TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Testing FIDO U2F security keys

151 pointsby stargraveover 7 years ago

8 comments

tptacekover 7 years ago
You&#x27;d assume that a device as sensitive as a hardware security key would get extensive testing from the vendor, from 3rd parties contracted to the vendor, and from random unauthorized 3rd parties testing out of personal or public interest.<p>But in fact there are almost certainly commercial hardware security keys that receive <i>no testing at all</i> at the level AGL is working at --- which, while impressive and super interesting, isn&#x27;t as low-level as serious third party specialized crypto validation goes.<p>My takeaway from this is: buy the most popular U2F key (which happens to be Yubico&#x27;s). This isn&#x27;t a place where you want to shop around for interesting alternative brands.<p>Nobody pays me to say this and I have no relationship with Yubico of any sort.
评论 #15432268 未加载
评论 #15431504 未加载
评论 #15431680 未加载
jlgaddisover 7 years ago
Related (but slightly OT) question: has anyone ran into any issues when using either 1) a single Yubikey for both U2F and SSH authentication or 2) multiple Yubikeys simultaneously on the same machine (i.e., one for U2F, one for SSH)?<p>For SSH authentication, I use Yubikeys (and only Yubikeys) everywhere: my workstation at home (I WFH 99% of the time), my primary laptop, and a &quot;backup&quot; laptop. Each of these machines has its own &quot;dedicated&quot; Yubikey that I use to authenticate to remote SSH servers (a &quot;Nano&quot; that is left plugged in 24&#x2F;7). I also use these (with challenge&#x2F;response) to unlock encrypted LUKS volumes (containing ZFS pools) at boot, FWIW.<p>I would like to begin using U2F (AFAICT, U2F support should be coming to Firefox soon, if it hasn&#x27;t already; running FF57 Developer Edition here), preferably with these same Yubikeys I am already using for SSH. If there are any issues, however, I&#x27;m fine with using a separate Yubikey just for the U2F side of things (I have a few U2F-only Yubikeys laying around as well).<p>Basically, I want it to be as easy&#x2F;convenient as possible and, before I begin to attempt this, I&#x27;m just curious if anyone else is already doing this and, if so, what their experiences were and any issues they may have encountered. In theory, it should all just work but, in reality, well, who knows. TIA!
评论 #15431364 未加载
评论 #15433021 未加载
评论 #15431842 未加载
dpeckettover 7 years ago
A while back I looked into building my own hardware two factor key. I wanted to experiment with the technology. I&#x27;ve since backed off the idea due to several serious challenges with designing secure hardware for this purpose.<p>* By necessity there&#x27;s a pretty large attack surface, you&#x27;ve likely got a vendor specific bluetooth stack and coprocessor. The same goes for wired solutions with hardware USB peripherals (though atleast significantly less complex). Being sure the hardware peripheral doesn&#x27;t have any major memory safety issues is a complete bear to test, and that&#x27;s not even touching on sidechannel analysis.<p>* Running public key crypto on microcontroller (excluding specific hardware crypto support) is a little more novel than a desktop machine, the leading libraries are no where near as extensively battle tested. And there&#x27;s architectural concerns about sidechannel attacks and often the lack of any memory protection units (bigger chips solve these issues, but power budget concerns are tricky).<p>* And given all software has bugs, how do you update the firmware? Signed firmware patches as part of driver update? Who&#x27;s to say somebody hasn&#x27;t already owned your bootloader.<p>I think the solution to all this, is to abandon the idea of additional hardware, what if your smartphone could act as a two factor hardware token over Bluetooth? The big problem is pairing really, and how to make this an easy process for users, I never figured that out. On the other hand I did come up with a scheme that would allow usb based hardware tokens to work without additional drivers &#x2F; software and on all current major operating systems and browsers. I really ought to work on it, but as above I don&#x27;t trust embedded hardware (embedded hardware is such an antithesis to, move fast and break things).
评论 #15431357 未加载
评论 #15431413 未加载
评论 #15432579 未加载
Legogrisover 7 years ago
I&#x27;d be very interested to see the author review how the cryptocurrency hardware wallets Ledger[0] and Trezor[1] compare - they also have U2F functionality. I use my hardware wallet for U2F and I am guessing they are becoming more widely used for consumer users.<p>[0]: <a href="https:&#x2F;&#x2F;www.ledgerwallet.com&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.ledgerwallet.com&#x2F;</a><p>[1]: <a href="https:&#x2F;&#x2F;trezor.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;trezor.io&#x2F;</a>
评论 #15432022 未加载
评论 #15432274 未加载
wakkaflokkaover 7 years ago
I&#x27;d really like to buy a U2F token, but need to find one that let&#x27;s me use it mobile (Android) as well as on desktop.<p>I know that Yubico offers an NFC-enabled on, but it doesn&#x27;t support 4096-bit keys if I understand correctly.
评论 #15433731 未加载
hasaover 7 years ago
FIDO U2F is just enterprise stuff. My mom will never own one to log in to Facebook. So the market is very difficult for newcomers. That&#x27;s why we see lots of low quality products which come and go.
评论 #15432788 未加载
评论 #15432454 未加载
_Codemonkeyismover 7 years ago
Slightly OT, what do people use for U2F, Google Mail and Firefox?
评论 #15431760 未加载
评论 #15431555 未加载
评论 #15431857 未加载
jnwatsonover 7 years ago
I cannot fathom that folks still can&#x27;t parse DER correctly. It really isn&#x27;t complicated.