Linode Forum
Linode Community Forums
 FAQFAQ    SearchSearch    MembersMembers      Register Register 
 LoginLogin [ Anonymous ] 
Post new topic  Reply to topic
Author Message
 Post subject:
PostPosted: Tue May 01, 2012 2:58 pm 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
Yubikey requires a $25 dongle and is only marginally compatible with mobile platforms. Want to log in on an iPad? Hope you have your Apple iPad Camera Connection Kit ($29) with you. Want to log in on an iPhone? Sorry, unsupported!

Sounds like a product so limited in scope as to be useless for many of us.


Top
   
 Post subject:
PostPosted: Wed May 02, 2012 7:10 pm 
Offline
Junior Member

Joined: Sat Jul 25, 2009 10:05 am
Posts: 26
Guspaz wrote:
Sounds like a product so limited in scope as to be useless for many of us.
Point taken, how about Google Authenticator or some other form of 2factor authentication.


Top
   
 Post subject:
PostPosted: Wed May 02, 2012 7:22 pm 
Offline
Senior Member
User avatar

Joined: Wed Apr 20, 2011 1:09 pm
Posts: 63
Guspaz wrote:
Yubikey requires a $25 dongle and is only marginally compatible with mobile platforms. Want to log in on an iPad? Hope you have your Apple iPad Camera Connection Kit ($29) with you. Want to log in on an iPhone? Sorry, unsupported!

Sounds like a product so limited in scope as to be useless for many of us.


Doesn't mean it can't be an option - it's not like offering it would hurt anyone anyways.

Worth noting those gripes are more Apple design flaws than anything else.


Top
   
 Post subject:
PostPosted: Wed May 02, 2012 7:46 pm 
Offline
Senior Member
User avatar

Joined: Tue May 26, 2009 3:29 pm
Posts: 1691
Location: Montreal, QC
Obsidian wrote:
Guspaz wrote:
Yubikey requires a $25 dongle and is only marginally compatible with mobile platforms. Want to log in on an iPad? Hope you have your Apple iPad Camera Connection Kit ($29) with you. Want to log in on an iPhone? Sorry, unsupported!

Sounds like a product so limited in scope as to be useless for many of us.


Doesn't mean it can't be an option - it's not like offering it would hurt anyone anyways.

Worth noting those gripes are more Apple design flaws than anything else.


Sure, as long as it's not the only option. As for Apple design flaws, it's the opposite, it's a Yubikey design flaw. They have no software solution. Google has managed to get their approach working on iOS, Android, Blackberry, heck, even your dumbphone or pager as long as they can receive SMS. Or even a voice-only landline or voip phone, since they can have their system read the number out to you. You can even print out a fixed set of pre-authorized single-use keys...

I'm not trying to say that Google's approach is best, only that Yubikey's limitation of requiring a full-sized USB port is very limiting. Yeah, they have RFID and NFC versions, but those are even less useful, since not many people have RFID or NFC readers just lying around...


Top
   
 Post subject:
PostPosted: Thu May 31, 2012 12:43 pm 
Offline
Senior Member

Joined: Wed Oct 20, 2010 12:35 pm
Posts: 111
Location: United Kingdom
I'd like to see Linode use the same method as Gmail which sends a verification code to your mobile phone before you can login. That means that I don't need a separate device just for Linode but it significantly increases the security of my account.


Top
   
PostPosted: Sun Jun 17, 2012 1:16 pm 
Offline
Junior Member

Joined: Fri Oct 24, 2008 4:56 pm
Posts: 28
Website: http://matiaskorhonen.fi
How about taking the same approach as Amazon Web Services?

With AWS Multi-Factor Authentication you can use a Virtual MFA Device (e.g. the Google Authenticator app) or a Hardware MFA Device (a keyfob from Gemalto, in Amazon's case)?

More about AWS MFA: http://aws.amazon.com/mfa/


Top
   
PostPosted: Tue Jun 19, 2012 9:27 am 
Offline
Senior Newbie

Joined: Mon Jun 11, 2012 12:24 am
Posts: 10
RFC 4226 - HOTP: An HMAC-Based One-Time Password Algorithm
https://tools.ietf.org/html/rfc4226

RFC 6238 - TOTP: Time-Based One-Time Password Algorithm
https://tools.ietf.org/html/rfc6238

TOTP is based on HOTP.

Implementing the contents of the two RFCs took me ~30 minutes in python. Generating the QR-encoded bitmap another five.

Using a 30 second rolling window for TOTP, enables full compatibility with http://code.google.com/p/google-authenticator/ - the Google Authenticator.

http://code.google.com/p/google-authent ... yUriFormat - this page defines the format of the string that Google Authenticator can use encoded as QR to add the soft tokens automatically.

By using the above you can immediately allow all Android and iPhone users the option of using two-factor authentication without the need of developing client applications of your own. The Google Authenticator is also open sourced. The client application does not require any network communication, and while there are more elaborate implementations of time codes -- these should be more than sufficient.


Top
   
PostPosted: Tue Jun 19, 2012 11:10 am 
Offline
Senior Member

Joined: Wed Oct 20, 2010 12:35 pm
Posts: 111
Location: United Kingdom
Cool stuff. I'll be sure to read those as I'm quite interested in this subject.


Top
   
PostPosted: Wed Jun 20, 2012 12:00 am 
Offline
Senior Member
User avatar

Joined: Sun Jan 18, 2009 2:41 pm
Posts: 830
Note that software tokens are more susceptible to attack. Where does the software TOTP generator store the shared secret? Can another process read the memory of the program while it's running? Also, if the user knows the shared secret, you don't really have two-factor authentication at all - just two instances of "something you know."

Of course, hardware tokens also suck if the manufacturer leaves copies of the shared secret lying around where others can get to them.


Top
   
PostPosted: Mon Jul 02, 2012 1:51 pm 
Offline
Newbie

Joined: Sat Mar 03, 2012 10:21 am
Posts: 4
@Vance, apparently you have not used google authenticator?

Yes, software tokens are more susceptible to certain kinds of attack. Unless you want to carry around a dedicated RSA or similar hardware token generator for linode, and the expense of the hardware is worth it, there is no other option. OATH is not perfect. The security of the device the secrets are stored on is weaker than a separate offline hardware token like an RSA token. That's irrelevant, unless you are willing to pay for and carry around separate hardware token generators for each of your accounts.

Let's walk through what happens when you set up 2-factor for some site using TOTP w/ google authenticator on an android or iphone device. The website or service gives you the secret. Often it's in the form of a QR code. In the case of google accounts, you can optionally chose to display it as a 16 character lowercase alphanumeric string (log(36^16)/log(2) = approximately 82 bits of entropy). Using the QR code means you don't have to type anything in manually.

The secret is stored in application-private storage, and you never need to deal with it again. If you lose your device, that's what one-time passwords are for, or a service might offer some other out of band reset procedure.

Yes, anything with root access on your handheld device can read the secret, I assume. If your handheld device is compromised, the malware has root, and you use the same device both to generate tokens and to log into services (e.g. websites) that use 2-factor auth, then you gain nothing over normal auth. That's also the case with SMS tokens, 3rd party auth like Duo Security, or anything else that doesn't rely on offline hardware.

There are a variety of ways to prevent that. You can avoid accessing OATH accounts from the same device you use to generate the OATH tokens, for example. You could also use a phone to generate the tokens and a tablet to access the service, or vice versa. It's still possible to compromise both the token-generating device (to get the OATH secret) and a normal computer (to get the password), but it's more difficult, and correlating the password with the secret would take some serious effort.

If you think that sort of two-device malware attack is just as likely as typical desktop malware that compromise passwords, you have a different threat model than I do. Arguably, if someone does not go crazy installing apps, handheld devices might be more secure than desktops/laptops/netbooks. Mobile device 2-factor isn't perfect security. It's better security than password-only auth in many attack scenarios, without the cost of dedicated hardware tokens.

I agree with you that the different factor categories are largely crap. It's a lot more complicated than "what you have" vs "what you know", because what you know is stored and can be intercepted on devices, so it becomes just another thing the attacker needs to have to compromise an account. Same with biometrics. Once you have the retinal vein, iris, fingerprint, handprint, or whatever other kind of bio pattern the device uses, unless the biometric device itself implements some sort of temporal one-time hashing before passing the digitized pattern to software, it becomes yet another thing you have, rather than something you are. Hardware tokens are the gold standard, but if you can carry hardware tokens around for financial accounts, google, aws, linode, and every other major service you use, you have larger pockets than I do.


Last edited by loxosceles on Sun Jul 15, 2012 3:46 am, edited 1 time in total.

Top
   
PostPosted: Tue Jul 03, 2012 12:34 am 
Offline
Senior Member
User avatar

Joined: Sun Jan 18, 2009 2:41 pm
Posts: 830
I'm not familiar with Google Authenticator; thanks for the overview. My point was just that software and hardware tokens are often spoken of interchangeably, when there are threats that hardware tokens protect against that software tokens don't. As someone once said, security involves weighing trade-offs. To do so accurately, you need to know the characteristics of the security measures being proposed.


Top
   
PostPosted: Thu Aug 02, 2012 10:51 pm 
Offline
Senior Member
User avatar

Joined: Wed Apr 20, 2011 1:09 pm
Posts: 63
Well, looks like dropbox gets two-factor first, before linode does.

Wonder how many more incidents it would take before things were taken serious enough to make implementing two-factor auth a priority.

_________________
うるさいうるさいうるさい!


Top
   
PostPosted: Fri Aug 03, 2012 1:38 pm 
Offline
Junior Member

Joined: Sat Jul 25, 2009 10:05 am
Posts: 26
Obsidian wrote:
Well, looks like dropbox gets two-factor first, before linode does.

Wonder how many more incidents it would take before things were taken serious enough to make implementing two-factor auth a priority.


You can use the IP Whitelisting though.


Top
   
PostPosted: Sat Aug 04, 2012 10:24 am 
Offline
Senior Member
User avatar

Joined: Wed Apr 20, 2011 1:09 pm
Posts: 63
Serial Cookie wrote:
Obsidian wrote:
Well, looks like dropbox gets two-factor first, before linode does.

Wonder how many more incidents it would take before things were taken serious enough to make implementing two-factor auth a priority.


You can use the IP Whitelisting though.

My ISP is likely to implement carrier-grade NAT soon. IP whitelisting is useless in that circumstance.

_________________
うるさいうるさいうるさい!


Top
   
PostPosted: Tue Aug 07, 2012 10:40 am 
Offline
Senior Newbie

Joined: Wed Aug 10, 2011 12:29 pm
Posts: 5
I just wanted to reiterate the request for 2-factor authentication for login to the Linode backend interface. I understand that there is IP address whitelisting (and I use this), but it is not as secure as 2-factor. The recent publicity of Mat Honan's hacked accounts (http://www.wired.com/gadgetlab/2012/08/ ... cking/all/) illustrates the problem. Perhaps use Google Authenticator (http://www.mattcutts.com/blog/google-tw ... ntication/)?


Top
   
Display posts from previous:  Sort by  
Post new topic  Reply to topic


Who is online

Users browsing this forum: No registered users and 0 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum

Search for:
Jump to:  
RSS

Powered by phpBB® Forum Software © phpBB Group