universal second factor authentication or why 2fa today is … · 2018. 2. 22. · why not just...

42
Universal Second Factor authentication or why 2FA today is wubalubadubdub 1

Upload: others

Post on 16-Aug-2020

5 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Universal Second Factorauthentication

or why 2FA today is

wubalubadubdub1

Page 2: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Yuriy AckermannYuriy AckermannSr. Certification EngineerSr. Certification Engineer

@FIDOAlliance@FIDOAlliancetwitter/github: @herrjemandtwitter/github: @herrjemand

2

Page 3: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

3

Page 4: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Today we will learnToday we will learn

Why passwords not enoughWhy 2FA has not succeededIntroduction to U2FDEMOQ&A

4

Page 5: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Why not just passwords?

Weak Phishing pwnedReuse

Typical passwords life cycle

SOLUTION!SOLUTION!Two Factor Authentication - aka 2FATwo Factor Authentication - aka 2FA

haveibeenpwned.com

5

Page 6: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

What is 2FA?

Passwords verifyverify

2FA authenticateauthenticate

6

Page 7: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Do you use 2FA?

7

Page 8: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

What does 2FA looks like?

Three main types

Apps Tokens SMS(TOTP and HOTP) (PKI and OTP)

8

Page 9: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

So we solved it?

Right?

9

Page 10: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Why 2FA has not succeeded?

Apps Tokens SMSPhishing!!UXShared keySynced time

CostDRIVERSPhishingUXCentralisedFragile

Still phishableUXPrivacySecurity

SIM reissueSIM spoof

CoverageNIST Ban

10

Page 11: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

11

Page 12: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

12

Page 13: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Current state of 2FACurrent state of 2FA

I am in the deep pain,I am in the deep pain,please help!please help! 13

Page 14: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

So how do we solve it?

We need:Easy to useOpenSecureStandardized

protocol.14

Page 15: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Introducing

Universal Second Factoraka FIDO U2F

15

Page 16: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

How does U2F works?

16

Page 17: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

User layerUser layer

17

Page 18: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Browser layer

18

Page 19: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Protocol Layer

19

Page 20: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Step one: Challenge-ResponseChallenge-Response

20

Page 21: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Step two: Phishing protectionPhishing protection

21

Page 22: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Step three: Application-specific key-pairApplication-specific key-pairRelying

Party

22

Page 23: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

To Wrap, or not to Wrap?

23

Page 24: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Step four: Replay Attack ProtectionReplay Attack Protection

24

Page 25: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Step five: Device attestationDevice attestation

25

Page 26: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Metadata serviceMetadata service

26

Page 27: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Step five and a half: Key exercise protectionKey exercise protection

User must confirm theirdecision to perform 2FA, by

performing user gesture

e.g.e.g.

Fingerprint Retina scan PincodeRemembering your wife's birthday.Solving Rubikscube

...anything you want.

Pressing button

27

Page 28: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Multiple identifiers

Web Android iOS

How do we deal with it?How do we deal with it?

mail.google.com apk-key-hash:FD18FA

com.google.SecurityKey.dogfood

GMailGMail

28

Page 29: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Application Facets{ "trustedFacets": [{ "version": { "major": 1, "minor" : 0 }, "ids": [ "https://accounts.google.com", "https://myaccount.google.com", "https://security.google.com",

"android:apk-key-hash:FD18FA800DD00C0D9D7724328B6D...", "android:apk-key-hash:/Rj6gA3QDA2ddyQyi21JXly6gw9D...",

"ios:bundle-id:com.google.SecurityKey.dogfood" ] }]}

MUSTMUST be served over VALIDVALID HTTPS!...no self signed certs....no self signed certs.

29

Page 30: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Implementations

30

Page 31: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

31

Page 32: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Current users

dongleauth.infodongleauth.info32

Page 33: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Browser support

Yes Yes*(NightlyNightly)

No*(Soon...Soon...)

Maybe?Yes

33

Page 34: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

WebAuthN

A W3C standard for PublicKey credentialauthentication

https://www.w3.org/Webauthn/

34

Page 35: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Today we learnedToday we learnedPasswords are hard2FA is wubalubadubdub, and we need to dosomething about it.FIDO U2F is sweet.Protocol is cuteYou can have multiple identitiesThere are existing solutions......and people do use it

35

Page 36: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

DEMO

36

Page 37: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

You must use HTTPSYou must use HTTPSStart using TLS Channel ID'sU2F is just 2FA. Don't use as primary factor.

Security Security considerationsconsiderations

37

Page 38: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

https://github.com/Yubico/pam-u2fhttps://github.com/Yubico/python-u2flib-serverhttps://github.com/Yubico/python-u2flib-hosthttps://github.com/herrjemand/flask-fido-u2fhttps://github.com/gavinwahl/django-u2fhttps://github.com/google/u2f-ref-codehttps://github.com/conorpp/u2f-zero

https://developers.yubico.com/U2F/https://fidoalliance.org/specifications/download/https://github.com/LedgerHQ <- JavaCardFIDO Dev (fido-dev) mailing list

Specs and dataSpecs and data

Things to play withThings to play with

38

Page 39: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

What's next?

WE NEED

39

Page 40: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Questions?Questions?twitter/github: @herrjemandtwitter/github: @herrjemand

40

Page 41: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Quick thanks toQuick thanks toFeitian and YubicoFeitian and Yubico

for swag!for swag!

41

Page 42: Universal Second Factor authentication or why 2FA today is … · 2018. 2. 22. · Why not just passwords? Weak Reuse Phishing pwned Typical passwords life cycle SOLUTION! Two Factor

Thank you Thank you OWASP!OWASP!

42