Follow Slashdot blog updates by subscribing to our blog RSS feed

 



Forgot your password?
typodupeerror

Comment Re: Passkeys don't remove the need for 2FA! (Score 1) 52

Itâ(TM)s interesting since the creators tend to think thatâ(TM)s enough. The server is able to verify (and require) through user verification that a challenge was presented and answered correctly by the user. I assume that doesnâ(TM)t protect from the theoretical device that always returns yes, I do not know how they deal with the potential for nefarious authentication devices other than advising people not to use them. I am not a fan of the synced keys that are common with cell phones since it weakens the âno direct access to key materialâ(TM) design and makes key theft more of a potential problem.

Comment Re:Yeah, No Thanks! (Score 1) 230

That's a good point. I am leery of software solutions like phones or password managers where the keys are synchronized (therefore key material is available "somewhere") and potentially vulnerable to yet-unknown attacks. More trusting of the hardware tokens, after some number of failed pin attempts they clear the data. No doubt there are vulnerabilities in their firmware too that will someday be discovered but I'm not a big target, I'll notice if someone steals my keys.

Comment Re:A Passkey is pretty much a client cert... (Score 1) 230

It's not really confusion, they are using FIDO2 with a nicer name and the FIDO2 tokens can store them. A Yubikey 5 can hold 25 of them. This is a change from MFA where the Yubikey generates the response on the fly so there is no limit.

The primary user-visible difference between Passkeys and MFA, is the passwordless "Passkey" implementation locks the keys and the MFA does not. Apple's keychain for example stores both MFA and passwordless certificates as "Passkeys". It can also sync them between devices, although this is worse for security, I think Windows Hello can probably sync them too.

Comment Re:Offering, not forcing (Score 1) 230

Currently Firefox ONLY supports hardware tokens, and Google throws that nondescript error if you try to set it up without the token plugged in first. If your token is plugged in it should prompt for the pin and then store the passkey, however Firefox does not prompt for the pin every time so it only mostly works. Other browsers provide more options like a QR code you can use with a phone, and Firefox is working on them.

Slashdot Top Deals

Do not underestimate the value of print statements for debugging. Don't have aesthetic convulsions when using them, either.

Working...