Readit News logoReadit News
chrisweekly · 7 years ago
I recently used auth0 to implement passwordless login (via "magic link" emails) for a client project. Auth0's documentation is not great, but some of their blog posts are pretty good. In any case, if you're interested in WebAuthN, you could do worse than reading what Auth0 has to say about it:

https://auth0.com/blog/web-authentication-webauthn-overview-...

dawnerd · 7 years ago
Can I just say I detest magic link emails that don't offer me a way to just use my password manager?
elliotec · 7 years ago
How would a magic link email be used with a password manager?
Canada · 7 years ago
I don't want to let the password go. It gives me the freedom to rightfully access my service if I just know the secret, without any entanglent to some app, device, or other account.
Existenceblinks · 7 years ago
> if I just know the secret

Sure if one is minimalism (using a few services) Once a storage needed (load of brain, password manager, paper etc.), the "just" goes away.

> without any entanglent to some app, device

Again If said storage needed, this is not advantage anymore.

rodorgas · 7 years ago
Passwords will continue to exist. But it has a lot of flaws, so it's nice have alternatives.
ehsankia · 7 years ago
Is there a solution for the fact that all of your accounts will be secured by the same "source"? Isn't this almost close to using the same password on every site? I realize a physical secret is better than a password, but if someone gets their hand on your little FIDO device, do they instantly get access to all your accounts?
dontbenebby · 7 years ago
I've avoided getting a Yubikey because there's not an easy way to use it on my iPhone, sticking with TOTP. But that's a bit of an edge case. (iPhones lack NFC chips)
ak217 · 7 years ago
I agree it's annoying. They're working on it, but they should have really enabled it sooner. There's no technical reason, iPhone has the necessary NFC hardware. https://www.wired.com/story/yubikey-lightning-ios-authentica...
Rafert · 7 years ago
Feitian makes devices with Bluetooth support: https://www.ftsafe.com/Products/FIDO/Multi
dboreham · 7 years ago
fwiw, in case readers are curious, the NFC Yubikeys work fine on popular NFC-capable Android devices such as my GNote9.
zaarn · 7 years ago
In theory, password authentication can continue to exist by deriving a private-key in the browser from a password and using that to complete webauthn.
ams6110 · 7 years ago
I think fundamentally most users don't understand anything more complicated than passwords. Passwords are easy. They make sense. A kindergartener understands the idea of a secret word that only they know.

Tokens, certificates, FIDO -- it's black magic. Therefore people don't trust it.

It has to be as easy and intuitive as passwords or it's a non-starter.

That's why the SMS codes (though insecure) are so popular. People understand "enter this number that I just texted to you"

Ajedi32 · 7 years ago
Passwords are only easy if you're using them in an insecure fashion (sharing common passwords across multiple sites). Doing passwords right is actually really, really hard without the assistance of an external tool (password manager).

I get what you're saying though. Users are used to passwords, so moving to an alternative means of authentication will introduce a bit of friction. That said, I think that done right WebAuthn will actually be way easier to use than passwords. Users will just be able to sign in to their browser once, then use what is effectively single-sign-on for every site thereafter.

We're still quite a ways away from that point, but that's where we're headed.

lackingporpoise · 7 years ago
> I think fundamentally most users don't understand anything more complicated than passwords. Passwords are easy. They make sense. A kindergartener understands the idea of a secret word that only they know.

I don't think it's that conceptually difficult to understand even for a layman.

The bare minimum understanding of web security is that authentication is the process of proving who you are (your identity). You can do it one of three ways (or a combination of them):

  1. "Something you know" - Password, Background questions, etc.
  2. "Something you have" - Yubikey, Smartcard, TOTP, SMS, email, etc.
  3. "Something you are"  - Biometrics

fyfy18 · 7 years ago
OpenID Connect is probably the most popular alternative to having a password for every single site. Especially on mobile, most apps usually have an option to sign up/login with your Google or Facebook account.

I'm still a bit bummed that OpenID (the original version) got lost to history. It's not really 'open' if you are handing over the keys to Facebook or Google.

Deleted Comment

rkeene2 · 7 years ago
Millions of US Government users have no passwords.
vbezhenar · 7 years ago
I don't understand how does it work. If I'm using just desktop and don't have mobile phone or any specialized hardware, I can't login?
arianvanp · 7 years ago
Correct. You'll need a FIDO key to log in in that case
eikenberry · 7 years ago
What in the spec precludes this from being implemented in software?

[edit] Reading more of the spec it definitely seems like they meant for it to be possible to implement this in software. So while a physical FIDO device might be preferable, it shouldn't be necessary.

Spone · 7 years ago
https://webauthn.guide is a quite good overview of the spec

Deleted Comment

agentultra · 7 years ago
Does anyone else find these informal specifications difficult to digest?

The informative appendices link to papers on TPM and the like but it's hard to find a formal description of the protocol, or at least the sensitive parts, that could be independently validated or verified.

Has there been any work to formally verify/validate the design of this protocol that I'm not seeing?

INTPenis · 7 years ago
You're not alone. I'm self-taught in english and it's not my first language. Although native english speakers have commended me I still find reading technical texts taxing.

They fall in the category of any academic text. Be it from a uni, research group, specfication manual. I did not receive formal education in English so I don't understand those formal words. Every other sentence there's something I have to look up and then I'm in a rabbit hole.

Actually same goes for my native tongue in some respect since I dropped out of school before reaching university.

I've still managed to make a career in IT and often desire to read technical specifications but feel helpless when I try.

My strategy so far has been to wait for an implementation in a language I can understand like Python, hopefully.

_asummers · 7 years ago
They're commending you because your English is terrific =) Learning a language is tough work, but if you didn't say anything I would have had no idea.
ak217 · 7 years ago
What do you mean? https://www.w3.org/TR/webauthn/ includes formal specifications.
agentultra · 7 years ago
Formal as in Formal Mathematics -- a specification with a precise definition that can be verified by a model checker to have the desired safety and, if necessary, liveness guarantees.
ak217 · 7 years ago
Shameless plug of a WebAuthn relying party (RP) library that I implemented recently (Python server, JS client): https://github.com/pyauth/pywarp

Having worked with a few different standards before, I was pleasantly surprised by how easy to understand and ergonomic (https://github.com/google/mundane/blob/master/DESIGN.md) the WebAuthn spec was.

detaro · 7 years ago
wccrawford · 7 years ago
https://www.w3.org/2019/03/pressrelease-webauthn-rec.html.en

English version. (It wasn't originally in English for me, but maybe it was autodetecting something?)

Outpox · 7 years ago
It was in my native language (French). According to the "Translation" link[0] it's available in English, Japanese, Chinese and French.

[0] https://www.w3.org/Press/Releases-2019#webauthn-rec

tofflos · 7 years ago
smacktoward · 7 years ago
That's... actually not as bad as I was expecting it to be. If you're willing to limit your audience to modern browsers only, the only holdout is Safari; and on that score, what else is new.
dan1234 · 7 years ago
It’s actually included as an Experimental Feature in the preview version of Safari, so there’s some hope that it will be present in the mainline version before too long.
zanny · 7 years ago
Its not just whether the API is available but whether its practical to use. I'm not sure which browsers recognize or support fingerprint readers, though all the implementations seem to support usb u2f.

Feels like a total failure to launch that the spec doesn't recommend the use of browser accounts as credential providers. Every single major browser has an associated web account with it (Firefox Account, Google account, Microsoft account, Apple id, etc) and could trivially use those accounts as authentication providers.

gsnedders · 7 years ago
It's unsurprising this is the case: to be published as a Recommendation you have to demonstrate interoperable implementation experience.

The implementation report is at https://www.w3.org/2019/01/webauthn-report.html and shows Safari passing most of it, AFAICT. (Though it's based on Safari Technology Preview and is yet to ship.)

ljm · 7 years ago
I got a YubiKey a year or so back and looked at this. It seems like Safari's holding out on a confirmed spec because before then it was a bit too Chrome-specific.
imtringued · 7 years ago
I don't really get how that is surprising. Soon chrome based browsers will have 80% of the market share and more.