GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 18-Oct-2023 05:57:03 JST Kevin Beaumont Kevin Beaumont

    Going to be interesting to see if this happens:

    1) Google and Apple integrate Passkeys in a way which is recoverable for device swaps, ie keys are backed up centrally and it is required - both US companies

    2) services like WhatsApp etc require all accounts to use Passkeys

    3) National Security letters or the like https://en.wikipedia.org/wiki/National_security_letter

    In conversation Wednesday, 18-Oct-2023 05:57:03 JST from cyberplace.social permalink

    Attachments

    1. Domain not in remote thumbnail source whitelist: upload.wikimedia.org
      National security letter
      A national security letter (NSL) is an administrative subpoena issued by the United States government to gather information for national security purposes. NSLs do not require prior approval from a judge. The Stored Communications Act, Fair Credit Reporting Act, and Right to Financial Privacy Act authorize the United States government to seek such information that is "relevant" to authorized national security investigations. By law, NSLs can request only non-content information, for example, transactional records and phone numbers dialed, but never the content of telephone calls or e-mails.NSLs typically contain a nondisclosure requirement forbidding the recipient of an NSL from disclosing the FBI had requested the information. The nondisclosure provision must be authorized by the Director of the FBI, and only after he or she certifies "that otherwise there may result a danger to the national security of the United States; interference with a criminal, counterterrorism, or counterintelligence investigation; interference with diplomatic relations; or danger to the life or physical safety of any person." Moreover, a recipient of the NSL may still challenge the...
    • Embed this notice
      feld (feld@bikeshed.party)'s status on Wednesday, 18-Oct-2023 05:56:52 JST feld feld
      in reply to
      • kravietz 🦇
      • Marcin Cieślak
      • Alex White
      • vpz
      > but my Apple account stays less protected

      How? They can't get into the account without your passkey. It's not actually stored "in the cloud", so they can't steal it from there. They'd need physical access to one of your devices to get it.
      In conversation Wednesday, 18-Oct-2023 05:56:52 JST permalink
    • Embed this notice
      Marcin Cieślak (saper@mastodon.social)'s status on Wednesday, 18-Oct-2023 05:56:53 JST Marcin Cieślak Marcin Cieślak
      in reply to
      • kravietz 🦇
      • Alex White
      • vpz

      @vpz @GossiTheDog @kravietz @PlaneSailingGames

      (i)Cloud accounts have been targeted for hijack for quite a long time.

      what is the point of cloud-based passkeys?

      so I am going to protect myself against hijacking, say, my Github account, but my Apple account stays less protected?

      But if I go ahead and buy a real hardware fido key, I can use it for all services, including Github and (probably) Apple, so why bother with the cloud-based solution?

      In conversation Wednesday, 18-Oct-2023 05:56:53 JST permalink
    • Embed this notice
      Marcin Cieślak (saper@mastodon.social)'s status on Wednesday, 18-Oct-2023 05:56:56 JST Marcin Cieślak Marcin Cieślak
      in reply to
      • kravietz 🦇
      • Alex White

      @GossiTheDog @kravietz @PlaneSailingGames

      got it! in short: FIDO good, passkey bad

      In conversation Wednesday, 18-Oct-2023 05:56:56 JST permalink
    • Embed this notice
      vpz (vpz@infosec.exchange)'s status on Wednesday, 18-Oct-2023 05:56:56 JST vpz vpz
      in reply to
      • kravietz 🦇
      • Marcin Cieślak
      • Alex White

      @saper @GossiTheDog @kravietz @PlaneSailingGames What it sounds like is that how a user configures the security around passkeys is important. Using the Apple example mentioned previously, iCloud Keychain security1 is what protects passkeys, if I'm reading this stuff correctly. So a user who cares more about security than convenience is going to take extra steps to secure iCloud Keychain like using two-factor with Yubikeys. And by NOT doing that, the security of Keychain isn't that great. [1] https://support.apple.com/guide/security/icloud-keychain-security-overview-sec1c89c6f3b/1/web/1

      In conversation Wednesday, 18-Oct-2023 05:56:56 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: help.apple.com
        iCloud Keychain security overview
        With the iCloud Keychain, users can securely sync their passwords between iPhone, iPad, and Mac devices without exposing that information to Apple.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 18-Oct-2023 05:56:58 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • kravietz 🦇
      • Marcin Cieślak
      • Alex White

      @kravietz @saper @PlaneSailingGames yeah.. you might want to look at how Passkeys has been implemented compared to FIDO.

      In conversation Wednesday, 18-Oct-2023 05:56:58 JST permalink
    • Embed this notice
      kravietz 🦇 (kravietz@agora.echelon.pl)'s status on Wednesday, 18-Oct-2023 05:56:59 JST kravietz 🦇 kravietz 🦇
      in reply to
      • Marcin Cieślak
      • Alex White

      @saper

      Under FIDO, to which Google declares compliance for passkeys[^1], the private key should never leave the client device so they shouldn’t be stored on the server… but that applies to the service provider (e.g. Shopify website). Identity provider, in this case Google or Apple, of course do store private keys on their servers for backup purposes, only they declare them to be encrypted by the sync passphrase.

      I guess there are two workflows here: one under normal usage scenarios, one under TAO[^2] or other “law enforcement love letter” scenarios.

      Granted that identity like Google provider controls all data flows for any software keys, from storage (Android), sync passphrase entry (Android) to operating system and application updates (especially after hosted developer keys were introduced to Android[^3]), it would be naive to have any illusions that under TAO scenario they won’t retrieve that one way or another.

      This shouldn’t be the case with hardware authenticators, of course, which are also allowed by Passkeys. Or at least building a side channel for private key retrieval will be much more difficult even in TAO scenario.

      [^1]: https://developers.google.com/identity/passkeys

      [^2]: https://en.wikipedia.org/wiki/Tailored_Access_Operations

      [^3]: https://www.theregister.com/2021/07/01/android_app_bundle/

      @PlaneSailingGames @GossiTheDog

      In conversation Wednesday, 18-Oct-2023 05:56:59 JST permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: www.gstatic.com
        Passwordless login with passkeys  |  Authentication  |  Google for Developers
      2. Domain not in remote thumbnail source whitelist: upload.wikimedia.org
        Tailored Access Operations
        The Office of Tailored Access Operations (TAO), now Computer Network Operations, and structured as S32, is a cyber-warfare intelligence-gathering unit of the National Security Agency (NSA). It has been active since at least 1998, possibly 1997, but was not named or structured as TAO until "the last days of 2000," according to General Michael Hayden.TAO identifies, monitors, infiltrates, and gathers intelligence on computer systems being used by entities foreign to the United States. History TAO is reportedly "the largest and arguably the most important component of the NSA's huge Signals Intelligence Directorate (SID), consisting of more than 1,000 military and civilian computer hackers, intelligence analysts, targeting specialists, computer hardware and software designers, and electrical engineers". Snowden leak A document leaked by former NSA contractor Edward Snowden describing the unit's work says TAO has software templates allowing it to break into commonly used hardware, including "routers, switches, and firewalls from multiple product vendor lines...

    • Embed this notice
      Marcin Cieślak (saper@mastodon.social)'s status on Wednesday, 18-Oct-2023 05:57:00 JST Marcin Cieślak Marcin Cieślak
      in reply to
      • kravietz 🦇
      • Alex White

      @PlaneSailingGames @GossiTheDog

      I am no expert on #Webauthn but maybe some "pure-device-based-no-backup" attestation type could be added. But then, in turn, the relying party would need to require that and only that. Unlikely to happen.

      Does this mean that relying parties might need to maintain "trusted" lists of attestation CAs in the future?

      Here it would be unlikely that Google, Apple and Microsoft certificates will not be included on those lists by default.

      pls help @kravietz :)

      In conversation Wednesday, 18-Oct-2023 05:57:00 JST permalink
    • Embed this notice
      Alex White (planesailinggames@chirp.enworld.org)'s status on Wednesday, 18-Oct-2023 05:57:01 JST Alex White Alex White
      in reply to
      • Marcin Cieślak

      @GossiTheDog @saper

      I think he is saying that if the passkeys leave the device and are stored centrally, then the government could gain access to them and thus all your stuff

      In conversation Wednesday, 18-Oct-2023 05:57:01 JST permalink
    • Embed this notice
      Marcin Cieślak (saper@mastodon.social)'s status on Wednesday, 18-Oct-2023 05:57:02 JST Marcin Cieślak Marcin Cieślak
      in reply to

      @GossiTheDog can you provide some context? I am not sure I get this...

      In conversation Wednesday, 18-Oct-2023 05:57:02 JST permalink
    • Embed this notice
      feld (feld@bikeshed.party)'s status on Wednesday, 18-Oct-2023 06:10:15 JST feld feld
      in reply to
      • kravietz 🦇
      • Marcin Cieślak
      • Alex White
      • vpz
      > So a user who cares more about security than convenience is going to take extra steps to secure iCloud Keychain like using two-factor with Yubikeys.

      iCloud Keychain since the initial deployment of E2E encryption always had its own built-in 2FA protection outside your Apple account's own 2FA. You have to approve adding iCloud Keychain to another device with an existing trusted device OR you have to use your iCloud Security Code that you were prompted for when you initially activated iCloud Keychain.

      https://support.apple.com/guide/iphone/passkeys-passwords-devices-iph82d6721b2/ios
      In conversation Wednesday, 18-Oct-2023 06:10:15 JST permalink

      Attachments


      1. https://media.bikeshed.party/pleroma/e112b27d351d04216971aec41aa300bbdbc0953f962d834b013e4e3550bf854c.png
      2. Domain not in remote thumbnail source whitelist: help.apple.com
        Make your passkeys and passwords available on all your devices with iPhone and iCloud Keychain
        Use iCloud Keychain on iPhone to keep website passkeys, passwords, credit card information, and other account information up to date across your other devices.
    • Embed this notice
      Marcin Cieślak (saper@mastodon.social)'s status on Monday, 23-Oct-2023 07:27:34 JST Marcin Cieślak Marcin Cieślak
      in reply to
      • feld
      • kravietz 🦇
      • Alex White
      • vpz

      @feld @kravietz @PlaneSailingGames @GossiTheDog @vpz

      ok, now I got to understand that the Keychain is an encrypted data structure stored somewhere (it could be Apple's key-value store). Reading this story I gather that a whole thing is encrypted with a symmetric wrapping key. This wrapping key can be either obtained by the syncing identity or derived from the recovery code.
      So devices exchange the key exchange key among themselves during pairing? Could recovery code be seen as a #SPOF?

      In conversation Monday, 23-Oct-2023 07:27:34 JST permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.