Passwordless Google accounts are easier and more secure than passwords. Here’s why.

Slyne

Wise, Aged Ars Veteran
161
Upvote
12 (13 / -1)
Phishing and spear phishing is no longer a problem because HTTPS is nearly ubiquitous?

Also (much lower frequency but believe me that it’s a huge one for nation states) all the various forms of remote key loggers are mitigated by HTTPS?? Personally, if I were paranoid about being targeted in that way and needed to log in to Google on a fresh computer I’d prefer to point my phone at a QR code on the screen for 2 seconds, than slowly type out a strong password on the keyboard.

And in the context of this article do you really think Google are storing our Google account credentials in an exposed unencrypted database?

I do 100% agree with you that a longer term improvement would be to fully replace passwords with passkeys, to close off the legacy weaknesses in the password system.

Here’s my suggestion for how we get there: for phase 1 a big ubiquitous online player should do a parallel rollout of passkeys alongside passwords as a real world demonstration to get momentum, then for phase 2 all of the cloud keychain and third party password manager companies should discuss how to enhance interoperability and the OS and browser vendors should concurrently implement passkeys in their systems. This would mirror the success story with HTTPS and the security benefits it brought to the ecosystem.

At a known point early in this plan, arstechnica could write an article about what works/what doesn’t /what is planned in the future….
I don't see how this would solve spear phishing with password replay attacks. Most phishing MITM just replays the input to the server and replays the output to the victim, usually with a redirect at the end. Those types of attacks still work against TOTP MFA devices too, so those aren't really the attacks people are trying to prevent here.

If we are talking about nation state actors, they are just going to target the tech support of whatever they want access to so discussing technology to prevent that is meaningless.

And no, I never said Google was storing passwords in an unencrypted database. That's not how credential stuffing attacks occur. Usually people re-use passwords in multiple locations and the weaker sites expose the same passwords that were used on the sites that take their back-end more securely.

I agree with your suggestions for rolling out, with one caveat - actually publish a white paper that doesn't dabble in theoreticals such as the FIDO one claiming that users "probably" will have a second device to restore if their first device is lost. And this same white paper also shouldn't just suggest that passwords are used as the fallback for new devices, it should actually lay out the plan to fully remove passwords -- because that's the end goal right? We should know the steps we are going to take before we get there.
 
Upvote
1 (8 / -7)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
It obviously must be available not only during syncing, but also during authentication, since it's used for it. And it also has to be available during initial registration.

And that's what I'm trying to explain to you: It would be easy to authenticate with an existing device, and use that device to add an other public key, which is generated on an other, new, device, and sent to the old device by some means. For example, I could create a new secret key / public key keypair on my desktop machine, send the public key to my laptop, log in with my laptop, and add the desktop public key. I do similar things with SSH all the time.

There's no technical hurdle here. If that's not possible with passkeys, then that's by choice.

The private key is only available to the secure element normally. It is synced but E2E encrypted. With most competent secure elements you can load the encrypted private key and then decrypt on device I’d expect. You can’t just run an OpenSSL command on it for example because the secure element has the private key and it controls what you can do. Sign (or encrypt) only usually.
 
Upvote
8 (9 / -1)

Jim Salter

Ars Legatus Legionis
17,201
Subscriptor++
I don't have any problem with the passkeys themselves, but I'm just a bit disturbed to discover that Chrome can that easily manipulate my Bluetooth adapter whenever and however it likes. Even on Ubuntu.

I disabled BT to see what would happen, and sure enough, Google complained that it couldn't reach my phone... and offered to turn BT on for me. That, at least, did not work. Yet. (I assume it does work that way on Windows, and possibly MacOS as well.)

To be extremely clear, again, this has nothing to do with the passkeys themselves; as an authentication standard, they're fine. I am just not in love with how much control the browser has over my hardware (because the more control it has, the more control an attacker who owns the browser has).
 
Upvote
28 (30 / -2)
Sigh. Here we go again. The passkeys topic brings out the worst in the comments here and HN. Lots of paranoia and general spreading of FUD.

None of the “big three” tech companies will be getekeepers to your passkeys. Passkeys are held on a device. If you don’t want to sync your passkey via some sort of service then put the same passkey on multiple devices. You only have one device And now it’s gone? That is the same problem as password managers without sync. In the end you will have to reauthenticate with different services just like you would in any similar case of being locked out. Most people will sync their passkeys like they do their passwords. And no, if Google shuts down your account they can’t disable the passkeys you already have on your devices. You’ll lose their sync service but you could then start using another one instead.

Passkeys can’t be phished, can’t be forgotten, can’t be gotten through data leaks, and are inherently unique and secure. Those are really big improvements. They are also easier to use because once they are on your device authentication is simple.
I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.

If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.

No thanks.
 
Upvote
-11 (3 / -14)

fvgfvghvgv

Smack-Fu Master, in training
62
Subscriptor
Yeah dude, totally:
https://security.googleblog.com/2023/05/so-long-passwords-thanks-for-all-phish.html
Either passkeys are a great, more secure alternative to passwords - in which case Google has every reason to try to remove passwords. Or passkeys are just a simple alternative that doesn't actually do anything because there's a password fallback that can be used for the exact same verification.

If it's the former, then why are you trying to argue that Google isn't pushing passwords out (as their multiple blogs clearly imply is in the future).

Unless, because nobody has an answer as to how they do this because they still have password fallback and literally zero of the FIDO docs, Google, Apple blogs say anything about how they are going to implement fallback without passwords that you are subconsciously aware that they can't possibly be talking about removing password fallback. In which case, I redirect you to my original point, which is that passkeys are useless with password fallback.
You’re confusing yourself once again. None of the quote implies anything about deleting passwords. I hope they do delete passwords for their own accounts at some point but that’s realistically decades in the future if it ever happens, once most of the edge cases have been solved or gone away and when most of the rest of the internet has made passkeys a ubiquitous option.

Look at how long it’s taking to get 2FA rolled out for any more than a small fraction of the deep web!

So yes, I think a few Google blog posts saying ‘many devices don’t support passkeys yet’ and ‘we will apply closer scrutiny to password login activity because we believe those are the weak link’

is NOT the same as:

‘we plan to delete everyone’s Google account passwords in the near future’
 
Upvote
-12 (4 / -16)

shawn99452

Smack-Fu Master, in training
10
I'm all for the IDEA of using passkeys in general, but it does have some serious limitations... for myself, the lack of support for computers (MANY desktop PCs) without Bluetooth is a pretty big one. Additionally, the lack of Linux support is a big deal for me personally - hopefully someone will create a self-hostable passkey storage system (there would obviously need to be some way to add your self-hosted passkey server URL or similar when adding a passkey to a service).

Another big issue though is one I already have to deal with with 2FA (though I use and support 2FA generally) - I do a lot of technical support for older people, and sometimes need to do things remotely, on their behalf. With 2FA it's extremely difficult to log into someone else's account (Google, etc.) to change a setting, look something up, help them recover or reset a password, etc.. This is of course intentional and generally a good thing, but it does complicate technical support. Passkeys seem even worse for this purpose than 2FA, since at least with 2FA I can call them and ask me to read a code displayed on their phone, or tell them to tap whatever prompt is displayed.
 
Upvote
4 (8 / -4)

fvgfvghvgv

Smack-Fu Master, in training
62
Subscriptor
I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.

If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.

No thanks.
You won’t lose any accounts and you definitely have not understood the way passkeys authenticate.
 
Upvote
6 (9 / -3)
You’re confusing yourself once again. None of the quote implies anything about deleting passwords. I hope they do delete passwords for their own accounts at some point but that’s realistically decades in the future if it ever happens, once most of the edge cases have been solved or gone away and when most of the rest of the internet has made passkeys a ubiquitous option.

Look at how long it’s taking to get 2FA rolled out for any more than a small fraction of the deep web!

So yes, I think a few Google blog posts saying ‘many devices don’t support passkeys yet’ and ‘we will apply closer scrutiny to password login activity because we believe those are the weak link’

is NOT the same as:

‘we plan to delete everyone’s Google account passwords in the near future’
Of course they don't plan on deleting everyone's passwords in the near future. Because they don't know how to get rid of password backups. But the messaging of their titles "Goodbye passwords, thanks for all the phish" and "Maybe next password day, you won't need to remember your password!" are very implicative of actually not needing passwords. Which is a disservice to users and gives the false implication that passkeys are more secure than passwords, even with password based backups being able to do 100% of what passkeys can do.

So again, the weakest link is password backups, without removing password backups, passkeys are useless from the standpoint of providing actual security benefits. If there is no known methodology to remove password backups, then what is the point of passkeys?
 
Upvote
23 (28 / -5)

pika2000

Ars Scholae Palatinae
929
“Oh yeah I have hardware key and iCloud syncing so it works great for me and thus you must use it as well”

Tired of these tech bloggers assuming everyone else have the same “working” setup as his. I won’t be using these in the near future as much as I want to, because seamless support is not there yet, and breaking something somewhere will be bring more headache.
 
Upvote
8 (12 / -4)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
I don't have any problem with the passkeys themselves, but I'm just a bit disturbed to discover that Chrome can that easily manipulate my Bluetooth adapter whenever and however it likes. Even on Ubuntu.

I disabled BT to see what would happen, and sure enough, Google complained that it couldn't reach my phone... and offered to turn BT on for me. That, at least, did not work. Yet. (I assume it does work that way on Windows, and possibly MacOS as well.)

To be extremely clear, again, this has nothing to do with the passkeys themselves; as an authentication standard, they're fine. I am just not in love with how much control the browser has over my hardware (because the more control it has, the more control an attacker who owns the browser has).

To be fair here, it’s Chrome itself - the compiled binary, not JavaScript - doing that. It’s still scary because a code break gets access, but that’s true of any binary - once you’re running native code outside a sandbox all bets are off.
 
Upvote
16 (16 / 0)

fvgfvghvgv

Smack-Fu Master, in training
62
Subscriptor
I'm all for the IDEA of using passkeys in general, but it does have some serious limitations... for myself, the lack of support for computers (MANY desktop PCs) without Bluetooth is a pretty big one. Additionally, the lack of Linux support is a big deal for me personally - hopefully someone will create a self-hostable passkey storage system (there would obviously need to be some way to add your self-hosted passkey server URL or similar when adding a passkey to a service).

Another big issue though is one I already have to deal with with 2FA (though I use and support 2FA generally) - I do a lot of technical support for older people, and sometimes need to do things remotely, on their behalf. With 2FA it's extremely difficult to log into someone else's account (Google, etc.) to change a setting, look something up, help them recover or reset a password, etc.. This is of course intentional and generally a good thing, but it does complicate technical support. Passkeys seem even worse for this purpose than 2FA, since at least with 2FA I can call them and ask me to read a code displayed on their phone, or tell them to tap whatever prompt is displayed.
Passkeys are actually a huge benefit for your particular use case and it’s one thing that I’ll benefit from too (supporting aging family members).

They can have a passkey for their account saved on their system, and you can have a different passkey for that same account, saved in your system.

The main reason I’ll benefit is that they won’t become preconditioned to frequently giving out 2FA codes over the phone or tapping yes on a screen prompt.
 
Upvote
-2 (6 / -8)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.

If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.

No thanks.
Well, shit, I change devices and OS much more frequently than that. Must have lost my passkey…. Oh … all of never times.

I’ve deleted FIDO2 Authenticators deliberately far more often than I’ve lost them, because I actually write code that works with them and tests them.
 
Upvote
11 (11 / 0)

adamsc

Ars Praefectus
4,269
Subscriptor++
The iCloud Keychain (and Windows Hello and Google Cloud) absolutely do NOT (sorry) have the private key. The private never leaves the device.

This was true for what Apple calls “Face ID or Touch ID for the Web” – aka WebAuthn using the Secure Enclave – but it's more complicated for passkeys because those do store the private key in the iCloud Keychain but heavily encrypted and also protected with things like rate-limiting. Here's how Apple describes it in https://support.apple.com/en-am/HT213305:

Synchronization security​

Passkeys were designed to be convenient and accessible from all devices used on a regular basis. Passkeys sync across a user's devices using iCloud Keychain.

iCloud Keychain is end-to-end encrypted with strong cryptographic keys not known to Apple and rate limited to help prevent brute-force attacks even from a privileged position on the cloud backend, and are recoverable even if the user loses all their devices.

Apple designed iCloud Keychain and keychain recovery so that a user's passkeys and passwords are still protected under the following conditions:
  • A user's Apple ID account used with iCloud is compromised
  • iCloud is compromised by an external attack or an employee
  • A third party accesses user accounts

Recovery security​

Passkey synchronization provides convenience and redundancy in case of loss of a single device. However, it's also important that passkeys be recoverable even in the event that all associated devices are lost. Passkeys can be recovered through iCloud keychain escrow, which is also protected against brute-force attacks, even by Apple.

iCloud Keychain escrows a user's keychain data with Apple without allowing Apple to read the passwords and other data it contains. The user's keychain is encrypted using a strong passcode, and the escrow service provides a copy of the keychain only if a strict set of conditions is met.

To recover a keychain, a user must authenticate with their iCloud account and password and respond to an SMS sent to their registered phone number. After they authenticate and respond, the user must enter their device passcode. iOS, iPadOS, and macOS allow only 10 attempts to authenticate. After several failed attempts, the record is locked and the user must call Apple Support to be granted more attempts. After the tenth failed attempt, the escrow record is destroyed.

Optionally, a user can set up an account recovery contact to make sure that they always have access to their account, even if they forget their Apple ID password or device passcode.
 
Upvote
6 (6 / 0)

KeyboardWeeb

Ars Tribunus Militum
2,926
Subscriptor
WebAuthn already integrates seamlessly with Gmail on Thunderbird.

This comment is yet another example of someone not asking questions, but confidently making an assertion (that passkeys won't work in your environment) based on a technically inaccurate understanding. Rather than jump to conclusions, why not investigate a little first?
Perhaps I wouldn't have made such an assumption if I had ever seen anything at all to indicate that Thunderbird would have support for Passkeys any time soon. Given how long it took for OAuth support to get added, I think it was reasonable to conclude it wouldn't be a thing I could do in Thunderbird.

Incidentally I've tried the demo on passkeys.io, both Firefox and Vivaldi on Manjaro want me to plug in a security key. Whether that's a limitation of the browsers or the demo, I am not sure.
 
Upvote
6 (8 / -2)

adamsc

Ars Praefectus
4,269
Subscriptor++
I do a factory reset on my phone and tablet roughly every 90 days.
I reformat the os drive of my computer, and install a new distro roughly every six months.

If I understand the way passkeys authenticates things, I'll lose all of my accounts within six months.

No thanks.

You only lose your accounts if you wipe all of your devices simultaneously, nuke your recovery codes, and don't set up any kind of backup or escrow system, or even simply have something like a password + Yubikey backup for your critical accounts. If you aren't intentionally trying to lose data, here's what the process looks like:

  1. Unenroll your device before you wipe it.
  2. Re-enroll it after you do the install by approving access from one of your other devices.

There is no step 3.

If you forget, the process looks like this:

  1. Enroll the newly-installed device using one of your other devices.
  2. Remove the old registration using one of your other devices or the one you just added.
There is no step 3.
 
Upvote
13 (13 / 0)

Still Incorrect

Wise, Aged Ars Veteran
103
Subscriptor++
Yup. If they actually publish how they plan to remove passwords as backup auth, passkeys could be excellent.
They actually have - if you know how to translate the marketing speak "Passkeys" into the technical spec: "multi-device credential" or "backup-eligible credential".

The current draft spec for the Webauthn is here: Webauthn

When you register a passkey, the website can see that it's a multi-device credential, and if the private key is backed up. In that case:
(Relying Party = Webserver, in their terminology, "Client" = Browser, "Authenticator" = Yubikey, for example, or the one built in to the phone or computer "Platform Authenticator")

Credential backup eligibility and current backup state is conveyed by the BE and BS flags in the authenticator data, as defined in Table .


The value of the BE flag is set during authenticatorMakeCredential operation and MUST NOT change.


The value of the BS flag may change over time based on the current state of the public key credential source. Table below defines valid combinations and their meaning.


BE BS Description
0 0 The credential is a single-device credential.
0 1 This combination is not allowed.
1 0 The credential is a multi-device credential and is not currently backed up.
1 1 The credential is a multi-device credential and is currently backed up.
BE and BS flag combinations
It is RECOMMENDED that Relying Parties store the most recent value of these flags with the user account for future evaluation.


The following is a non-exhaustive list of how Relying Parties might use these flags:



So after you generate a passkey and back it up, the server can know and suggest that you remove your password.
 
Upvote
15 (15 / 0)

Mr. Kite

Ars Scholae Palatinae
943
Subscriptor
Sure looks about the same to me...and I'm guessing to places that say "no thumbdrives" would agree?

I see a plastic/metal stick with a USB connector on the end in the Yubikey marketing...much like the sampling of thumbdrives from google images. Though if it has Bluetooth would also mean places that allow USB but don't allow personal wireless electronics would probably take it away.

Sorry to contribute to this train wreck, but WHAT are these places saying “no thumbdrives”? I can’t think of any context involving personal devices where this makes sense.
 
Upvote
-18 (1 / -19)

fvgfvghvgv

Smack-Fu Master, in training
62
Subscriptor
I don't see how this would solve spear phishing with password replay attacks. Most phishing MITM just replays the input to the server and replays the output to the victim, usually with a redirect at the end. Those types of attacks still work against TOTP MFA devices too, so those aren't really the attacks people are trying to prevent here.

If we are talking about nation state actors, they are just going to target the tech support of whatever they want access to so discussing technology to prevent that is meaningless.

And no, I never said Google was storing passwords in an unencrypted database. That's not how credential stuffing attacks occur. Usually people re-use passwords in multiple locations and the weaker sites expose the same passwords that were used on the sites that take their back-end more securely.

I agree with your suggestions for rolling out, with one caveat - actually publish a white paper that doesn't dabble in theoreticals such as the FIDO one claiming that users "probably" will have a second device to restore if their first device is lost. And this same white paper also shouldn't just suggest that passwords are used as the fallback for new devices, it should actually lay out the plan to fully remove passwords -- because that's the end goal right? We should know the steps we are going to take before we get there.
You don’t even understand how passkeys are a strong mitigation against phishing and MITM attacks? Then why are you filling the comments with misinformation when you haven’t done basic research? This was all explained clearly in the articles you have been very vocal in the comments.

Also, you said earlier that passwords are rarely compromised at point of use and that credential compromises are mostly from dictionary attacks, credential stuffing and exposed unsecured password databases. Now you’re saying that actually there are phishing attacks that are successful even with TOTP, and the NCSC and CISA both state that phishing is still the prevalent attack vector, so I still say that you were wrong earlier and that passwords are still vulnerable at the point of use.

Nation states are not going to target the tech support of an online service like Google which includes end to end encryption and which notifies its users if it suspects a hostile intrusion attempt. That would be the worst thing they could do. They would get an encrypted blob of data at best, and risk that the target would likely be alerted and seek security advice.

I’m glad that you like my suggested roadmap but I was being sarcastic; what I suggested is actually happening now and what is planned for the future, as documented in this article…. But don’t waste your time waiting for meaningful whitepapers, for decades now they have been another term for ‘marketing fluff to send to the accountants and upper management’ and the target audience is the IT people who know just enough to be dangerous
 
Upvote
-5 (4 / -9)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
There is a lot of confusion here, I think because an entire tech stack has been dumped on us and presented as a fait accompli. Let me, as an ignoramus, try to deconstruct it by analogy with what I do understand: SSH key pairs. I invite others to pick holes in what I get wrong.

1. Public/private authentication keys. This works roughly the same as SSH. The website only knows your public key, and you sign messages to prove you hold the private key.

2. Anti phishing protection. Keys are specific to a site, so a phishing site gets a different key. SSH has host keys for this, I assume keypass uses something to do with TLS host keys? Your browser uses that to select which key to use? Or just by DNS name?

3. Means of unlocking the keys to prove the right user is using them. SSH has passphrases, I assume this is where the biometric / Bluetooth thing comes in? SSH can also unlock keys with smartcards, and so I assume the biometric is a bit like another unlock mode?

4. Syncing keys between devices. This is presumably where cloud ‘ecosystems’ come in, like iCloud and Chrome password sync? For SSH there’s no support, but you can cook up your own with rsync or whatever?

What did I get wrong?

If the above is broadly right, I could imagine building an open stack that basically does the same as SSH does using a pile of files in ~/.ssh and rsync to move between devices. That is the ‘bicycle’ approach where all the moving parts are exposed and easy to understand what’s going on.

It's not just dumped on people - this is an update to FIDO2, itself the second version of the standard. U2F was FIDO1; this is CTAP 2.2 ([edit: Corrected from my WAG of 2.4 that was wrong, thanks Still Incorrect!]), part of FIDO2/WebAuthn. This is really nothing complicated as that goes.... they've loosened up the Authenticator requirements so that the private key can be (must be...) copied securely, and added some Javascript features to make life easier. Passwordless logins? Always been possible with FIDO2. That's the neat part of it - FIDO1 could only be MFA. Adding a private key to your browser stored in the TPM or secure element? Always been possible, and was previously implemented in Chrome, Firefox and Safari. What's new is that it can be synced, and accessed via the BT/QR rigmarole. Previously, it was referred to (and flagged to web sites) as "platform specific keys", as opposed to the portable ones which were hardware devices. Now it's PassKeys.
 
Last edited:
Upvote
10 (10 / 0)

Still Incorrect

Wise, Aged Ars Veteran
103
Subscriptor++
The FIDO specs require that whatever syncing mechanism a user elects (be it from Apple, Microsoft, Google, or a third party) it provide end-to-end encryption the way iCloud Keychain and password syncing with browsers currently do (on Chrome, this E2EE must be turned on).

Is this requirement documented anywhere?

I ask because before FIDO had their metadata service to list compliant authenticators. According to the spec, they only list key protection types - and there's nothing between Software and the different hardware types.

Spec here: Metadata

See 3.2 Key Protection Types
 
Upvote
4 (4 / 0)

adamsc

Ars Praefectus
4,269
Subscriptor++
Since the entire point of the passkey system seems to be to get rid of passwords, let me list some of the benefits of passwords:
  • they are simple enough to understand for anyone mentally capable of operating an electronic device
  • they are easy to remember if you make any effort at all and regularly use them
  • they work on all operating systems out of the box
  • they don't require Internet access (some systems are offline for a good reason)
  • they don't require the cooperation of any third party
  • they don't require the presence of a smartphone or other gadget
  • they don't require Bluetooth, WiFi, cameras or batteries
  • they can - in an emergency - be stored without the need of electricity
  • they can be easily transmitted to another person without the use of any device
  • if you are not handicapped and not using a smartphone, authenticating with a password takes only a few seconds

Your points #1, #2, and #10 are just wrong – ask anyone who works in tech support how often they have to do password resets because someone forgot their password, left their caps lock key on (or mispositioned their hand on the keyboard), or fudge-fingered it enough times to get locked out. Yeah, yeah, I know you personally always hammer it out perfectly but trust me, anyone who gets helpdesk calls has a … less optimistic … view of humanity. I'll also add that I support a lot of blind users and password entry massively sucks for them because many sites have complexity requirements which are hard for screen reader users and if you aren't a proficient touch-typist saying it out loud isn't great. That's a niche but it's one that many people building authentication systems are legally required to support well, too, and it's one of the reasons why I'm interested in the technology since “Do you want to login with your passkey?” “Yes” is at least one order of magnitude faster and easier than any form of password + MFA for many those users.

Point #3 is true of WebAuthn MFA but always passkeys – something like a Yubikey works anywhere you have USB/NFC but you might need to set a PIN or use their biometric series keys for passkey implementers like Google.com which require more than a simple tap.

Points #5, #6, #7, and #8 are also true of all forms of WebAuthn – both MFA and passkeys. Point #4 is true except for the first time you enroll a device when synchronizing an existing key. After the first time you've synchronized your keys, you don't need a network connection. If you don't want to sync, you can also buy a couple Yubikey biometric keys which again work fully offline anywhere you have USB or NFC.

That leaves #9, which is bad practice and should be avoided if at all possible. Modern systems have things like role-based authentication, where people never share passwords but multiple people are allowed to assume a given role, or things like legacy or delegated accounts where you again never share passwords but give one or, even better, multiple people required in combination the ability to do something like reset your password or gain control of your files.

Just because something is new and you haven't learned how it works doesn't mean it's bad or to be avoided. Passkeys are a big change for most of us – .gov excepted since PIV/CAC goes back to the previous century there even if few other places adopted it – but they have a number of usability improvements in addition to the security benefits, and there's a clear path for building out some of the missing parts (e.g. I really want the ability to sync an Apple / Google passkey to a Yubikey so I could drop it in my safe just in case).
 
Upvote
-1 (7 / -8)

adamsc

Ars Praefectus
4,269
Subscriptor++
If I have a Passkey on my old Android phone, how do I transfer or set it up on a new Android phone?

The current implementation uses Google Password Manager:

https://security.googleblog.com/2022/10/SecurityofPasskeysintheGooglePasswordManager.html
When a user sets up a new Android device by transferring data from an older device, existing end-to-end encryption keys are securely transferred to the new device. In some cases, for example, when the older device was lost or damaged, users may need to recover the end-to-end encryption keys from a secure online backup.

To recover the end-to-end encryption key, the user must provide the lock screen PIN, password, or pattern of another existing device that had access to those keys. Note, that restoring passkeys on a new device requires both being signed in to the Google Account and an existing device's screen lock.
 
Upvote
5 (5 / 0)

Secondfloor

Ars Praefectus
3,273
Subscriptor
It obviously must be available not only during syncing, but also during authentication, since it's used for it. And it also has to be available during initial registration.

And that's what I'm trying to explain to you: It would be easy to authenticate with an existing device, and use that device to add an other public key, which is generated on an other, new, device, and sent to the old device by some means. For example, I could create a new secret key / public key keypair on my desktop machine, send the public key to my laptop, log in with my laptop, and add the desktop public key. I do similar things with SSH all the time.

There's no technical hurdle here. If that's not possible with passkeys, then that's by choice.

The private key is not accessible. Why not look it up instead of repeating a falsehood over and over.
 
Upvote
-8 (4 / -12)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
I am not talking about other services. Google has posted (at minimum) 5 blog posts saying passkeys will kill passwords, yet have never once detailed how passkeys will operate in isolation of said passwords. I used bluetooth to try and get my point across - which is that it does not matter if Google accounts work well for most people, passwords are still being used as a backup - which defeats the entire purpose of passkeys as a whole.

If passwords are used as a backup then there is zero point to passkeys. Passwords will still be in auth DBs, passwords will still get leaked, passwords can still be used to take over people's accounts. Passkeys, in their current shape and form, are pointless unless passkey-only users have a way to add new devices without passwords.

Fallback options aren't just options - from a security standpoint it determines whether or not the security mechanism actually makes an improvement of the overall security of authentication or not.

It's not whataboutism if the scenario in effect makes the service useless and pointless across all scenarios. And until there is a workflow that allows you to fully disable password backups and maintain the same abilities that passwords grant (access to accounts via any device) then this problem will be there.

If I design a garage door opener that uses PKI and nobody could ever imitate my opener's communication with my garage but create a fallback where it accepts a regular garage door opener's codes. Guess what, the fallback makes my new opener completely useless.

It's not noise when the fallback nullifies the advantages of the technology.

I think I've answered this on another thread somewhere, but passwords aren't required as a fallback in a passwordless design. You can just drop them as an authentication mechanism.

You can still keep it as a "I've lost all my keys, lets start the recovery process" method, in the same way 'security questions' are for passwords, or you can choose any other method you like ("I've lost all my keys, email me a link and SMS me a code I need to type on the links forms" ... or if you're IT for a company "walk up to the IT service desk and present your staff ID"). You wouldn't call it a password at that point, you'd call it a "recovery key", and instead of letting the user choose it, you generate it when creating the account and tell them to save it/print it or they may end up locked out.

You'll still get some people who blow that too, and that falls back to either "tough luck" or "here's our 1800 number..." or whatever you want.

But at no point do you give people the option of typing a password that can be phished in to the normal login form - they're only typing in passwords in very rare special cases where they know to expect it because they've started the process of recovery because they've lost their keys.

Edit: Fix typo. I can wall up an IT service desk, and believe me, at time's I'm sure every one of us would want to, but I think walking is usually the more useful process
 
Last edited:
Upvote
15 (16 / -1)

Still Incorrect

Wise, Aged Ars Veteran
103
Subscriptor++
It's not just dumped on people - this is an update to FIDO2, itself the second version of the standard. U2F was FIDO1; this is CTAP 2.4 (I think, I'm pull the number from memory and I could be wrong), part of FIDO2/WebAuthn. This is really nothing complicated as that goes.... they've loosened up the Authenticator requirements so that the private key can be (must be...) copied securely, and added some Javascript features to make life easier. Passwordless logins? Always been possible with FIDO2. That's the neat part of it - FIDO1 could only be MFA. Adding a private key to your browser stored in the TPM or secure element? Always been possible, and was previously implemented in Chrome, Firefox and Safari. What's new is that it can be synced, and accessed via the BT/QR rigmarole. Previously, it was referred to (and flagged to web sites) as "platform specific keys", as opposed to the portable ones which were hardware devices. Now it's PassKeys.
It's actually CTAP 2.2 and WebAuthn 3.

They finally published a working draft - it's here:

The QR code thingie ended up being called Hybrid Transport (section 11.5). There's lots of "cable" strings in the protocol surely because it was based on Google's version called "cloud assisted Bluetooth LE".
 
Upvote
7 (7 / 0)

Ozy

Ars Tribunus Angusticlavius
7,450
Since the entire point of the passkey system seems to be to get rid of passwords, let me list some of the benefits of passwords:
  • they can be easily transmitted to another person without the use of any device
Like when they find the post-it note stuck to your computer monitor?
 
Upvote
-1 (2 / -3)
They actually have - if you know how to translate the marketing speak "Passkeys" into the technical spec: "multi-device credential" or "backup-eligible credential".

The current draft spec for the Webauthn is here: Webauthn

When you register a passkey, the website can see that it's a multi-device credential, and if the private key is backed up. In that case:
(Relying Party = Webserver, in their terminology, "Client" = Browser, "Authenticator" = Yubikey, for example, or the one built in to the phone or computer "Platform Authenticator")



So after you generate a passkey and back it up, the server can know and suggest that you remove your password.
Thank you! This should be in the articles talking about passkeys, not on page 14 of a comments section.
 
Upvote
17 (17 / 0)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
Firefox support timeline for Passkey support (still a while away, not just on MacOS):

Source: https://connect.mozilla.org/t5/ideas/support-webauthn-passkeys/idc-p/30123/highlight/true#M17028

Update: found a more recent timeline

Sigh. Late to the party still. Google's making a dogs breakfast of it, which in no way surprises anyone, but they've got working stuff out there. Apple is across the board done. Microsoft rides on Google's coat tails (though to be fair, they do the Windows Hello part, that Google needs for it on Windows).

Any wonder I hate testing FIDO2 on Firefox (especially on Linux)
 
Upvote
3 (5 / -2)

adamsc

Ars Praefectus
4,269
Subscriptor++
Sorry to contribute to this train wreck, but WHAT are these places saying “no thumbdrives”? I can’t think of any context involving personal devices where this makes sense.

Not personal devices but companies and especially government. There are two concerns: the first is simply that USB storage is local storage and potentially risky — e.g. people have done tests where you can drop USB keys in the parking lot next to a building and some fraction of people will plug them into their work computer, which would be a great way to sneak malware into a secured network. The other is for any place which has data they want to avoid losing control of: if you can use a thumb drive, you can copy data on to it and take it out of the building where it can potentially become a disaster (intentional or not) — imagine if someone in HR wants to work at home and then drops the key with thousands of personnel records on it and you have to do a breach disclosure for all of them just in case someone malicious finds it.

The easiest answer in both cases is to block USB mass storage devices so you can allow things like keyboards and microphones but not storage. That still offers some attacks — a famous old one was https://lcamtuf.coredump.cx/plasma_globe/ — so places might go even further. It's been a while but a couple decades back when I was at a local security meetup with some people from the Navy SPAWAR facility, they said their protection system was a tube of epoxy: it was cheaper to pay someone to chisel it off while someone else watched a few times a year to replace broken keyboard or mouse than it was trying to figure out all of the possible ways someone could exploit something like USB, Firewire, etc. That's an extreme case but it is worth remembering that if you have any real cost to losing control of your computers or data it might be cheaper to limit how people can connect to the computers holding that data. I know people work in regulated industries who have certain things they can only do on locked-down terminal servers for the same reason — there's an upper bound to how quickly you could exfiltrate data if someone has to OCR a remote desktop session while they hold down the Page Down key.
 
Last edited:
Upvote
15 (15 / 0)

Mr. Kite

Ars Scholae Palatinae
943
Subscriptor
If you're logging in to Google with a password, you are already placing huge trust in Google authentication. Passkeys require no more or less trust than what you already are placing in Google. Google account passkeys aren't "authentication methods for the rest of your life." You can use your password anytime you like, and you can delete the passkey any time you want.
The account you are responding to seems to (possibly purposely) misunderstand that Google is somehow in the loop of using a passkey to login to another site. The words “Google passkey” in succession in a headline seems to have scrambled some brains to think this is a service provided by them making people dependent on Google’s good will or whatnot.

I’m half seriously starting to think some of the hysteria being enflamed here is from bot farms run by criminals protecting their business.
 
Upvote
-4 (6 / -10)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
It's actually CTAP 2.2 and WebAuthn 3.

They finally published a working draft - it's here:

The QR code thingie ended up being called Hybrid Transport (section 11.5). There's lots of "cable" strings in the protocol surely because it was based on Google's version called "cloud assisted Bluetooth LE".

Awesome! Thanks, corrected and credited in my original comment.
 
Upvote
5 (5 / 0)

Mr. Kite

Ars Scholae Palatinae
943
Subscriptor
Not personal devices but companies and especially government. There are two concerns: the first is simply that USB storage is local storage and potentially risky — e.g. people have done tests where you can drop USB keys in the parking lot next to a building and some fraction of people will plug them into their work computer, which would be a great way to sneak malware into a secured network. The other is for any place which has data they want to avoid losing control of: if you can use a thumb drive, you can copy data on to it and take it out of the building where it can potentially become a disaster (intentional or not) — imagine if someone in HR wants to work at home and then drops the key with thousands of personnel records on it and you have to do a breach disclosure for all of them just in case someone malicious finds it.

The easiest answer in both cases is to block USB mass storage devices so you can allow things like keyboards and microphones but not storage. That still offers some attacks — a famous old one was https://lcamtuf.coredump.cx/plasma_globe/ — so places might go even further. It's been a while but a couple decades back when I was at a local security meetup with some people from the Navy SPAWAR facility, they said their protection system was a tube of epoxy: it was cheaper to pay someone to chisel it off while someone else watched to replace broken keyboard a few times a year than it was trying to figure out all of the possible ways someone could exploit something like USB, Firewire, etc. That's an extreme case but it is worth remembering that if you have any real cost to losing control of your computers or data it might be cheaper to limit how people can connect to the computers holding that data. I know people work in regulated industries who have certain things they can only do on locked-down terminal servers for the same reason — there's an upper bound to how quickly you could exfiltrate data if someone has to OCR a remote desktop session while they hold down the Page Down key.
Sure, of course you should follow your employer rules with their devices. Hot tip: if they superglued your usb ports shut, maybe you’re not supposed to add your personal accounts on there.

The OP seemed to asking about some other public place and I wanted to hear about some bonkers rule from some amusingly informed security theater pro.
 
Upvote
-13 (1 / -14)

fvgfvghvgv

Smack-Fu Master, in training
62
Subscriptor
I’m late to this party but yeah… I already find the “enter username, next, enter password, next enter 2FA code/confirm prompt” workflow to be irritating but I understand the benefit to me and my employer. This… is just too much for me vs the risk of getting phished when I already have unique auto-gen passwords and MFA on everything that can accept it.

The average Joe or Jane who needs this the most can’t even recall their passwords without writing them down and can’t sort out a password manager is out long before I’m even irritated. They won’t be able to set this up alone and if someone walks them through setup, the first time they encounter this flow they’re going to fly into a rage. I have helped the “computer illiterate” do basic tasks like sign up for email. A trivial, two minute exercise for Ars Readers is a half hour in hell for them.
I don’t agree with you - registering an account with passkeys is effortless compared to setting up “enter username, next, enter password, next enter 2FA code/confirm prompt”. Signing in is totally effortless compared to juggling passwords and 2FA credentials.

Most computer illiterate people are far more comfortable with their phone than a laptop or desktop computer and using fingerprint or facial recognition biometric authentication comes more naturally to them to unlock the phone or access banking/messaging apps. In my recent experience, passkeys make all of this stuff easier.

For an example of the level of computer literacy of my family member who is using passkeys totally effortlessly on their eBay account: that same person recently asked me to investigate an issue with their laptop because the browser window had been too small for over a week - they did not realise that the edges and corners of a window can be left click dragged to change the size of the window…

Accessing eBay using passkeys on an iPhone and MacBook (both TouchID devices) was STILL easy for this person.
 
Upvote
0 (4 / -4)

SeanJW

Ars Legatus Legionis
11,927
Subscriptor++
Not personal devices but companies and especially government. There are two concerns: the first is simply that USB storage is local storage and potentially risky — e.g. people have done tests where you can drop USB keys in the parking lot next to a building and some fraction of people will plug them into their work computer, which would be a great way to sneak malware into a secured network. The other is for any place which has data they want to avoid losing control of: if you can use a thumb drive, you can copy data on to it and take it out of the building where it can potentially become a disaster (intentional or not) — imagine if someone in HR wants to work at home and then drops the key with thousands of personnel records on it and you have to do a breach disclosure for all of them just in case someone malicious finds it.

The easiest answer in both cases is to block USB mass storage devices so you can allow things like keyboards and microphones but not storage. That still offers some attacks — a famous old one was https://lcamtuf.coredump.cx/plasma_globe/ — so places might go even further. It's been a while but a couple decades back when I was at a local security meetup with some people from the Navy SPAWAR facility, they said their protection system was a tube of epoxy: it was cheaper to pay someone to chisel it off while someone else watched a few times a year to replace broken keyboard or mouse than it was trying to figure out all of the possible ways someone could exploit something like USB, Firewire, etc. That's an extreme case but it is worth remembering that if you have any real cost to losing control of your computers or data it might be cheaper to limit how people can connect to the computers holding that data. I know people work in regulated industries who have certain things they can only do on locked-down terminal servers for the same reason — there's an upper bound to how quickly you could exfiltrate data if someone has to OCR a remote desktop session while they hold down the Page Down key.

Good thing FIDO2 authenticators aren't USB storage devices. I think they're USB-HID. The one plugged into my laptop right now certainly seems to be.
 
Upvote
-2 (2 / -4)

Still Incorrect

Wise, Aged Ars Veteran
103
Subscriptor++
Sigh. Late to the party still. Google's making a dogs breakfast of it, which in no way surprises anyone, but they've got working stuff out there. Apple is across the board done. Microsoft rides on Google's coat tails (though to be fair, they do the Windows Hello part, that Google needs for it on Windows).

Any wonder I hate testing FIDO2 on Firefox (especially on Linux)
Apple is not done.

They have to implement an API to allow a third-party password manager to intercept the private key storage, or allow a third-party plugin to be an complete authenticator - Create keypair, Sign assertion, User verification, etc.

If Apple only allows private keys to be stored in iCloud, I'll have a hard time recommending passkeys to the group of users who uses iPhones and Windows computers. Those people will get stuck generating one passkey per ecosystem and/or hoping that account recovery works.
 
Upvote
4 (7 / -3)
The account you are responding to seems to (possibly purposely) misunderstand that Google is somehow in the loop of using a passkey to login to another site. The words “Google passkey” in succession in a headline seems to have scrambled some brains to think this is a service provided by them making people dependent on Google’s good will or whatnot.

I’m half seriously starting to think some of the hysteria being enflamed here is from bot farms run by criminals protecting their business.

The article itself says "whatever syncing mechanism a user elects (be it from Apple, Microsoft, Google, or a third party)". So the trustworthiness of the intermediary infrastructure handling key syncing is an important question. The ecosystem handling the keys matters, and right now there doesn't seem to be a non-big-corporation alternative.

The conversation in the comments was also talking about broader passkey adoption and what that might look like, not specifically just logging into Google, so perhaps that was confusing? When this technology is getting started is a reasonable time to start thinking about potential implications. People in tech have already seen how badly private corporations owning key bits of infrastructure can get.

If Dan had focused on answering questions like SeanJW or a bunch of other users here instead of getting on a high horse about misinformation (when he initially got the Bluetooth requirements wrong in the article itself lol) things would have been a lot calmer.
 
Last edited:
Upvote
11 (15 / -4)
You don’t even understand how passkeys are a strong mitigation against phishing and MITM attacks? Then why are you filling the comments with misinformation when you haven’t done basic research? This was all explained clearly in the articles you have been very vocal in the comments.

Erm, just went through all the articles and not one of them explains how this prevents MITM attacks. If I have a website and trick you into visiting it, I do not see any reason why this would not be susceptible to MITM attacks.

Client <--> Malicious Server <---> True App

The malicious server contacts the app on behalf of the client, requests the signature from the client and then relays it back to the application. They don't need the private key to do this, they just need the application to request the key and the client to respond with the correct key. This mechanism can, to a certain extent, be mitigated server-side but that applies to passwords and passkeys.

The type of phishing this does prevent is the static credential harvesting website that pretends to be a login page but doesn't actually relay anything to the real site. And that also misses the point which is to your next paragraph.

Also, you said earlier that passwords are rarely compromised at point of use and that credential compromises are mostly from dictionary attacks, credential stuffing and exposed unsecured password databases. Now you’re saying that actually there are phishing attacks that are successful even with TOTP, and the NCSC and CISA both state that phishing is still the prevalent attack vector, so I still say that you were wrong earlier and that passwords are still vulnerable at the point of use.

"Point of Use" is in real time. Replay attacks are rare and can be mitigated on the web-application side. Credential stuffing is not "point of use" - it is used whenever the attacker wants to use it, not the client.

Phishing definitely is prevalent, never said it wasn't. I am saying that with password backups, passkeys don't help mitigate said phishing attacks because the backup falls victim to the same attack methodology as the old authentication mechanism.

Nation states are not going to target the tech support of an online service like Google which includes end to end encryption and which notifies its users if it suspects a hostile intrusion attempt. That would be the worst thing they could do. They would get an encrypted blob of data at best, and risk that the target would likely be alerted and seek security advice.
Nation states definitely do target tech support pretending to be employees to reset devices/MFA. So no idea what you're going on about here.

I’m glad that you like my suggested roadmap but I was being sarcastic; what I suggested is actually happening now and what is planned for the future, as documented in this article…. But don’t waste your time waiting for meaningful whitepapers, for decades now they have been another term for ‘marketing fluff to send to the accountants and upper management’ and the target audience is the IT people who know just enough to be dangerous
Was fully aware you were being sarcastic. I was responding sardonically as nobody was showing the the plan to remove passwords (until page 14).
 
Upvote
0 (5 / -5)