-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
"convenient reauthentication UX" vs. "phishing-resistant 2nd factor" #3
Comments
Feel free to submit a PR to the wording for consideration. |
Created a new PR on this: |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Naming of "convenient reauthentication UX" vs. "phishing-resistant 2nd
factor" is misleading and should be changed, to start with.
The naming is used to contrast the difference between Platform and
Roaming authenticators. "phishing-resistant" is used for roaming
authenticators.
Here is the problem.
When you say roaming authenticators are "phishing-resistant", it gives an
implication that platform authenticators are not. This is very
misleading.
The difference of platform and roaming authenticators cannot/should not
be characterized by being resistant to phishing or not.
If you register a platform authenticator in addition to passwords,
allowing the OR model and leaving passwords alive, then it is not
phishing resistant.
This is the same for security keys.
Thus the being phishing resistant is not due to being platform or
roaming, but how you logically put it with respect to passwords, i.e., OR
or AND. If you use the AND structure, both platform and roaming
authenticators are phishing resistant. If you use OR structure, neither
platform nor roaming authenticators are phishing resistant.
More important issue that seems to be missing when characterizing platform
and roaming authenticator is "locking out" users from account.
If you use AND structure for platform authenticator and if the user has
not yet registered an additional roaming authenticator, the user is locked
out where the user has no other way to log in without the platform
authenticator. So if the user loses the platform authenticator, RP must
take them into friction of account recovery operation.
If this is the case for roaming authenticator, user is not locked out.
So, as Shane's "How to FIDO" POC is implementing,
https://howtofido.securitypoc.com/
This paper should stress the following points, instead of being phishing
resistant or not, in relation to platform authenticators.
authenticator; introduce the OR and AND models and discuss phishing
resistance w.r.t. the two models.
AND model until RP knows that the user has registered at least one
roaming authenticator, so that lock out will not happen. Until then,
recommend staying with the OR model (users can log in with password or FIDO), with a caution
that it may not be phishing resistant but it is for convenience to help users due to, e.g., use of built in biometrics.
The text was updated successfully, but these errors were encountered: