TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Why do we still use passwords instead of public/private keys?

7 点作者 jonas123超过 7 年前
Reading about password breaches and how to protect logins, I wonder why it can't just be like with ssh - simple, secure, but virtually unguessable (at least for now)...

5 条评论

Artlav超过 7 年前
Ideally, passwords are in the heads of users, not accessible from a device. A key would, necessarily, be stored on a device, easily stolen by viruses or by stealing the device.<p>Also, it takes more discipline and understanding to handle keys than it takes to handle passwords.<p>Practically, there is no salvation anyway.
评论 #15970375 未加载
DominikSerafin超过 7 年前
Usability.<p>This is the same aspect that I think will be very important in making Bitcoin&#x2F;cryptocurrencies viable as a replacement for current currencies
owens99超过 7 年前
From a business perspective<p>User experience &gt; security
评论 #15971252 未加载
fiftyacorn超过 7 年前
we&#x27;d lose them
Jtsummers超过 7 年前
Key management is difficult. Trust is difficult. Some solutions out there exist that make it easier, but it&#x27;s still not as userfriendly as passwords can be.<p>Do you have one key per service? One key per identity and multiple services that you use that key&#x2F;identity with? Multiple keys associated with the same account?<p>Keybase offers an interesting way forward since it handles the key management side of things. It can also handle revoking keys and using multiple keys per service (no juggling the keys across devices, each device can get its own key). My two keys could be <i>jtsummers_home</i> and <i>jtsummers_mobile</i> both associated with jtsummers the identity on Keybase. If I add a new device, say <i>jtsummers_internationalmobile</i>, I can add it and still access my services while abroad. And when I want to scrap that one (I&#x27;ve returned home, lost the device, whatever) I can revoke it and services should no longer accept it when authenticating.<p>Downside is that this is one, centralized, service offering. Better would be a distributed or federated mechanism for the same concept.<p>If you don&#x27;t have something like Keybase, then your users will have to have a mechanism of reactivating service after losing a key, signalling you that the a key has been compromised or lost (and you need a way to trust this, how do you do that?). We still don&#x27;t have good business-to-consumer <i>secure</i> communication. In order for it to be secure you have to be inside their web-based service that the user has authenticated against. This is a bit of a Catch-22 situation. You can&#x27;t send them a secure email unless the user has a PGP key or similar (uncommon, and we&#x27;re back to key management and trust issues). You&#x27;ll also have to accept multiple keys so the user doesn&#x27;t have to move private keys across devices (a potential point of security failures). And that again gets back to users needing a way to reliably revoke keys for lost, stolen, or otherwise compromised devices.<p>I&#x27;ve done work with DoD where they use smartcards with a set of public&#x2F;private key pairs and do exactly what you want. Nearly every service uses these certificates for identity and access control. This is an effective way, but their solution to the trust problem is to issue 3-year keys through a certificate authority. This creates a trust problem for users: How do they know that the CA doesn&#x27;t make use of their private key somehow. DoD makes use, like many CAs, of a key escrow system where old keys can be retrieved but are, ostensibly, stored offline or behind an airgap of some sort. I believe there is also a mechanism they use to revoke keys early, but I never encountered this.<p>This works, and for the DoD work I did I had no reason not to trust that the keys were being stored and managed effectively. But I&#x27;m not about to trust an arbitrary CA, and many people wouldn&#x27;t trust a government CA. You have to solve this trust problem as well to move forward.