Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Misconceptions about passkeys #363

Open
timcappalli opened this issue Apr 27, 2024 · 4 comments
Open

Misconceptions about passkeys #363

timcappalli opened this issue Apr 27, 2024 · 4 comments

Comments

@timcappalli
Copy link
Member

timcappalli commented Apr 27, 2024

This issue is to aggregate misconceptions about passkeys which will be turned into a new page on passkeys.dev.

Original call for comments is here: https://www.linkedin.com/posts/timcappalli_passkeys-activity-7190040234418425856-iZIM

@TomCJones
Copy link

TomCJones commented Apr 27, 2024

passkey code requires approval by FIDO before it can be trusted by browsers or relying parties (i.e. - this is still FIDO and requires approval from FIDO)

@timcappalli
Copy link
Member Author

From LinkedIn: https://www.linkedin.com/feed/update/urn:li:activity:7190040234418425856?commentUrn=urn%3Ali%3Acomment%3A%28activity%3A7190040234418425856%2C7190049626404626433%29&dashCommentUrn=urn%3Ali%3Afsd_comment%3A%287190049626404626433%2Curn%3Ali%3Aactivity%3A7190040234418425856%29

I want to know what the underlying reasons why organizations like google, Microsoft, and Apple would be supportive of this ‘ecosystem’. Yes I’m conspiratory, mistrusting, and downright spectacle on their motives…. I also would require to know what safeguards are in place to ensure no government access is technically feasible - I demand paper warrants and no digital passkeys being transferred to law enforcement

image

@mimi89999
Copy link

I believe that one of the primary concerns is vendor lock in. It's not just a theoretical one. There doesn't seem to be any clear migration paths between keychains/vaults/password managers. It also doesn't seem easy to sync them between various OSes. Like what should I use if I have an iPhone and a Windows PC or an Android phone and a Linux PC with Firefox? Use a third party Passkey manager? Sure, but that's only supported on Android >= 14 and that's just 10% of Android devices.

Another concern is the unclear threat model that UV is trying to prevent against. Is it a user leaving their PC unlocked the threat? Even if UV is required to use the passkey, an attacker could just export the database. Should that require UV too? Most personal devices have only one account that might not require entering a password to gain admin/root access. An attacker could just dump the memory in that case. Should the password manager check whether UAC/sudo requires a password and refuse to run if it doesn't? What about the case where an attacker just deploys a RAT on the device?

@TomCJones
Copy link

TomCJones commented Apr 27, 2024

FIDO requires secure origin binding and TLS. But that is not accessible to all password managers, so a man-in-the-middle-attack only requires spoofing the origin to be part of the origin used for the key. (in other words, the FIDO binding does not seem to apply to what happens in the xxx-manager unless the xxx-manager is fully integrated into a browser that is FIDO compliant)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants