Fido U2F Protocol by Ather Ali

23
U2F - Universal 2nd Factor By Ather Ali

Transcript of Fido U2F Protocol by Ather Ali

Page 1: Fido U2F Protocol by Ather Ali

U2F - Universal 2nd Factor

ByAther Ali

Page 2: Fido U2F Protocol by Ather Ali

1. The FIDO (Fast IDentity Online) Alliance is a non-profit organization nominally formed in July 2012 to address the lack of interoperability among strong authentication devices as well as the problems users face with creating and remembering multiple usernames and passwords.

2. The FIDO Alliance plans to change the nature of authentication by developing specifications that define an open, scalable, interoperable set of mechanisms that supplant reliance on passwords to securely authenticate users of online services.

3. This new standard for security devices and browser plugins will allow any website or cloud application to interface with a broad variety of existing and future FIDO-enabled devices that the user has for online security.

Page 3: Fido U2F Protocol by Ather Ali

FIDO Alliance has 2 UAF and U2F Specifications

Page 4: Fido U2F Protocol by Ather Ali

Agenda

1. Introduction2. Threats 3. Todays Solutions4. U2F Solution5. Fido Ready Device6. Demo7. Behind the Scene8. How to implement

Page 5: Fido U2F Protocol by Ather Ali
Page 6: Fido U2F Protocol by Ather Ali

REUSED PHISHED KEYLOGGED

POSSIBLE THREATS

Page 7: Fido U2F Protocol by Ather Ali

SMS USABILITYCoverage Issues - Delay - User Cost

DEVICE USABILITYOne Per Site - Expensive - Fragile

USER EXPERIENCEUsers find it hard

Today's solution: One time codes: SMS or Device

Page 8: Fido U2F Protocol by Ather Ali

● One device, many services● Easy: Insert and press button● Safe: Un-phishable Security

The U2F solution: How it works

Page 9: Fido U2F Protocol by Ather Ali

Core idea: Standard public key cryptography:User's device mints new key pair, gives public key to serverServer asks user's device to sign data to verify the user.One device, many services, "bring your own device" enabled

Lots of refinement for this to be consumer facing: Privacy: Site Specific Keys, No unique ID per device Security: No phishing, man-in-the-middles

Trust: Verify who made the device(Attestation Certificate)

Pragmatics: Affordable today, ride hardware cost curve down

Speed for user: Fast crypto in device (Elliptic Curve)

Think "Smartcard re-designed for modern consumer web"

U2F PROTOCOL

Page 10: Fido U2F Protocol by Ather Ali

FIDO READY SECURITY KEY

http://www.amazon.in/gp/offer-listing/B00NLKA0D8/ref=sr_1_1_olp?ie=UTF8&qid=1434738887&sr=8-1&keywords=fido+key&condition=new

Page 11: Fido U2F Protocol by Ather Ali

DEMO

Page 12: Fido U2F Protocol by Ather Ali

https://demo.yubico.com/u2f?tab=login

Page 13: Fido U2F Protocol by Ather Ali
Page 14: Fido U2F Protocol by Ather Ali

server

PHISHER

Proof that User is there

Page 15: Fido U2F Protocol by Ather Ali

“I promise a user is here”,“the server challenge was: 337423”, “the origin was: accounts.google.com”,“the TLS connection state was: 342384”

Signe

dproofThatUserIsThere

Page 16: Fido U2F Protocol by Ather Ali

2. Processing

3. Verification

1. Setup

Relying Party

FIDO CLIENT

PROCESS FLOW

Page 17: Fido U2F Protocol by Ather Ali
Page 18: Fido U2F Protocol by Ather Ali
Page 19: Fido U2F Protocol by Ather Ali
Page 20: Fido U2F Protocol by Ather Ali
Page 21: Fido U2F Protocol by Ather Ali

https://fidoalliance.org/specs/fido-u2f-v1.0-ps-20141009/fido-u2f-overview-ps-20141009.html#goal-strong-authentication-and-privacy-for-the-web

1. How it works2. How handle generated3. How it secure by Mitm, phishing , malware etc.4. Device is Genuine 5. Etc

Folllow the link

If you want to cover them in details the topics below

Page 22: Fido U2F Protocol by Ather Ali

https://developers.yubico.com/Software_Projects/FIDO_U2F/For Developers

Page 23: Fido U2F Protocol by Ather Ali

Thanks!E-mail: [email protected]