wrote:
> > Hi,
> > 
> > today I found out about Gnuk Extractor:
> > 
> > https://github.com/rot42/gnuk-extractor
> > 
> > Quoting the site: "This tool can extract the PGP secret keys from
> > the
> > dumped firmware of a Gnuk token.  It was tested on a Nitrokey Start
> > and on a Gnuk Token made from a $2 ST-LINK/V2 clone."
> > 
> 
> This relies on your flash not being locked after uploading
> firmware/keys.
> 
> If you lock the device using "stm32flx lock 0" via an openocd telnet
> session, this should no longer be possible. Alternatively see the
> "Lock
> flash ROM" section of
> 
> https://www.gniibe.org/memo/development/gnuk/gnuk-installation-to-
> stm32-part-of-stm8s-discovery-kit.html

Does this apply to the FST-01, FST-01G, or FST-01SZ?  Does it depend on
how Gnuk was installed on the device?  How would I protect them?

/Simon
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 228 bytes
Desc: This is a digitally signed message part
URL: <https://lists.gnupg.org/pipermail/gnuk-users/attachments/20190528/0514c139/attachment.sig>


More information about the Gnuk-users mailing list