Hacker Newsnew | past | comments | ask | show | jobs | submit | mimming's commentslogin

I made the switch to a cellular tablet (9.7" iPad Pro) a couple years ago and it's been great.

It reduces the urge to whip out my mobile device at every moment of mild boredom, and collaborative apps like ported board games shine.

The one downside is that I look pretty silly when taking photos.


> The one downside is that I look pretty silly when taking photos.

I am glad you acknowledge that.

Although it is a little strange that we feel this way, what's actually silly about using a tablet to take photos?


Generally yes, but the admin has the power to either enforce it (for some or all users) or disable it domain wide.

If you were to create a new GSuite domain today, it'd be allowed for all users.


Yes google does.

The spec strongly encourages providers to allow multiple keys, and allow you to nickname them.

As far as I know everyone allows as many keys as you like except Vanguard and Amazon AWS (which both also only accept Yubico keys)


You use a less convenient backup authentication.

The specifics depend on the use case, but even if you fall back to something less secure like an email and TOTP, you still come out ahead overall because most authentications are done by U2F.


Essentially it borrows the protections from TLS. Here's a link to the relevant part of the spec: https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fid...

(Sorry if this comes across as RTFM, but I figured the source is better than my attempt at explaining)


Not at all, the specification is indeed very clear. Thanks for the link!


Channel ID has been depreciated and replaced by Token Binding but I'm sure U2F sites don't use either. The real protection is quite simple: incorporating the origin (domain name) in the protocol. So phishers would get a bad response from the token.


They mention Yubikey a lot by name in the post. Has anyone tried a U2F device from a different manufacturer?


I tried a Trezor 1. It prompts me to press the button, but then the browser prompts me to give permission for AWS to see the manufacturer/version of the device and then gives me the error "Attestation Certificate is not valid."

The link to "see information about supported configurations" is 404: https://docs.aws.amazon.com/iam/mfa-u2f-config


Aw, that's a bummer. First Vanguard and now AWS support only Yubikey brand U2F devices. I wonder why that's happening?

Hopefully this practice remains limited. I really don't want haul a bag of different security keys around with me to access all of my services.


We just tried with a self-signed attestation certificate and it doesn't work.


They specifically only support YubiCo at the moment, to the point that Chrome asked me if AWS could read my Security Key manufacturer and model when I pressed the button on my 4C Nano.


The manufacturer is irrelevant to the protocol, they may have asked you for these details but they do not matter. You can even emulate the key in software if you wanted.


It does matter. You need an attested cert which only yubico can provide.


Incorrect - everything related to the protocol, including becoming a compatible vendor, is managed by the fido alliance which Yubico is a member of. The U2F specification requires you to parse the certificate, and verify the response message against the cert's public key when registering the device with your application. You can choose to only accept certificates whose public key comes from a certain manufacturer, but that is up to the discretion of the implementer and is not required. If you want to read a full overview of the specification you can read the following document

https://fidoalliance.org/specs/fido-u2f-v1.2-ps-20170411/fid...


Just because the protocol allows websites to accept all manufacturers doesn't mean AWS accepts all manufacturers.


It's not the manufacturer that AWS wants to read, it wants the attestation certificate, and Yubico's are signed with their Root CA, so it's not something you can emulate. https://developers.yubico.com/U2F/Attestation_and_Metadata/ I tried setting up my AWS account with a Tomu setup with U2F firmware and AWS rejected it.


Yeah I knew that it didn't matter to the protocol, I only made my comment because I could've absolutely sworn I read in docs or their UI that literally _only_ YubiCo was supported, as in no other U2F would work. Can't find it now, so my bad!


It’s not as big of a deal as you might expect because:

- The spec requires providers to allow independent addition / removal of multiple keys per account, so it’s easy to manage backup U2F keys.

- Providers can use any backup authentication method they want. This includes SMS codes, TOTP / HOTP apps, email resets, or maybe VCing in to tech support.

And even if the backup method is less awesome (e.g. sms codes) it still reduces your risk because because you use it less often.

[edit for formatting]


Is it a good way to store SSH keys? Looking at the company website is seems a little hacky.


That’s starting to be the case. Check out https://projectpanoptes.org It’s network of ~$5000 exoplanet robotic survey telescopes. There’s also https://skynet.unc.edu/ which is aimed at larger scopes.


The protocol specifics 3 transport options with this in mind: usb, nfc, and Bluetooth.

As others mention, nfc works great for android. Bluetooth is your only option for iOS, and it’s clunky because you have to deal with pairing.


The U2F-Zero is about $9, and the cheapest U2F device I know of. They work well, but aren’t as durable as other options.

https://www.amazon.com/U2F-Zero/dp/B01L9DUPK6


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: