Most active commenters
  • tptacek(4)
  • anon7000(3)

←back to thread

184 points Bogdanp | 37 comments | | HN request time: 1.028s | source | bottom
1. juancn ◴[] No.45106230[source]

    Signing into my accounts on my children’s devices has turned from a straightforward process to an incredibly frustrating experience. I find myself juggling all kinds of different apps and flows.
This strikes home for me, I'm the main gatekeeper of passwords and service accounts in my home. 2FA and passkeys are so annoying to juggle.

My kids use prepaid numbers, once I changed one and forgot to tell Apple, when I realized that I needed the old number later, it took me a month at least to get it back.

I really like passwords, the security risks are well known and really easy to handle compared to 2FA and all that crap, specially when 99% of your accounts are not sensitive enough to merit anything fancy.

replies(5): >>45106514 #>>45106530 #>>45107602 #>>45108644 #>>45112401 #
2. toomuchtodo ◴[] No.45106514[source]
Passwords are a weak authentication mechanism and incur liability. MFA is good, Passkeys are better. One time passwords via email are tolerable, still better than passwords.

(customer identity and access management is a component of my work at a fintech)

replies(3): >>45106589 #>>45106861 #>>45111579 #
3. adiabatichottub ◴[] No.45106530[source]
It makes sense to keep printed backups of certain keys and passwords in a physically secure location, accessible to the people you trust in case of an emergency.
replies(1): >>45108247 #
4. cuu508 ◴[] No.45106589[source]
Security-wise, passkeys are worse than username/password plus WebAuthn as the second factor.
replies(3): >>45106627 #>>45106628 #>>45107082 #
5. tptacek ◴[] No.45106627{3}[source]
But better than username/password + TOTP, and username/password + WebAuthn had really low uptake.
replies(1): >>45106820 #
6. ◴[] No.45106628{3}[source]
7. AlexandrB ◴[] No.45106820{4}[source]
Username/password + TOTP is still better than username/password + one time email, no? Especially since the latter creates additional dependencies/risks for the user in the form of an email account.
replies(1): >>45107244 #
8. OJFord ◴[] No.45106861[source]
Your fintech is probably not among the 99% accounts GP says don't warrant 'anything fancy'.

IME as a customer/user, financial institutions are some of the worst culprits for doing appalling things in the name of security (theatre) anyway.

replies(2): >>45106946 #>>45107024 #
9. tadfisher ◴[] No.45106946{3}[source]
Yes, because financial institutions are responsible for losses incurred via account takeover.
replies(2): >>45106984 #>>45109666 #
10. AlexandrB ◴[] No.45106984{4}[source]
And yet no financial institution in Canada supports webauthn hardware tokens - instead choosing to bake their own scheme within their app or use SMS.
11. kriops ◴[] No.45107082{3}[source]
If and only if you somehow manage to compromise one secret without compromising the other.
12. tptacek ◴[] No.45107244{5}[source]
They're about the same. The important factor is phishing resistance (neither TOTP nor email links have that), and an account that has lost its primary email account is 99% of the time already boned. I would use TOTP in preference to email backup, but that's mostly an affectation.

The reality is that TOTP has been obsolete for awhile now. It's a net negative for ordinary users that is kept front-of-mind for everyone because nerds like us are attached to it.

replies(1): >>45107792 #
13. ajsnigrutin ◴[] No.45107602[source]
Passwords + OTP (stored in keepass or somewhere) is the win for me.

Everything else is a security theatre and an UX pain.

replies(3): >>45108108 #>>45109965 #>>45112987 #
14. jrochkind1 ◴[] No.45107792{6}[source]
This is actually the first I've heard of this, re considering TOTP to be not worthwhile. Can you recommend some links to material for me to read to get up to speed with the argument?
replies(2): >>45108696 #>>45110030 #
15. nixpulvis ◴[] No.45108108[source]
This is how I feel as well.
16. lixtra ◴[] No.45108247[source]
You might even split them so that k out of n trusted people are needed to restore them.

For example https://shamir.securitytools.io/

replies(1): >>45108697 #
17. teekert ◴[] No.45108644[source]
I’m on proton (family) and put pass on all devices (inc the kids’) so I can quickly share credentials. But still, I agree that some kind of export of private keys is sorely needed.
replies(1): >>45111869 #
18. tptacek ◴[] No.45108696{7}[source]
Basically everything ever written about U2F, WebAuthn, and phishing-proof authentication generally is about the weaknesses of TOTP. The principle component of the problem is phishing.
replies(1): >>45110677 #
19. adiabatichottub ◴[] No.45108697{3}[source]
Yes, I think that's a good idea for high-value secrets. In a family situation it would be a great way to limit elder abuse (unless all your children hate you).
20. jazzyjackson ◴[] No.45109666{4}[source]
And yet they are still out here offering voiceprint authentication
replies(1): >>45110538 #
21. xeonmc ◴[] No.45109965[source]
I use my OTP secret as my account password, best of both worlds for portability!
replies(2): >>45110249 #>>45111553 #
22. esseph ◴[] No.45110030{7}[source]
TOTP is not phishing resistant, passkeys are. Also can screen grab TOTP.
23. ◴[] No.45110249{3}[source]
24. toomuchtodo ◴[] No.45110538{5}[source]
JP Morgan Chase does this, regrettably.
25. harshreality ◴[] No.45110677{8}[source]
There are sites requiring TOTP to mitigate careless users using dumb passwords, because the sites can't guarantee passwords aren't reused but they can enforce TOTP.

Even for phishing, doesn't it count for something that TOTP prevents asynchronous phishing (collect credentials on a fake site, try them in batches later)?

replies(1): >>45110750 #
26. tptacek ◴[] No.45110750{9}[source]
No, it does not. Everybody agrees that password + TOTP is better than just plain passwords. Everything is better than just plain passwords. But I've personally worked on large, high-stakes projects where TOTP phishing was a continuous problem, and it's really difficult to solve. Since we have options besides TOTP that aren't susceptible to phishing, people shouldn't be pushing TOTP anymore.
replies(1): >>45117895 #
27. 1oooqooq ◴[] No.45111553{3}[source]
that's so insanely unexpected it might actually be secure
28. 1oooqooq ◴[] No.45111579[source]
let me guess, until last years you had deployed a java applet keypad for users to log in? and today every time I can your recording offer to enroll in voice print?

yeah i will not be taking advice from the majority of people in Fintech on this topic. thank you.

29. basch ◴[] No.45111869[source]
Ill maintain that family management of access control is one of the most broken things on the internet. Not only does 2fa make granting access on other devices a nightmare, but then each developer has its own version of parental controls.

ALL of account permissions, relations to other accounts, and authentication should be an exposed api that rolls up into a single dashboard. I should be able to go into one single control panel to control exactly what accounts are allowed to do what on what devices for all services for all family members. That includes lockouts, auth resets, push of auth to a device I dont have physical access to (kid is on a trip, I need to sign him into something).

I could go on and on and on about all the different ways this paradigm is so broken, it actually breaks our imagination of what it should look like in a functioning world. We are so used to doing it completely wrong, its hard to see right.

replies(1): >>45112967 #
30. 15155 ◴[] No.45112401[source]
> 2FA and passkeys are so annoying to juggle.

Try 1Password Family and store your passkeys in there?

replies(1): >>45112976 #
31. anon7000 ◴[] No.45112967{3}[source]
That basically does exist, and it’s called SSO. SSO providers (eg Okta) have a unified dashboard where you can control who can access what, and at what level, and can revoke access any time. It’d be nice if there was a version of that for families that wasn’t insanely expensive.

Anyways, 1Password completely solves this problem for me with me & my wife.

replies(1): >>45114976 #
32. anon7000 ◴[] No.45112976[source]
Agreed, my wife even says 1Password is one of the best tech things I’ve set up just because it completely solves sharing passwords and stuff with each other.
33. anon7000 ◴[] No.45112987[source]
Passkeys is not security theatre, and also not a UX pain if you use a password manager. Turns out it’s nice to have a standardized API for submitting a credential to a website rather than relying on browser extensions to hopefully guess the input field is for a password. (Not to mention the multitude of sites that don’t properly handle text being autofilled)
replies(2): >>45113860 #>>45116908 #
34. raxxorraxor ◴[] No.45113860{3}[source]
Not theatre, passkeys are a security risk if you need a specific device to access your information and there is no way to extract a passkey.
35. basch ◴[] No.45114976{4}[source]
It doesn’t do anything for pushing authentication remotely or controlling access within apps, such as voice chat in Roblox. Each app has proprietary controls.

It also doesn’t begin to cover notifications. For some reason most services seem to think only one parent is in charge and both don’t need equal access and equal notice.

36. NoGravitas ◴[] No.45116908{3}[source]
There are exactly three nice things about passkeys.

1. It forces the use of keys with a reasonable amount of entropy, and the use of a password manager to access them. 2. They will not make it easy to use a key with the wrong site (also true of a good password manager). 3. Uses public/private keypair so key itself is never sent over the wire (even encrypted).

The real question is whether these properties are worth all the costs (enumerated in this article).

37. jrochkind1 ◴[] No.45117895{10}[source]
What is your current to use at this moment preferred option for a general (not especially sensitive domain like banking) consumer site?