by ashamedlion on 8/7/12, 4:33 PM with 40 comments
by bithive123 on 8/7/12, 6:08 PM
We use Kerberos/LDAP at work so are able to use CoSign to provide web SSO. I did a quick write-up about a service that I wrote which allows me to use Google Authenticator as an additional factor with CoSign: http://it.isevil.org/blog/2011/11/13/authentication-service-...
Since it's just a Sinatra app, the web service could be used by other things. We also use it with FreeRADIUS so our users can use their second factor on the web and in their VPN client.
by SeoxyS on 8/7/12, 5:16 PM
The solution to security is to come up with better and innovative security solutions.
Imagine that you had a "log in with iPhone" button, like the common "log in with Facebook" buttons. It would send down a push notification to your iPhone that shows a dialog "Log in to hn.com? Yes | No." Pressing Yes uses fingerprint-sensing capability under the touchscreen to send anonymized[^1] biometric information to provider to authorize the login with.
You'd also get a smartphone app to generate temporary login keys for when you need to give a friend access to your account, and get a 32-byte "master" key that can be used to unlock the account without biometric access.
[^1]: simply a HMAC / hash value using both the biometric data + the domain being authorized would deal with privacy concerns.
by mgurlitz on 8/7/12, 5:18 PM
by zobzu on 8/7/12, 6:18 PM
- you can still social engineer your way out (!) - "oh i lost my phone and the recovery keys" "heres my name address cc number, etc please help!" (ie nothing has been solved)
- its quite annoying to use
- it doesnt solve everything, only weak passwords/brute force
- it locks you out if you lose your phone/token until you get back home to get your recovery keys
- compromising the phone (2nd factor for the general public) allow compromising both passwords and the authenticator
and the issue of passwords managers:
- they're stored everywhere because you need them (incl. your phone)
- you have a single password to decrypt them all
- compromising the phone, once again, give you all passwords, and the authenticator
by VBprogrammer on 8/8/12, 12:24 AM
by X-Istence on 8/7/12, 8:10 PM
by jamesmcn on 8/7/12, 6:02 PM
Until your two-factor system gets hacked, as happened to RSA: http://bits.blogs.nytimes.com/2011/04/02/the-rsa-hack-how-th...
The more common a security system is, the more attractive a target it is for professional (organized crime) hackers to attack.
by eldavido on 8/7/12, 6:02 PM
by krosaen on 8/7/12, 9:48 PM
by rgregory on 8/7/12, 7:10 PM
Google Authenticator is a great service imho, but I find myself moreso pleased with the 'application specific' password feature which allows me to abstract my exposure even further.
by chayesfss on 8/7/12, 5:42 PM
by tomjen3 on 8/7/12, 5:24 PM
by eswangren on 8/7/12, 7:11 PM
by rprasad on 8/7/12, 10:34 PM
Joking aside, once you start down the road to two-factor authentication, you might as well go to three factors if you are truly concerned about security. Moreover, at least one of those factors would need to be based on physical properties, i.e., biometrics, or some other intrinsically unique property that can't be forgotten or copied.