# HG changeset patch # User Mychaela Falconia # Date 1615065257 0 # Node ID f756bafde7a9ddff25f61b14e24aefafb39e4133 # Parent 123dc7370581380ccf925e6c7a33b463ac9e6748 doc/GrcardSIM2-security-model: new grcard2-set-adm5 command diff -r 123dc7370581 -r f756bafde7a9 doc/GrcardSIM2-security-model --- a/doc/GrcardSIM2-security-model Sat Mar 06 21:11:21 2021 +0000 +++ b/doc/GrcardSIM2-security-model Sat Mar 06 21:14:17 2021 +0000 @@ -45,8 +45,8 @@ verify-ext 11 XXXXXXXX # authenticate as ADM11, decimal format verify-hex 11 xxxxxxxxxxxxxxxx # authenticate as ADM11, arbitrary hex format -grcard2-set-adm XXXXXXXX # set new ADM5, decimal format -grcard2-set-adm-hex xxxxxxxxxxxxxxxx # set new ADM5, arbitrary hex format +grcard2-set-adm5 XXXXXXXX # set new ADM5, decimal format +grcard2-set-adm5-hex xxxxxxxxxxxxxxxx # set new ADM5, arbitrary hex format grcard2-set-super XXXXXXXX # set new ADM11, decimal format grcard2-set-super-hex xxxxxxxxxxxxxxxx # set new ADM11, arbitrary hex format @@ -91,7 +91,7 @@ grcard2-set-pin2 6666 grcard2-set-puk1 00099933 grcard2-set-puk2 00099944 -grcard2-set-adm 55501234 +grcard2-set-adm5 55501234 For as long as you keep the ADM11 secret code at its default of 88888888, there is no PIN security - even if you set PIN1/PIN2/PUK1/PUK2 to your own secrets, @@ -123,7 +123,7 @@ * If you enter ADM5 incorrectly 3 times in a row, you unrecoverably lose the ability to use ADM5 ever again - even if you successfully authenticate with - ADM11 and reset ADM5 with grcard2-set-adm, the attempt counter does not get + ADM11 and reset ADM5 with grcard2-set-adm5, the attempt counter does not get reset, and ADM5 remains blocked. * If you enter standard PUK1 or PUK2 incorrectly 10 times in a row, it is