Replies: 7 comments 4 replies
-
So my take on this is that you should never use any kind of password / passkey store integrated into a platform like apple or android. The problem is that at that point, they simply own your identity anyway, can mess it up (like he described), or simply steal it. At that point, it is not better at all and something like bitwarden, which I use since many years now, will always be the safer alternative.
Tbh, it is still ike this for me today... with Firefox.
This alone is the reason why I don't even have Google Chrome installed on my OS for testing. When I want to check support there, I am using chromium and that's it, same engine underneath. The dropped support for device attestation is not really problematic for Rauthy, but I totally agree from a business standpoint. And as always, Google faked it, said they were the good guys and are doing their own stuff under the hood with the mentioned feature flags. This is happening all the time and is the reason why the FedCM will be active with an experimental feature flag only. In the beginning, Rauthy had its own authenticator App and I think with v0.3 of
This is one of the reasons why I created Nioca. I don't have the time to push this further right now, because I have too much left for Rauthy currently, but I am using mTLS certificates and all that stuff a lot as well. They even work for user authentication really nicely and are so much safer than cookies and all that stuff. The only problem is the UX. It's not too easy for "normal people" to get them running. Just as a side note: I took a quick look at a Rauthy instance which is running since quite a long time now. It currently has ~150 users and expect for very few, all of them are using password only accounts. People just don't care. They want their normal, most probably used everywhere default password, and that's it, sadly. |
Beta Was this translation helpful? Give feedback.
-
Only on linux. Firefox on mac or windows both use the platform api rather than the inbuilt CTAP2 only authenticator-rs.
They specifically try to avoid "activating" the security key in a lot of flows too.
The broader issue is that google can just veto improvements to webauthn if they don't like them, since FF is asleep at the wheel.
Most of the Kanidm users seem to be going toward our passkey services, but we also go to extreme lengths in webauthn-rs and Kanidm to avoid the issues that plague passkeys generally, even if we can't resolve all of them. But we also plan to go toward mtls and PIV as you did with nioca. |
Beta Was this translation helpful? Give feedback.
-
Okay, got it. I guess chromium does the same then (on Linux), right? Because it behaves the exact same way. Since I am a Linux only user, this explains it. It's a shame that they always try to force you into their own stuff and you have to put in more work just to get what you want. But I guess it will always be like that. I stopped self-hosting E-Mail servers as well because of annoying behavior of "the big ones".
I guess technically everything is working, they just don't want to. I had high hopes when they finally announced the support last September, only to find out that it's just partial and does not really solve my issue.
Which will not change as long as most people are using their products anyway, sadly.
I really like the webauthn-rs crate, you have done great work with it. Thanks a lot! I planned on integrating Nioca with Rauthy so you could optionally have TLS and SSH certificates as well from one place as opt-in, but its a lot of work to do all of that in your free time. Btw I didn't know about your blog before, but I will for sure continuing to read it. I like the content a lot. |
Beta Was this translation helpful? Give feedback.
-
Nope, Chrome and Chromium use their own internal drivers on all platforms.
Yeah. It was contributed by someone from my workplace and mozilla dragged their feet to review it for about a year. very sad. :(
Thank you. That means a lot to me today especially <3 And I'm very happy to see my work being used to enable people like yourself to create new and interesting IDPs. So well done with Rauthy!
I'm thinking about similar in Kanidm, I'm looking heavily into the rust-crypto ecosystem now. I have already worked with the rust TPM (tss-esapi) and pkcs11 authors on that front to pursue hardware bound keys, and I've just started with PIV. I really want to do this "right" by hardware binding keys :)
Thanks! Do you have a blog of your own? |
Beta Was this translation helpful? Give feedback.
-
Out of curiosity, I booted up an older windows machine I keep around for testing. I tested with Firefox and Chrome using my local Rauthy instance. Both browsers behave in the exact same way as they do on Linux. I enter my E-Mail and when I get the webauthn request, I immediately see the "Enter PIN" window without anything in between. There is no difference in behavior. Am I missing something?
Thank you! :)
Yes I have HSM keys on the TODO for Nioca since a long time, but it does what it should do now and all other things will come when I have more free time (haha, good one... :D ). Currently it handles software CA's only, but at least they are strongly encrypted and after a fresh start, you have to unseal it kind of like the hasicorp vault does it. From that point on, they will only be kept in-memory and never written to disk / database. So I would say it is as secure as it can be with non-HSM keys. Or do you mean hardware keys on the client side? So basically
.. ?
No I don't. Every time I think about creating one, I end up doing something else from my very long TODO list of projects and ideas. |
Beta Was this translation helpful? Give feedback.
-
Does the machine have bluetooth? TPM? I think that affects things.
Both, TPM/HSM for the CA server side, and yubikeys for the client :) I wrote a yubikey piv manager tool on a recent flight that I need to publish. I've just been reading the mozilla CA requirements to understand what I need to do to make a "good" CA too. |
Beta Was this translation helpful? Give feedback.
-
Nothing like that. And it does have a local account, not the Microsoft one. Probably something like that then. -.-
mTLS in the browser with certs from a yubikey sounds so awesome. I have plans to go on with my Nioca project as well as soon as I have more time. |
Beta Was this translation helpful? Give feedback.
-
Since Rauthy implements passkeys - and afaik uses
webauthn-rs
to do so - it seemed fitting to share today’s post by @Firstyearhttps://fy.blackhats.net.au/blog/2024-04-26-passkeys-a-shattered-dream/
I generally agree with this outlook. Passkeys are by no means useless, but I doubt their widespread applicability in consumer applications. They seem more fitting in the context of specific teams.
Beta Was this translation helpful? Give feedback.
All reactions