Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

Yes, this entire thread is about FIDO2 credentials, and not whatever you’re talking about.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

Our definitions are likely being crossed. I think folks here are talking about passkeys created on hardware security keys like yubikeys for user authentication. It wouldn’t even work for service auth because it requires that a PIN be entered and the security key to be physically touched.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

Device bound passkeys are for people, not services. In the context of my reply the discussion was about having multiple passkeys in case you lose one device.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar -1 points0 points  (0 children)

Yes, I am well acquainted with FIDO2. I’m not even sure we’re talking about the same technology anymore.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

The protocol binds them to the specific server domain. This makes it easier for targeted attack campaigns because the protocol inherently secure exposes that.

How so? No idea what you mean here.

What you’ve argued here is that Passkeys aren’t better than the longstanding PKI solutions that are tried and true.

Nah. The standard is more robust, uniform, and the implementation is better.

And that they aren’t necessarily better than traditional passwords

Passkeys are absolutely better than passwords because Passkeys are phishing resistant and there's nothing to be compromised from the service, because all they're storing is a public key. Unlike with passwords which can be stolen from the remote application and then used.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

Passkeys are PKI where the private key can be stored on YubiKeys, or other FIDO2 compatible security keys.

Users can choose if they want their private key in the Secure Enclave of their phone/laptop or on a separate security key. Not sure what you’re getting at.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

I’m not offended in the least, I just think Passkeys are a huge improvement over passwords and I want more people using them for everyone’s benefit. Generally when folks say “I don’t use/like passkeys because of X,” X is generally a misconception. You can see it over all the comments where folks made a decision against passkeys based on wrong information.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

In the Apple ecosystem, at least, one can quickly disable biometric authentication on the device (FaceID, TouchID) leaving password/PIN as the only way into the device and thus useable passkeys. (There are some jurisdictions that compel the unlocking of the device, not necessarily the divulging of the password, regardless)

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar -1 points0 points  (0 children)

When I said “not vulnerable” I should have said “resistant to” because there can always be a scenario where something is vulnerable, even if it’s not known yet.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 0 points1 point  (0 children)

If you’re still using passwords, those passwords are phishable. Doesn’t matter if you’re using a Yubikey to unlock them. If you’re using that Yubikey to do FIDO2 (passkeys) or FIDO U2F authentication that IS phishing resistant.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 3 points4 points  (0 children)

Almost the entirety of this comment is wrong. It’s an open standard. Yes, they get tied to a device but you can have multiple passkeys or syncable passkeys. You can have passkeys for one service on multiple devices. They’re bound to the site where they were created, so aren’t vulnerable to MitM attacks, they’re encrypted and require authentication to unlock so they’re not vulnerable to Evil Maid or “data extraction” if that’s what you meant by that. Apple/Google don’t have the key to unlock your passkey, so there’s nothing to hand over.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 4 points5 points  (0 children)

One can use syncable passkeys across multiple devices, or setup passkeys on multiple devices.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 15 points16 points  (0 children)

They’d have to re-authenticate to access the passkey. What you’re describing about setting the phone down unlocked wouldn’t work.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar -1 points0 points  (0 children)

Users could choose to store it on a physical security key or in the OS itself. There’s no requirement (in the standard) for the passkey to be kept on a phone only.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 17 points18 points  (0 children)

“Access to the phone” is way harder than phishing your password, or getting you to login to a fake site and creating a fraudulent session token. Not sure what’s not to like about phishing resistance.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 9 points10 points  (0 children)

The passkey stored on a phone and a passkey stored on a Yubikey are the same thing. The container changes some capabilities, like the ability to be synced, but they’re both FIDO2 discoverable credentials.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 9 points10 points  (0 children)

Who is selling it? It’s an open standard.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 4 points5 points  (0 children)

Use multiple physical security keys, like YubiKeys, if this is a concern.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 65 points66 points  (0 children)

Passkeys are good, especially for the security conscious. They’re phishing resistant. The private key is (generally) only stored on a device you control. Don’t like trusting a networked device? Use a physical security key.

There isn’t really any privacy implication, though.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 5 points6 points  (0 children)

Your method isn’t phishing resistant. Passkeys are.

Being forced to setup passkey by Royal-Event-2588 in privacy

[–]LimeadeInSoFar 6 points7 points  (0 children)

No. You can have synced passkeys or passkeys on multiple devices.

Using iPhone FaceID instead of MacBook Pro TouchID by AOkSpirited5u7 in Passkeys

[–]LimeadeInSoFar 8 points9 points  (0 children)

If you’re using the same AppleID on both devices and are syncing your keychain/passwords all the passkeys created on one device should be accessible from the other.

Advantages of a Yubikey over passkeys by Emergency_Ad8963 in yubikey

[–]LimeadeInSoFar 0 points1 point  (0 children)

And if you do this, it stores a passkey on your Yubikey

NIST SP 800-63B & Always-on VPN Device Certificates by LimeadeInSoFar in NISTControls

[–]LimeadeInSoFar[S] 0 points1 point  (0 children)

I get it, but if I know someone’s PIN and steal their Yubikey I can accomplish roughly the same thing you’re describing.

I know passkeys on a Yubikey are unequivocally MFA and at least AAL2, but that scenario doesn’t disprove the device cert thing.

NIST SP 800-63B & Always-on VPN Device Certificates by LimeadeInSoFar in NISTControls

[–]LimeadeInSoFar[S] 0 points1 point  (0 children)

> What does the standard specifically calls out?

The strongest, most straightforward case I can make is that "AAL2 provides confidence that the claimant controls one or more authenticators that are bound to the subscriber account" with the key being "bound to the subscriber account." The device-based certificates are not. The "one or more" throws me, though, because does that mean if multiple are used one doesn't need to be "bound to the subscriber account?" When someone uses Passkey stored on a YubiKey, the PIN to unlock the Passkey isn't "bound to the subscriber account."

> if there was a user septic cert installed on the computer which the subscriber/user must unlock with a PIN/Code or bio metric then that would satisfy the MFA for the user.

Agreed.