Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Provide an explicit way to opt out of multi-device syncing/backups #1714

Closed
lxgr opened this issue Mar 30, 2022 · 27 comments
Closed

Provide an explicit way to opt out of multi-device syncing/backups #1714

lxgr opened this issue Mar 30, 2022 · 27 comments

Comments

@lxgr
Copy link

lxgr commented Mar 30, 2022

Sorry in advance if I missed the most recent state of the discussion on multi-device credentials, but if I understand the current proposals correctly,

There might be a roundabout way to accomplish this (e.g. through always requesting a device-bound key per #1658), but am I understanding it correctly that there will be no "easy" way to do so, other than effectively only relying on device-bound keys and ignoring/discarding the "actual" key?

Is this intentional? At least for some scenarios, account takeover/phishing might be a large enough concern that RPs might decide to not accept certain (probably mostly host-based) authenticator models' attestation keys anymore for their service, even though they might otherwise be satisfied with the authenticator's security policies and implementation.

@serianox
Copy link

Hi @lxgr,

Yes, your understanding of multi-device credentials is correct. RP that do care about veting device syncing can currently opt-out with device attestation.

There won't be an explicit way for an RP to indicate that it wants to opt out of backups/multi-device syncing.

Since this is not UX friendly, because the error happen after te registration, I assume that we will soon add another preference selector for registration to specifically request devices without syncing, or an option to generate a key that will never be synced.

@ve7jtb
Copy link
Contributor

ve7jtb commented Mar 30, 2022

I believe that so far the WG has rejected all proposals to have a relying party opt out signal of multi-device credentials.

The RP needs to make a decision if their account recovery is stronger than sending a password reset email to the person's apple or google account, then they can perform some sort of stepup to be able to accept the credential if the authenticator is unknown (there is still an open question, if platform authenticators will provide attestations) or the credential is multi-device.

The RP can cookie the browser and take that plus the multi-device credential to authenticate from the same browser, or if the cookie is not available due to it being a new device they can perform stepup.(Authenticate with a password, phone call, or roaming single device authenticator.)

I think the idea is that RP should not reject multi-device credentials, but can use a cookie, DPK extension(when available) or other factors to step up the authentication to the appropriate level.

It will be more work for some relying parties, I agree. This is pushing them towards taking a risk-based approach.

@lxgr
Copy link
Author

lxgr commented Mar 30, 2022

This might unfortunately disqualify the use of platform authenticators in areas where two-factor authentication is explicitly mandated by a regulator, e.g. the EEA in the domain of secure cardholder authentication. A risk decision such as this:

The RP needs to make a decision if their account recovery is stronger than sending a password reset email to the person's apple or google account

is explicitly prohibited by law in some scenarios there (and password reset emails are not an allowable alternative).

The RP can cookie the browser

Do we really want to encourage the use of cookies as a form of device binding? If anything, RPs should be using DPKs for that use case, right?

On a related note, as a WebAuthN user, I explicitly don't want some of my credentials to be synced to my keychain under any circumstances (in particular the ones relating to financial transaction authorizations). Maybe there should be a parallel discussion around whether users should be provided with a way to opt out of key backups/syncing on a per-key basis? This is a different concern than the one of RPs opting out, though.

@timcappalli
Copy link
Member

timcappalli commented Mar 30, 2022

@ve7jtb

The RP needs to make a decision if their account recovery is stronger than sending a password reset email to the person's apple or google account, then they can perform some sort of stepup to be able to accept the credential if the authenticator is unknown (there is still an open question, if platform authenticators will provide attestations) or the credential is multi-device.

It should not be assumed that simply using a reset email for a platform account will grant access to multi-device credentials.

@lxgr

On a related note, as a WebAuthN user, I explicitly don't want some of my credentials to be synced to my keychain under any circumstances (in particular the ones relating to financial transaction authorizations). Maybe there should be a parallel discussion around whether users should be provided with a way to opt out of key backups/syncing on a per-key basis? This is a different concern than the one of RPs opting out, though.

This is an implementation discussion and would not be part of the WebAuthn specification.

@lxgr
Copy link
Author

lxgr commented Mar 30, 2022

It should not be assumed that simply using a reset email for a platform account will grant access to multi-device credentials.

I read @ve7jtb's comment as implying that multi-device credentials only have to be better than the most common flow of email access recovery, not as a way of resetting access to an authenticator platform account holding multi-device credentials, but I even disagree on that point:

While this is arguably the most common scenario, as it is, many of the existing platform and roaming authenticators provide security guarantees significantly exceeding that. This is something that can enable new use cases, e.g. Secure Payment Confirmation.

It doesn't seem wise to implicitly roll these security properties back, in the interest of usability, without at least offering a way for RPs to opt out of it. (I do understand that making multi-device credentials opt-in, rather than opt-out, could hurt adoption.)

This is an implementation discussion and would not be part of the WebAuthn specification.

Got it, thank you @timcappalli ! So if this isn't something the WebAuthN specification would cover, is there any adjacent specification, or is it completely up to implementors?

@timcappalli
Copy link
Member

Got it, thank you @timcappalli ! So if this isn't something the WebAuthN specification would cover, is there any adjacent specification, or is it completely up to implementors?

No, it is an authenticator implementation decision.

@ve7jtb
Copy link
Contributor

ve7jtb commented Mar 30, 2022

I was making the point that unless the RP is doing something better than email password reset now they have no reason to reject multi-device credentials.

It may be that depending on implementation they may be significantly more secure, but I think we can agree that they won't be any less secure.

We should concentrate on how to uplift multi-device credentials if required and not focus on rejecting them.

My comment about cookies is out of practicality. More RP are going to be able to do that than reimplement their servers to support DPK.

DPK is a better option when available, but there is no guarantee that it will be available on all authenticators.

Cookies are sort of low tech but work today as a way to know if the device/browser has previously authenticated with a given credentialID. RP who are concerned should probably start there.

I don't know how financial institutions are going to deal with the change. perhaps on Android they will only create non discoverable credentials to get around syncing, though that is not part of the spec, and will not work with the updated non modal UX.

It is probably best for them to plan to use DPK as a signal when they can in SPC.

@lxgr
Copy link
Author

lxgr commented Mar 30, 2022

unless the RP is doing something better than email password reset now they have no reason to reject multi-device credentials.

Every financial institution in the EU is doing something better than email password resets, as is required by regulations.

We should concentrate on how to uplift multi-device credentials if required and not focus on rejecting them.

Rejecting multi-device credentials will be possible, either via #1692 or more generally via requiring attestation and blocking all implementations known to sync.

The suggestion here is to offer RPs an option to indicate a preference for (not) syncing. This would allow implementations to invoke alternative behavior without requiring user intervention (for implementations that make sync capability a user choice via opt-in or opt-out, per credential or globally).

@serianox
Copy link

The suggestion here is to offer RPs an option to indicate a preference for (not) syncing. This would allow implementations to invoke alternative behavior without requiring user intervention (for implementations that make sync capability a user choice via opt-in or opt-out, per credential or globally).

As mentioned, some institutions are required by regulations to properly implement identity proofing. This extends to account recovery, and device syncing.

Those institutions will either:

  • manually vet each vendor's implementation of device syncing, and accept them if they follow the required regulations,
  • or reject any device sync mechanism that do not meet regulations, or all because they don't want to invest too much time.

My guess is that the implementation considerations that will be provided will be to either:

  • go to a locked ecosystem where each vendor is vetted individually,
  • or go to an open ecosystem where every sufficiently certified device is allowed, and DPK is always requested to trigger an explicit device sync flow: either reject the attempt because a new device is detected, or trigger the explicit enrolment of the new device through its DPK.

@lxgr
Copy link
Author

lxgr commented Mar 30, 2022

or go to an open ecosystem where every sufficiently certified device is allowed, and DPK is always requested to trigger an explicit device sync flow: either reject the attempt because a new device is detected, or trigger the explicit enrolment of the new device through its DPK.

This would indeed be a way to enforce the current, non-syncing behavior if I understand it correctly.

Given that DPK is accepted as proposed, this proposal is then mostly syntactic sugar on the RP/API consumer side.

On the implementor side, it still seems useful to have, e.g. for UX purposes (as there is no point in uploading and showing a credential in a user's syncing account and downloading it to their other devices, if it can effectively never be used anyway).

@timcappalli
Copy link
Member

The DPK is a device-bound key for use with the multi-device credential as a device signal for risk assessment. It does not replace the multi-device credential.

@lxgr
Copy link
Author

lxgr commented Mar 30, 2022

The DPK is a device-bound key for use with the multi-device credential as a device signal for risk assessment. It does not replace the multi-device credential.

RPs are free to ignore it and only use the DPK for all authentication decisions (and out-of-band mechanisms for new device registration) though, right?

Effectively, this would be a complicated and (for implementations) intransparent way of opting out of syncing.

@timcappalli
Copy link
Member

RPs can do anything they choose. That is not the intended usage though and wouldn't be covered in the specification.

@lxgr
Copy link
Author

lxgr commented Mar 30, 2022

I understand that it might not be the intended usage, but I'm hoping to raise some awareness that it still might become a somewhat common pattern due to the regulatory and risk constraints outlined above.

If that assumption holds true, migrating from implicit to explicit RP behavior (where implementations would be receiving the "we will never use the synced credential" signal) might be hard or impossible.

@timcappalli
Copy link
Member

I'd recommend discussing in the WebAuthn Community Adoption Group.

@emlun
Copy link
Member

emlun commented Mar 31, 2022

[...] am I understanding it correctly that there will be no "easy" way to do so [...]

As of now, yes, that is correct. The general position of the WG has been that we want to avoid fragmenting the ecosystem, so we're wary of adding more authenticator selection constraints. There was recent discussion around this in #1688 too. See also: #461, #445, #441, #396.

This might unfortunately disqualify the use of platform authenticators in areas where two-factor authentication is explicitly mandated by a regulator, [...]

Rejecting multi-device credentials will be possible, either via #1692 or more generally via requiring attestation and blocking all implementations known to sync.
Yes - especially in the context of regulatory compliance, RPs cannot rely on the client and authenticator to respect the RP's wishes without proof, so attestation is really the only solution for that case. An opt-out option could of course help optimize UX, but at the moment we feel the fragmentation risks outweigh the benefits, as discussed in #1688.

The suggestion here is to offer RPs an option to indicate a preference for (not) syncing. This would allow implementations to invoke alternative behavior without requiring user intervention [...]

The "feature toggle" angle is interesting, though. We have this for user verification and discoverable keys, so it's not categorically out of the question. Maybe the fact that we're about to allocate authenticator data flags for this is a hint that it's important enough to warrant a corresponding feature toggle parameter.

But still, I feel like it's too impactful for how blunt it is. Even if it only disables syncing rather than rejecting the authenticator outright, that's still quite intrusive. It could easily be misunderstood as a "make it more secure" parameter, which is not at all true. We don't want RPs to use that without carefully considering the implications, because that will get users locked out and driven away from using WebAuthn at all because of the hassle (making them less secure in the end). And again, attestation already provides RPs most of the same powers but in a form that's also verifiable.

@lxgr
Copy link
Author

lxgr commented Mar 31, 2022

attestation is really the only solution for that case.
[...]
And again, attestation already provides RPs most of the same powers but in a form that's also verifiable.

Sorry, to clarify – are you suggesting attestation as a way of opting out of syncing, or attestation and subsequently (upon learning that it's a syncing implementation) not using a given authenticator at all? As far as I understand, the former is only a temporary side effect of attestation that will likely go away once the "backup indicator" is specified and implemented, right?

It could easily be misunderstood as a "make it more secure" parameter, which is not at all true.

I do share that concern, as the standard mode of operation of audit-heavy organizations/industries is to just disable all options that aren't explicitly required in the interest of security, and ones that do actually impact it somewhat doubly so.

We don't want RPs to use that without carefully considering the implications, because that will get users locked out and driven away from using WebAuthn at all because of the hassle (making them less secure in the end).

Agreed – but the other possibility here is some organizations/industries never adopting WebAuthN and sticking with proprietary app-based solutions (or worse, like SMS-OTP).

@emlun
Copy link
Member

emlun commented Mar 31, 2022

Sorry, to clarify – are you suggesting attestation as a way of opting out of syncing, or attestation and subsequently (upon learning that it's a syncing implementation) not using a given authenticator at all?

Sorry, I mean that RPs can "opt out" of credential syncing by requiring attestation and rejecting any authenticator not known to not sync (sorry for the multiple negations, they are significant). It doesn't allow for simply disabling a sync feature, though (thus "most of the same powers"). It's a roundabout way, but it's the only way - even with the authenticator data flags - if you need to strictly forbid syncing. You still need a valid attestation from an authenticator you trust, because otherwise the authenticator can just lie about the flags. Deny-lists (where you accept anything not explicitly on the list, even if unknown) don't work for enforcing a strict attestation policy, only allow-lists do.

As far as I understand, the former is only a temporary side effect of attestation that will likely go away once the "backup indicator" is specified and implemented, right?

Yes, there's nothing that intrinsically prevents syncing authenticators from implementing attestation. For example the "apple" attestation statement format was added specifically to support Apple's platform authenticators, which have now announced plans to introduce syncing. And yes, it's also true that an authenticator that currently supports attestation but not syncing could add a sync feature later. It would be up to that authenticator vendor and any relevant certification authorities to decide if that change needs to be reflected by a change in AAGUID, attestation certificate or the like.

@ve7jtb
Copy link
Contributor

ve7jtb commented Mar 31, 2022

As far as I understand, the former is only a temporary side effect of attestation that will likely go away once the "backup indicator" is specified and implemented, right?

The backup indicator is mostly for RP that want syncing. In that case it can be used without attestation.

If you want to use it for security eg deny syncing it can only be trusted in the context of an attestation.
If an attacker compromises the account and can load the credentials into an authenticator it controls then they would just not set the flag.
That would not be easy but potentially possible it will depend on the sync fabric security eg can the credentials only be restored to a TPM in a trusted authenticator.

In some cases where an authenticator supports both types of credentials and provides an attestation, the indicator can be trusted to differentiate between the two kinds of credentials. I believe that backup vs not backed up would be under user control not RP.

This may get in the way of some of the higher security use cases, though likely no more than platform authenticators not having CC/CSPN/FIPS certification minimum pin length and retry limits for EIDAS etc.

@dwaite
Copy link
Contributor

dwaite commented Apr 3, 2022

The DPK is a device-bound key for use with the multi-device credential as a device signal for risk assessment. It does not replace the multi-device credential.

RPs are free to ignore it and only use the DPK for all authentication decisions (and out-of-band mechanisms for new device registration) though, right?

Effectively, this would be a complicated and (for implementations) intransparent way of opting out of syncing.

However, registrations would still be synced. If you as an RP do a new registration when you see a new DPK, you either:

  • Are overwriting the existing credential and most likely destroying any existing DPK on all other devices. This will make it so the user must register again next time they use a prior device.
  • Are creating multiple authentication choices for the site, most likely presented to the user by the platform in a list or drop-down, with at most one of the listed options leading to success at any given time.

To fix these problems, you need to

  1. accept and retain the received assertion
  2. notice the new DPK
  3. do any additional authentication/proofing/fraud deflection steps
  4. rather than do a new credential creation, you associate the new DPK with the account and with the original credential.

@Firstyear
Copy link
Contributor

Sorry, I mean that RPs can "opt out" of credential syncing by requiring attestation and rejecting any authenticator not known to not sync (sorry for the multiple negations, they are significant). It doesn't allow for simply disabling a sync feature, though (thus "most of the same powers"). It's a roundabout way, but it's the only way - even with the authenticator data flags - if you need to strictly forbid syncing.

This is not correct. @timcappalli has made it clear that the data flags are an optional hint, and not a strict assertion that the device does or does not do backups. Which pretty much means they are not a strict rule (the same way that a lot of authenticator selection criteria are hints and not actual criteria).

There are now only three situations that exist:

  • you know a device explicitly is multi-device capable because of DPK/Attestation
  • you know a device is explicitly not multi-device capable because you carefully vetted the attestations and manufacturer to limit this
  • All other devices, regardless of backup flag presence or not, and especially with none attestation, must be assumed to be multi device.

There is practically no way to opt out of multi-device credentials, you have to "opt in" to strict attestation checks if you want single devices.

@timcappalli
Copy link
Member

I propose we close this issue as the question was answered quite a while ago and the current discussion is very circular. This can be picked up in the WebAuthn Community Adoption Group.

@emlun
Copy link
Member

emlun commented Apr 4, 2022

This is not correct. @timcappalli has made it clear that the data flags are an optional hint, and not a strict assertion that the device does or does not do backups. Which pretty much means they are not a strict rule (the same way that a lot of authenticator selection criteria are hints and not actual criteria).

Yes, that's what I said: that you (the RP) cannot trust the authenticator data flags unless they come from an authenticator whose attestation you have deemed a trustworthy assertion that the flags are accurate. This is true for all the flags and does not change with the introduction of synced keys.

@ve7jtb
Copy link
Contributor

ve7jtb commented Apr 4, 2022

Somewhere berried in this there was a request to rename the bit flags to hints.

We should specifically discuss that and create a pull request or close.

To that point, all information other than the signature itself is untrusted outside the context of a trusted attestation. That includes UV and UP.

I don't see why these flags would be different.

I don't think they need to be called hints, but don't feel strongly about it, if people think it would be useful to give RP more warning.

@Firstyear
Copy link
Contributor

Somewhere berried in this there was a request to rename the bit flags to hints.

See this discussion:

#1695 (comment)

"These are hints, not security properties."

However, we do not name or label them as such in the specification meaning that all current RP's and consumers probably incorrectly assume they are security properties.

I don't see why these flags would be different.

I don't think they need to be called hints, but don't feel strongly about it, if people think it would be useful to give RP more warning.

So either they are strict and a security property OR they are a hint and may or may not represent the true state of the device, even under attestation.

That's why it's critical we select and use the correct language because today they are hints, but we advertise them as though they are a security property.

Our use of wishy-washy and vague language has already led to CVE's (CVE-2020-8236 - https://hwsecurity.dev/2020/08/webauthn-pin-bypass/, by passes in okta, azure ad, etc.) . This certainly has the feeling of ending up as another trap we are laying for RP's.

@emlun
Copy link
Member

emlun commented Apr 5, 2022

The flags are security properties, but a critical question for any security property in any security system is who is the guarantor of that property? This critical question is not unique to WebAuthn, or even to digital systems, which is why it is perhaps glossed over in the spec. In WebAuthn (from an RP point of view) that question can be answered only through attestation, and if you know who the guarantor is you can then decide to what degree you trust them to set the flags accurately and truthfully.

That some RPs forget to check the UV flag is unfortunate, but the (contextual) need to verify the UV flag is an explicit step in both RP operations. The spec has never been vague about that.

@Firstyear
Copy link
Contributor

Firstyear commented Apr 5, 2022

@emlun No. They are not. The author of the feature themself, quote stated "These are hints, not security properties."

Second the UV flag checks are another problem unto themself, especially because preferred doesn't require an RP to check the UV flag, and so many RP's do not. There is also no guidance to direct RP's to store the state of UV from an initial registration to ensure it's consistent (And ctap2.0 breaks this anyway because it forces UV even under discouraged, but then will never UV during auth).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

7 participants