Can pro-passkey people help me out? I've switched to a passkey for work related accounts. I have a yubikey that I keep with my house keys.
The problem is I daily have to log in to some work thing which means I have to get up and go to my front door and get my keys to insert the key and press the button, then back to the front door so the keys are back where they belong. Not the end of the world, but annoying! Work IT aggressively times out these sessions. Is there some mental model I'm missing?
Andrew (Television Executive)
Als Antwort auf Darius Kazemi • • •I think the expectation is that your keys are in your pocket.
I left my yubikey inserted all the time when I was required to use one. I hated that little useless piece of security theater.
Darius Kazemi
Als Antwort auf Andrew (Television Executive) • • •David Fleetwood - RG Admin
Als Antwort auf Andrew (Television Executive) • • •Andrew (Television Executive)
Als Antwort auf David Fleetwood - RG Admin • • •@reflex because it is?
The point of a second authentication factor is that it be a separate physical device from your primary auth factor.
If I have a password manager secured by a yubikey (as was considered best practice by my employer) that stays permanently inserted into my computer, anyone with physical access to my computer can auth my password manager and 2FA whatever else they want without ever needing my credentials.
Physical keys only help when used in ways most people won't.
zeitverschreib ⁂
Als Antwort auf Andrew (Television Executive) • •@Andrew (Television Executive)
If you're using e.g. KeepassXC, you can use a password, a keyfile and a PIN-enabled Yubikey to secure your database.
@David Fleetwood - RG Admin @Darius Kazemi
David Fleetwood - RG Admin mag das.
David Fleetwood - RG Admin
Als Antwort auf zeitverschreib ⁂ • • •zeitverschreib ⁂
Als Antwort auf David Fleetwood - RG Admin • •@David Fleetwood - RG Admin
Yeah, that bothers me as well.
I'm currently running a selfhosted #Vaultwarden parallel to using Keepass, slowly moving passwords over whenever I use them. Good way to do some clean-up.
@Andrew (Television Executive) @Darius Kazemi
David Fleetwood - RG Admin mag das.
David Fleetwood - RG Admin
Als Antwort auf Andrew (Television Executive) • • •@ajroach42 Yeah that is not best practice.
- The key is not supposed to one touch access everything, that is weaker than a un/pw. At the least it should use a PIN, a feature the key supports
- It's not designed for physical security, it's designed to prevent a remote attacker from gaining access to corp systems even if the device itself is compromised. That's why you touch it (and optionally use a PIN) for it to send it's code.
Andrew (Television Executive)
Als Antwort auf David Fleetwood - RG Admin • • •@reflex
Sure, remote compromise is your biggest threat model this helps.
I've never had a corporate device remote compromised, but I've had several stollen.
David Fleetwood - RG Admin
Als Antwort auf Andrew (Television Executive) • • •Andrew (Television Executive)
Als Antwort auf David Fleetwood - RG Admin • • •Vx. Princess "size_t queen" Grace
Als Antwort auf Darius Kazemi • • •I keep my keys in my pocket when I'm home, that's where my personal yubikey lives.
work issues one of those mini yubikeys for work things and that just stays plugged into a usb-c port on the work computer all the time. you probably lose a little security that way, though
Darius Kazemi
Als Antwort auf Vx. Princess "size_t queen" Grace • • •Vx. Princess "size_t queen" Grace
Als Antwort auf Darius Kazemi • • •USB-C YubiKey 5C Nano | Two Factor Security Key | Yubico
www.yubico.comJason Petersen (he)
Als Antwort auf Darius Kazemi • • •Darius Kazemi
Als Antwort auf Jason Petersen (he) • • •Benjamin
Als Antwort auf Darius Kazemi • • •Personally, I have my Yubikey attached to the lanyard where my company keycard is on as well.
There's also these small ribbon things that you can tie through a small hole on many yubikeys that are detachable. I often recommend those.
🌬️
Als Antwort auf Darius Kazemi • • •Darius Kazemi
Als Antwort auf 🌬️ • • •ekari
Als Antwort auf Darius Kazemi • • •Ricky Mondello
Als Antwort auf Darius Kazemi • • •Although the FIDO Alliance and some security key manufacturers have decided that a credential on a security key should also be called a “passkey”, this was and is a dangerous mistake.
The experience of using a security key is fundamentally different than having a passkey saved in a credential manager that’s present on all of your devices — a much more dangerous (easy to lose!) and inconvenient one (easy to not have on you, unlike your phone).
This is why I have never used the word “passkey” to refer to a security key, and neither has Apple.
I hope this helps!
Darius Kazemi
Als Antwort auf Ricky Mondello • • •Eli the Bearded
Als Antwort auf Ricky Mondello • • •My yubikey lives on my keychain in my pocket. I would much rather have a login credential there than on my phone if it is a $WORK credential. And I do indeed have some $WORK things there that I use outside of work. Like the health savings account that part of my paycheck goes into. They insist on my using a "passkey" but my employer's laptop is a terrible place for me to store things I will want to use after I leave this job.
Mike Siegel
Als Antwort auf Ricky Mondello • • •@rmondello The part that makes me nervous about passkeys is that they're tied to a device (which can die) or they're tied to the iCloud keychain, which then gives you a chicken and the egg scenario for auth to your Apple account.
But of course, losing a security key if you don't have multiple backups can be catastrophic. And a 'nub' style passkey that you don't carry on your person and leave in the laptop may as well be a passkey for a lost or stolen device.
Royce Williams
Als Antwort auf Ricky Mondello • • •@rmondello
Not disagreeing (and I know this isn't new to you, Ricky!), but I hesitate to frame that as "more dangerous" full stop without context. The complexity of public comms always looms large here, and the trade-off tension of the other dangers (risk of compromise of any location that has access to the credential manager surface, etc.) is real -- for which many people are still better off, but for which a non-trivial number of people might be at higher risk vs managing a redundant set of physical keys, much as they would car or house keys. But trying to communicate that in bulk / by default is often more likely to produce confusion and lack of engagement rather than taking real steps towards passkeys. Sigh.
reynir
Als Antwort auf Darius Kazemi • • •Julia Evans
Als Antwort auf Darius Kazemi • • •∴ esoterik ∴
Als Antwort auf Julia Evans • • •Philip Borenstein
Als Antwort auf Darius Kazemi • • •David Fleetwood - RG Admin
Als Antwort auf Darius Kazemi • • •Darius Kazemi
Als Antwort auf David Fleetwood - RG Admin • • •