comparison doc/GrcardSIM2-security-model @ 190:f756bafde7a9

doc/GrcardSIM2-security-model: new grcard2-set-adm5 command
author Mychaela Falconia <falcon@freecalypso.org>
date Sat, 06 Mar 2021 21:14:17 +0000
parents c925f7808285
children 7c24ae2ca648
comparison
equal deleted inserted replaced
189:123dc7370581 190:f756bafde7a9
43 verify-hex 5 xxxxxxxxxxxxxxxx # authenticate as ADM5, arbitrary hex format 43 verify-hex 5 xxxxxxxxxxxxxxxx # authenticate as ADM5, arbitrary hex format
44 44
45 verify-ext 11 XXXXXXXX # authenticate as ADM11, decimal format 45 verify-ext 11 XXXXXXXX # authenticate as ADM11, decimal format
46 verify-hex 11 xxxxxxxxxxxxxxxx # authenticate as ADM11, arbitrary hex format 46 verify-hex 11 xxxxxxxxxxxxxxxx # authenticate as ADM11, arbitrary hex format
47 47
48 grcard2-set-adm XXXXXXXX # set new ADM5, decimal format 48 grcard2-set-adm5 XXXXXXXX # set new ADM5, decimal format
49 grcard2-set-adm-hex xxxxxxxxxxxxxxxx # set new ADM5, arbitrary hex format 49 grcard2-set-adm5-hex xxxxxxxxxxxxxxxx # set new ADM5, arbitrary hex format
50 50
51 grcard2-set-super XXXXXXXX # set new ADM11, decimal format 51 grcard2-set-super XXXXXXXX # set new ADM11, decimal format
52 grcard2-set-super-hex xxxxxxxxxxxxxxxx # set new ADM11, arbitrary hex format 52 grcard2-set-super-hex xxxxxxxxxxxxxxxx # set new ADM11, arbitrary hex format
53 53
54 Setting PIN1/PIN2/PUK1/PUK2 54 Setting PIN1/PIN2/PUK1/PUK2
89 89
90 grcard2-set-pin1 1234 90 grcard2-set-pin1 1234
91 grcard2-set-pin2 6666 91 grcard2-set-pin2 6666
92 grcard2-set-puk1 00099933 92 grcard2-set-puk1 00099933
93 grcard2-set-puk2 00099944 93 grcard2-set-puk2 00099944
94 grcard2-set-adm 55501234 94 grcard2-set-adm5 55501234
95 95
96 For as long as you keep the ADM11 secret code at its default of 88888888, there 96 For as long as you keep the ADM11 secret code at its default of 88888888, there
97 is no PIN security - even if you set PIN1/PIN2/PUK1/PUK2 to your own secrets, 97 is no PIN security - even if you set PIN1/PIN2/PUK1/PUK2 to your own secrets,
98 anyone can authenticate with the unchanged default ADM11 and then freely reset 98 anyone can authenticate with the unchanged default ADM11 and then freely reset
99 all lower PINs. However, in the Mother's opinion there is very little need for 99 all lower PINs. However, in the Mother's opinion there is very little need for
121 possibility of recovery - this bricking mode is generally expected, there can 121 possibility of recovery - this bricking mode is generally expected, there can
122 be no other way. 122 be no other way.
123 123
124 * If you enter ADM5 incorrectly 3 times in a row, you unrecoverably lose the 124 * If you enter ADM5 incorrectly 3 times in a row, you unrecoverably lose the
125 ability to use ADM5 ever again - even if you successfully authenticate with 125 ability to use ADM5 ever again - even if you successfully authenticate with
126 ADM11 and reset ADM5 with grcard2-set-adm, the attempt counter does not get 126 ADM11 and reset ADM5 with grcard2-set-adm5, the attempt counter does not get
127 reset, and ADM5 remains blocked. 127 reset, and ADM5 remains blocked.
128 128
129 * If you enter standard PUK1 or PUK2 incorrectly 10 times in a row, it is 129 * If you enter standard PUK1 or PUK2 incorrectly 10 times in a row, it is
130 similarly blocked beyond recovery, with no help from ADM5 or ADM11 - 130 similarly blocked beyond recovery, with no help from ADM5 or ADM11 -
131 grcard2-set-puk[12] commands reset the secret code, but not the associated 131 grcard2-set-puk[12] commands reset the secret code, but not the associated