--
You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.
To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/219912b3-8248-4991-ad2a-27551771e4c9%40fidoalliance.org.
--You received this message because you are subscribed to the Google Groups "FIDO Dev (fido-dev)" group.To unsubscribe from this group and stop receiving emails from it, send an email to fido-dev+u...@fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/78d9391e-4acb-473b-94e3-1ef9dbdb48a2%40fidoalliance.org.
To view this discussion on the web visit https://groups.google.com/a/fidoalliance.org/d/msgid/fido-dev/1a03afb9-0a22-41df-aa7c-dc40e2612c42%40www.fastmail.com.
I find this idea very promising, especially when using a NFC smartcard ring [1]. [1] https://store.nfcring.com/products/omni
However, I am not sure wether a button is mandatory for FIDO2. I would consider a button on an NFC card user unfriendly due to the nature of NFC connections: NFC does not connect permanently it's rather tapping. A tap lasts maybe 0.2 seconds. But a browser/OS could interpret tapping (no NFC connection - connection established - connection lost) as equivalent to touching a button on a USB device.
Le 28/03/2020 à 05:04, Robert Quattlebaum a écrit :
> Note that the OMNI ring that is currently for sale is pre-personalized
> for 14443 Type-B. Every platform that I've tested so far that supports
> NFC FIDO authenticators requires that the authenticator use 14443
> Type-A. This is super unfortunate, and hopefully NFC|Ring will
> re-release a Type-A version soonish.
>
It's true that Android has a well-known bug regarding ISO 14443 Type-B.
Has soon as the FIDO UI kicks in, Android stops sending REQB. You can
easily spot this behavior using a protocol spy.
However, support for Type-A and B is a requirement for NFC compliance
for readers, extended length unfortunately isn't. I haven't had any
issue with any other platform so far. On which other platform did you
encounter issues with Type-B?
> A button on an NFC FIDO device would be better than nothing (it would at
> least prevent someone from attempting to scan the authenticator without
> you knowledge while sitting next to you on the bus), but they do have
> NFC-powered fingerprint sensors embedded into passive NFC
> cards: https://youtu.be/_HxHvPm_NFE?t=73
>
NFC FIDO devices are usually smartcards
Adding a capacitive
sensor is not so straightforward, but we are aware of these issues.
> With FIDO2 authenticators this becomes a bigger problem, because some
> prankster could do a denial-of-service attack by exhausting PIN retries
> or even resetting the authenticator over NFC, all without my knowledge.
> I really wish I could disable PIN entry and resets per-interface on my
> yubikey...
>
Yup, but we haven't come yet with a solution that can work as a standard.
Am Sa., 28. März 2020 um 23:19 Uhr schrieb Robert Quattlebaum
>> NFC FIDO devices are usually smartcards
> Is that really true? I would think most NFC FIDO devices would be key fobs. The only NFC FIDO authenticators in a card form factor I see on Amazon are combo cards that support BLE and sport an integrated battery. I know there is SurePass ID, but I've never seen one in the wild, nor seen it offered for sale to consumers.
A keyfob with NFC is basically a smartcard.
We're deploying lots of NFC-only smartcards with FIDO for use with Android or Win10 + NFC readers.
>> > With FIDO2 authenticators this becomes a bigger problem, because some
>> > prankster could do a denial-of-service attack by exhausting PIN retries
>> > or even resetting the authenticator over NFC, all without my knowledge.
>> > I really wish I could disable PIN entry and resets per-interface on my
>> > yubikey...
>> Yup, but we haven't come yet with a solution that can work as a standard.
> My solution is this:
>
> If the authenticator has other transports (like USB or BLE), then only allow four PIN attempts via NFC and disallow CTAP2 resets over NFC without some other authentication (like a pin). The idea is that there is no reason to allow permanently destructive actions to occur over NFC when there are other transports available that are much better indications of physical control over the device.
Managed environments like FIDESMO could allow management commands only over GP secured channels. I.e. reset, initialize, etc. (regarding your medium article this is also an option for OATH and any other application)
> If the authenticator is NFC-only, then add a significant (10+second) delay for each PIN attempt after PIN attempt 3, perhaps doubling in length after each attempt. Also require a significant delay for attempting a reset (45+seconds). This should make it significantly more difficult to perform such a denial of service attack because the attack would need to keep their reader in place for an extended period of time (and likely be noticed in the process).
How to count systicks? With proprietary APIs you can set the frequency of the CPU and implement a counter. Gemalto/THALES did something similar in the Smart Guardian (USB stick with flash and smartcard).
This is implementation dependent. And yes some implementations already
improved this processes, but there is no standardized consensus yet.
This is against multiple requests during intended use. NFC blockers exist and should be used.
In the EU we got payment, transport, student cards etc. pp. that could be attacked as well, so people are already buying wallets with NFC shielding or add cards with active blocking functionality.
If you put your dollars in a bus on the seat next to you without keeping an eye on them, they might be gone as well...
>>> We're deploying lots of NFC-only smartcards with FIDO for use with
>>> Android or Win10 + NFC readers.
>> As actual cards? Or as some other form factor? Are they (going to be)
>> available for consumers to buy, or are they being sold to institutional
>> buyers only? I'm curious.
>
> As ID-1 cards and as "keyfobs" as they are used in public transport.
> Basically you can buy those cards and
> different form factors (as well as different non-Java chips, EEPROM
> sizes) but not with this firmware completion.
> We issued some hundred of them at security conferences and in several
> hack-spaces since 2017.
> Indeed we started it as an eye catcher for a con.
When I mentioned /smartcards/, I really meant ISO 7810 ID-1 cards or
equivalent. You have a visible market of FIDO key fobs on Amazon for
direct buyers. But bear in mind the huge market share of smartcards,
payment cards, public transportation, electronic ID or passport,
corporate badge, etc, and some are already starting shifting to FIDO.
> The "it works for me" approach doesn't scale for standards bodies like
> FIDO Alliance. As we've seen with the Ledger applet.
If I remember correctly, ICAO eMRTD requires after a few failed attempts
to solve a proof of work game with increased difficulty/time.
Yet I've never heard on the field of prankster having fun blocking
biometric passports at airports, so maybe this is an unlikely attack.
>>> This is against multiple requests during intended use.
>>> NFC blockers exist and should be used.
>> NFC blockers are not available for all form factors: specifically
>> rings, key fobs, and implants. In the cases where you could fashion some
>> sort of RFID blocking solution it would seriously effect usability. In
>> my case (rings) there is no reasonable way to use an RFID blocker, so
>> having some sort of mitigation strategy for some form factors seems prudent.
>
> Esp. rings and implants should use some kind of secure management
> functionality and not left "open".
> Global Platform enables applications to utilize a secure communication
> path for PIN resets, re-initializations, etc.
>
> (As another example from Ledger: the Ledger nano-s / nano-x integrates
> a) PIN verification, b) PIN blocking
> after 3 attempts, c) device deletion, d) device recovery. It doesn't
> need FIDO2 (or GP) to make things more secure.)
"Authenticators are discouraged from allowing
unauthenticated NFC sessions to perform permanent,
irreversibly destructive actions instantaneously,
except when an additional physical interaction is
necessary to assert user presence (such as removing
a RFID shield or pressing a button)."
> On the other side you should notice some prankster fumbling around with
> your ring. Unless you're i.e. unconscious or lost your ring.
> FIDO tried already to make things more secure with FIDO2,
> but some parts are left up to the token
> implementers at the moment.
> Yay, you need to define the attack scenario (unconscious/lost = every
> form factor is at risk, going by public transport =
> user should keep an eye on his stuff - esp. if the user wants comfort on
> the other hand), because comfort vs. security.
> People are super skeptical about implants and rings here.
> Some buy those rings, some build rings for fun, this
> isn't new - but every time also as nothing more than just a toy
> without any risk.
> Except it breaks.
> I asked a friend, Tesla model 3 owner by himself.
> He leads the security team of one our largest banks here.
> I forwarded him your medium article. He laughed, says
> it's fun but was super scary when I asked "lets try it?".
>> All I'm saying is that it may be worthwhile to consider mitigation
>> strategies for destructive actions performed over NFC for certain form
>> factors. Maybe a card needs them less because they are usually held in
>> RFID-blocking wallets. That's a logical, reasonable conclusion you could
>> come to. But that logic doesn't apply to USB/NFC key fobs, or
>> authentication rings, or implants.
>
> Every device and every form factor has its peculiarities and we're still
> learning which form factors are used
> out there since technology has moved forward rapidly since the last 6
> years, use cases changed (see crypto
> currencies and their impact on hardware tokens), requirements change,
> etc. It's the same with the EU eIDAS
> token specification and its predecessor the German national electronic
> ID. Technology changes, use cases
> change over time (>10 years now from beta phase), requirements define
> life spans of ~10 years and you
> need to address a 100 million people.
>
> (one follow-up is
> i.e. https://www.bundesdruckerei.de/en/Unternehmen/Innovation/Optimos)
>
> While it seemed like a good idea to think about PIN unblocking keys
> (PUK) and the SO (security officer) role
> for FIDO tokens it makes it hard for the average end-user to understand
> the implications and manage them.
> FIDO is "security for the masses" and specifically rings and implants
> are still a very small subgroup.
> From my point of view rings and implants should utilize a managed
> environment by default. Esp. because
> FIDO couldn't handle all use-cases and applications contained on the
> device. OATH, wallets, access control,
> etc. All of these applications need a simple to understand and to handle
> secure management as well.
I'm pretty sure that FIDO for the masses will be mostly platform
authenticators /or/ second factory roaming authenticators.
The pin use cases will be mostly used in managed environment, e.g.
corporate where a SO can reset and setup again a token.
Once the retries counter reaches 0, the authenticator has to be reset before any further operations can happen that require a PIN.