Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Feature Request: Two Factor Auth #85

Open
viertaxa opened this issue Aug 29, 2017 · 58 comments
Open

Feature Request: Two Factor Auth #85

viertaxa opened this issue Aug 29, 2017 · 58 comments

Comments

@viertaxa
Copy link

I'm currently testing out Wire. One thing that immediately stood out to me is the lack of two factor auth across the whole platform. To me, this is a critical feature of a security minded service of any kind.

Off the top of my head, the following things would be a great start if they were able to be enabled independently of each other:

  • Allow for TOTP (Authy, Google Authenticator, similar)
  • Allow for One Time Pad (OTP) as a backup
  • Allow for U2F/FIDO (Yubikey, etc)
    • For adding mobile devices: touch U2F token on PC with Chrome also signed into account?
  • Allow for authenticated devices to authorize new device
@raphaelrobert
Copy link
Contributor

Thanks for the feedback!
2FA is planned for the future, we are already exploring some of these ideas.

@cardassian-tailor
Copy link

I would like to suggest that you look into allowing wire itself to be used as a 2fa method for other services.

So, for example, a user could authenticate with Twitter by having the code sent to their wire account.

@trymeouteh
Copy link

Please add Email 2FA.

@AvoidMastodonBlue
Copy link

Please enable xmpp 2fa

@cardassian-tailor
Copy link

U2f support would be awesome

@dinosmm
Copy link

dinosmm commented Aug 28, 2018

Is two-factor authentication still being looked at? It's the only thing missing from Wire to bring it above the competition.
Authenticator app support, perhaps backed-up by SMS and/or email or fixed codes would be awesome.
Any news on the timeline for this?

@blark
Copy link

blark commented Sep 27, 2018

I'm not quite sure how you can claim to be "The most secure collaboration platform" with no 2fa/mfa.

@0Ky
Copy link

0Ky commented Oct 18, 2018

@marcoconti83 @raphaelrobert

Waiting for U2F support just like others.
Here's a talk by Yuriy Ackermann, you guys might find this interesting:

@muscovitebob
Copy link

Greetings all,

I understand that one of the reasons Wire has so far not implemented traditional MFA is the difficulty in providing compatibility with the web-based, always accessible model of the messenger. I wanted to highlight something a messaging platform with similar constraints has done instead, which I think could be very well adapted to Wire:

https://keybase.io/docs/lockdown/index

@cardassian-tailor
Copy link

I love the idea of lockdown but I think there is a very obvious solution to 2fa that should be very easy to implement on the web version. U2f hardware tokens.

@cardassian-tailor
Copy link

https://developers.yubico.com/U2F/Libraries/Using_a_library.html

Links here for libraries and code examples for implementation that would get someone started.

@cardassian-tailor
Copy link

Looks like electron implementation will be more of a problem. electron/electron#3226

I’d be happy to lose the ability to use the electron app if I gained u2f/ fido2

@cardassian-tailor
Copy link

cardassian-tailor commented Jan 3, 2019

just to follow up - looks like electron has fixed this issue though the commenters seem unsure of how it will persist in the future.

With this now working on electron - I would personally consider this the most important feature missing ... how the application has gone this long without 2fa is difficult to fathom.

@raphaelrobert any updates on this front? Please, please share with us some details.

if there are underlying caveats .. I would love a blog post explaining some of those, possible solutions, etc.

@raphaelrobert
Copy link
Contributor

Wire Pro accounts can now have 2FA through single sign-on (SSO), Wire Personal accounts are unchanged for now.

@cardassian-tailor
Copy link

I'm hoping a paid personal account is considered in the future.

@Ralms
Copy link

Ralms commented Jan 27, 2019

This is literally the feature stopping me from trusting/using Wire.
The fact that you can use just an email and password to access the service, makes the rest of the security features pointless.

@phenomax
Copy link

phenomax commented Mar 3, 2019

Are there any updates? @marcoconti83 @wireswiss

@DrWhax
Copy link

DrWhax commented Apr 3, 2019

This is stopping me currently from recommending Wire to a bunch of organisations.

@marcoconti83
Copy link
Member

Hi everyone,
This is still on our roadmap but it likely won't be done during Q2 2019 either. Currently, pro customers are fulfilling this requirement with SSO, but we still plan to provide 2FA to a wider audience when our roadmap allows.

@x30n
Copy link

x30n commented Apr 8, 2019

Hi @marcoconti83, we're trialing Wire Pro, but don't see any option to set up SSO (I assume SAML?) to test with MFA. How is this done?

@marcoconti83
Copy link
Member

Hi @x30n ,
we currently support SSO for Pro users through our support channel, indeed using SAML. You can get in touch with support (support@wire.com) and they will start the procedure to enable it for your team. In the long run, we are building an admin interface for SSO to set it up on your own, but we are not there yet.

@cardassian-tailor
Copy link

is there any viability to incorporate the newly supported by w3c Webauthn ? I assume a lot of the work on Wire's side for SAML is already completed so changing gears to webauthn might be out of the question. Is there any benefit of SAML over webauthn ?

https://www.yubico.com/webauthn/
https://webauthn.org/

@x30n
Copy link

x30n commented Apr 26, 2019

Thanks for the follow up @marcoconti83. I did get in-touch with support, but unfortunately they said SSO is currently only available for "Enterprises" (>500 users), not just paid Pro accounts... Glad to hear it's coming to a wider audience at some point - so that security conscious orgs can use MFA (FWIW - Phishing is probably a higher priority in most threat models than the malicious or compromised server threats that e2e addresses).

Tangentially - IMHO it's really bad practice to restrict access to security features to premium tiers, for any product, but especially one that is attempting to distinguish itself from the competition with security*. </$0.02>

*Understood that this may not be happening here - I suspect MFA was an overlooked feature in your initial design and SSO, which mostly only makes sense for organizations, is a hack to enable it without rearchitecting. Still, it can leave a bad taste if it appears that security features are being held hostage, even if not true. 🙂

@orangesunny
Copy link

Hi everyone,
This is still on our roadmap but it likely won't be done during Q2 2019 either. Currently, pro customers are fulfilling this requirement with SSO, but we still plan to provide 2FA to a wider audience when our roadmap allows.

Sounds great. Do you have any news about ETA, please?

@arnoldoree
Copy link

Hi @x30n ,
we currently support SSO for Pro users through our support channel, indeed using SAML. You can get in touch with support (support@wire.com) and they will start the procedure to enable it for your team. In the long run, we are building an admin interface for SSO to set it up on your own, but we are not there yet.

I'm glad to learn that this is the Wire position. Not having 2FA/MFA available as the most basic premise of the Wire Platform has really caused a great number of gremlins to run around in my mind with regard to the integrity of the system.

Given the nature of cloud systems, and the natural progression of a platform positioned as Wire towards enterprise infrastructure / universal application systems integration, it is critical that this is addressed as you are doing, and that the feature provisioning messaging to developers, engineers, enterprise architects, and other interested parties is loud and clear.

@v3EtBhYE
Copy link

@raphaelrobert Is Mfa coming any time soon? It is really crucial to online security of all users

@Ralms
Copy link

Ralms commented Oct 20, 2019

@v3EtBhYE if in 2 years Wire team didn't add this feature, they have proven to have little regards when it comes to security.
This is the deal breaker that resulted on me not trusting Wire one bit.

@KaKi87
Copy link

KaKi87 commented Mar 8, 2020

Hello,
Any news on this ?
Thanks.

@joshbuker

This comment has been minimized.

@KaKi87

This comment has been minimized.

@lucagoetheil
Copy link

Any updates?

@joshbuker
Copy link

@lucagoetheil Lol, no updates other than the Wire team trying to hide criticism by marking it off-topic it seems. (presumably this will also be marked off-topic or removed without comment from @wireswiss)

@gerardforcada
Copy link

Any updates on this?

@KaKi87
Copy link

KaKi87 commented Jan 27, 2021

Migrate to Signal 😉

@Ralms
Copy link

Ralms commented Jan 27, 2021

Migrate to Signal 😉

I was thinking the same lool
Wire team has proven at this point they have no concerns with privacy or security.

@KaKi87
Copy link

KaKi87 commented Jan 27, 2021

Exactly.

@orangesunny
Copy link

Migrate to Signal 😉

No matter the feature, privacy, or encryption comparison, I wouldn‘t see this as the reason for migration, or even a solution. Calling Signal’s Registration lock a shining example of 2FA is definitely not a case.

Yes, Wire should add 2FA.

@Ralms
Copy link

Ralms commented Jan 27, 2021

Migrate to Signal 😉

No matter the feature, privacy, or encryption comparison, I wouldn‘t see this as the reason for migration, or even a solution. Calling Signal’s Registration lock a shining example of 2FA is definitely not a case.

Yes, Wire should add 2FA.

When a extremely important feature is ignored by the Wire team since 2017, it shows how serious they take security.
2017 as in over 3 years ago...

Signal doesn't even have MFA because it doesn't need it by design, uses your phone number and a pin you define.
But Wire forces you to use email and password, while providing 0 mechanisms to protect your account.
I wouldn't trust a company like this with my chats and private information that is for sure.

@orangesunny
Copy link

@Ralms
I didn’t say you should use or praise Wire. I said:

Yes, Wire should add 2FA.

I also think that using a phone number as part of the authentication is not a good reason to use any platform. SMS is not a secure channel at all.

Enthuse other users to use a different solution in the repo of Wire (or any other software) is not a clever, nor gentle thing to do.

@joshbuker
Copy link

joshbuker commented Jan 27, 2021

Comparing Signal and Wire is not a fair comparison imo, they serve different but related purposes. Wire and Slack are more aligned on intended usage and functionality, and that's where security shortcomings are readily apparent.

That said, it's still a huge faux pas not having 2FA after 3 years of being alerted to it, and for a high value target like a communications app, serious false advertising calling it "the most secure".

@Ralms
Copy link

Ralms commented Jan 27, 2021

Comparing Signal and Wire is not a fair comparison imo, they serve different but related purposes. Signal and Slack are more aligned on intended usage and functionality, and that's where security shortcomings are readily apparent.

That said, it's still a huge faux pas not having 2FA after 3 years of being alerted to it, and for a high value target like a communications app, serious false advertising calling it "the most secure".

You might be confusing Telegram with Signal.

Signal and Slack have 0 in common.

@joshbuker
Copy link

Comparing Signal and Wire is not a fair comparison imo, they serve different but related purposes. Signal and Slack are more aligned on intended usage and functionality, and that's where security shortcomings are readily apparent.
That said, it's still a huge faux pas not having 2FA after 3 years of being alerted to it, and for a high value target like a communications app, serious false advertising calling it "the most secure".

You might be confusing Telegram with Signal.

Signal and Slack have 0 in common.

Ah, brain fart. I meant to type Wire and Slack, not Signal and slack. I've fixed it now.

@ZelphirKaltstahl
Copy link

Migrate to Signal 😉

No matter the feature, privacy, or encryption comparison, I wouldn‘t see this as the reason for migration, or even a solution. Calling Signal’s Registration lock a shining example of 2FA is definitely not a case.
Yes, Wire should add 2FA.

When a extremely important feature is ignored by the Wire team since 2017, it shows how serious they take security.
2017 as in over 3 years ago...

Signal doesn't even have MFA because it doesn't need it by design, uses your phone number and a pin you define.
But Wire forces you to use email and password, while providing 0 mechanisms to protect your account.
I wouldn't trust a company like this with my chats and private information that is for sure.

Well, on the other hand, I don't want to connect my phone number with my Wire account, so I actually like the fact, that it does not require my phone number to work, including not forcing 2FA via phone.

So how do we envision 2FA exactly, without phone number? That is an interesting question. Would you say a second e-mail account is sufficient?

@joshbuker
Copy link

@ZelphirKaltstahl SMS based 2FA is considered insecure, and authy apps are the current defacto standard, iirc. Authy apps do not require a phone, let alone a phone number.

@KaKi87
Copy link

KaKi87 commented Jan 27, 2021

Honestly, I didn't recommended Signal because of SMS 2FA or whatever, but because devs care more about security than Wire does.
And, see, Wire devs are so inactive that they're not coming here in time to stop us from advertising Signal here.

@radiosilence
Copy link

It's been nearly four years and still no 2FA?

@KaKi87
Copy link

KaKi87 commented Apr 19, 2021

Honestly just switch to Signal.

@orangesunny
Copy link

Honestly just switch to Signal.

Again, @KaKi87, how does this relate to Wire development? Use your Signal, stop being repetitive here, and may become happy :)

@KaKi87
Copy link

KaKi87 commented Apr 19, 2021

I wouldn't be saying that if Wire devs were listening to our requests.

@orangesunny
Copy link

It is said that they don’t reply, yes. But promoting other software is not helping anyhow; it is not a solution, nor a request. It’s only spamming many people with notifications about off-topic.

@KaKi87
Copy link

KaKi87 commented Apr 19, 2021

Yes, it is helping people using better software.

@orangesunny
Copy link

I am using both every day and I can’t say one’s better. I am missing 2FA in Wire as well as in Signal, also many features in both. To top of that, it’s hell to change the number with Signal. Try to move to a different country with it. 😭 I am leaving this off-topic, have a lovely day.

@Ralms
Copy link

Ralms commented Apr 19, 2021

I am using both every day and I can’t say one’s better. I am missing 2FA in Wire as well as in Signal, also many features in both. To top of that, it’s hell to change the number with Signal. Try to move to a different country with it. 😭 I am leaving this off-topic, have a lovely day.

Signal doesn't need 2FA, your phone number and the pin you set is a 2FA by itself.
Additionally, changing number in Signal is as easy as backing up, setting the app with the new number and restore lol.

@orangesunny
Copy link

Signal doesn't need 2FA, your phone number and the pin you set is a 2FA by itself.
Additionally, changing number in Signal is as easy as backing up, setting the app with the new number and restore lol.

I will be happy if we can continue in an appropriate discussion for that and you can guide me on how to do it: signalapp/Signal-iOS#967

@arianvp
Copy link

arianvp commented May 5, 2021

If there are people here who are planning to attend https://zfoh.ch/zurihac2021/, last year I made a start on
https://github.com/arianvp/haskell-fido2 ; a Haskell library for U2F/FIDO2 authentication.

This year I'm planning to finish up the library and add support to https://github.com/wireapp/wire-server .

Having this supported in the backend is a small step; but at least it's a step. Hopefully we can then use that legwork to implement this into the client someday :)

If you're attending Zurihac and want to help out. That would be greatly appreciated!

I added some notes for myself in this repo last year with useful reading resources: https://github.com/wireapp/fido2-hackathon

@Mark-BC
Copy link

Mark-BC commented Aug 20, 2022

Any update on adding 2FA to Wire?

@muscovitebob
Copy link

seems unlikely to be prioritised anytime soon considering most of the customers are large enterprises now and they all have 2FA via their SSO providers

@Ralms
Copy link

Ralms commented Aug 20, 2022

Any update on adding 2FA to Wire?

Simply move to Signal.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests