Hacker Newsnew | past | comments | ask | show | jobs | submit | more superdaniel's commentslogin

I'm glad that they have released support for the Web Authentication API. Hopefully I won't need to use Chrome for websites I choose to be more secure with.

Although, with a quick look it seems like I still can't use U2F with Google on Firefox.


Me neither (FastMail and Gmail). sigh

But just yesterday people tried to "educate" me that it works with 60 and for 59 I had to toggle an about:config switch.

It's great that they support the proper web standard. It would be useful if all those web sites supported it. This is a long-known issue, and nobody cares about non-Chrome browsers.


I’m probably the one that will implement the Web Authentication API for FastMail and Topicbox, though it’s a some way down my list of things to do at present. I looked into it a couple of months back (I would have liked us to get it out before browsers enabled it by default), but documentation was very scarce, and so it wasn’t particularly clear what we’d need to do to migrate from u2f.js to webauthn (especially while still supporting both), and then other things came up. Since then, https://www.imperialviolet.org/2018/03/27/webauthn.html has been written, which will help, but it’d still be nice to have a concise “here’s what to do, backend and frontend, to migrate from u2f.js to webauthn” guide. If no one has by the time we support webauthn, I’ll probably write such a guide.

For now, it’s not as high a priority as it could be, because the functionality it provides is already available in Chrome (for that matter, I don’t believe Chrome’s webauthn implementation hits stable until the next release), Firefox can get it by enabling security.webauth.u2f which is good enough as a short-term measure when it’s always been required in the past anyway, and Edge doesn’t have many users (and few of them currently do 2FA). It’s pragmatism, sadly.


Alas, I'm completely unable to get the soft token to work (after enabling it in config:about). It even fail on https://u2f.bin.coffee/ which seems to claim it should work.

It's a usability trade off; I have a physical key, but I'm asked to authenticate 20+ times a day which make it a pain on my port-limited MacBook Pro.


It's also good because this version will be supported in FF ESR for enterprise for another 11 months or so.


I believe that Google specifically will only work with Chrome. I just tried with FF 61 with Yubikey and still doesn't work.


This is actually not recommended:

And while the C.D.C. recommends washing all produce with water, including heads of lettuce, it does not recommend washing other forms of bagged lettuce, which has already been washed before bagging. “Your chances of contaminating it in your kitchen” — with contaminants that may already be on your kitchen countertop, hands or elsewhere — “are actually higher than if you didn’t wash the salad greens,” notes Dr. Gieraltowski.

source: https://www.nytimes.com/2018/04/19/well/eat/romaine-lettuce-...


That's interesting. I get the opposite answer from most of the people I know who work in food-borne infectious diseases.


High performance computing (HPC) is a specific field. Fast communication between compute nodes is very important and you won't get that on GCP or AWS where you may get 10gbs at the max. Most of the fast simulation codes are bounded by communication time between nodes.

Although, Azure is currently doing some HPC offerings.

https://azure.microsoft.com/en-us/solutions/big-compute/


If the person already knows markdown, Pandoc is a great option [0]. I find it really useful for creating pdfs. I haven't used it to create official documents that often, but I have used it to create Beamer slides and it was a very smooth experience. If you're an advanced user and you want to do something LaTeX-specific you can just write LaTeX inline and Pandoc will accept it.

[0] http://pandoc.org/


cmd+f,"u2f" or "webauth"

Nothing.. I wonder when they'll ever get to fully supporting u2f (probably via webauth) so I don't have to use Chrome to log into certain websites.


Mozilla will ship the Webauthn API in Firefox 60 (May 9):

https://hacks.mozilla.org/2018/01/using-hardware-token-based...


Firefox barely supports U2F. It works on Github and Dropbox, but doesn't work on sites like Vanguard and Google. Every time I do a Firefox update I do a search of the bug listing and they seem to have an incomplete implementation of the spec. They're kicking the can until they fully implement the WebAuth API and jump over dealing with whatever earlier spec they were targeting.

Speaking of which, why does Vanguard force you to still have SMS two factor available even when you add a U2F device...


> Firefox barely supports U2F.

Haha it's funny you put it this way because actually it's Firefox that implements FIDO U2F standard correctly and Chrome is not. Chrome uses low level API to communicate with their built in extension and the high level shim that they provide is not 100% spec compliant.

Google did not bother to use the U2F correctly on their accounts site, Github for example did it correctly and their 2FA works on any browser (that is FF and Chrome).


The usual rationale from companies forcing SMS two factor is that you need to have a convenient account-recovery mechanism before you enable something strict and lock yourself out. They don't want the support cost of dealing with these lockouts.

Unfortunately, these same companies often then claim that there is no harm in SMS two factor since "clearly it is stronger than one factor". But they are blind to their own systematic design flaw which is that the same SMS setting to enable two factor also usually enables one-factor password-recovery via this supposedly trusted phone.

Given what we know about SMS security, it is pretty obvious that one-factor SMS is weaker than one-factor good strong password. And if the good strong password can be merrily reset by whomever hijacks your phone, you have really just decreased your security posture while performing this whole security theater around two-factor and hardware tokens.


SMS is already 2fa. You need the sim card and the pin code. Hence a hijacked phone could be seen as stronger than a 1fa password.


Unfortunately the network security is kind of a joke so an attacker can intercept your messages if he is near you.

Not to mention that traffic inside the network is not encrypted so a lot of parties have legitimate access to the messages anyway.

I understand your point but SMS should not be used as the only factor for authentication.


Correct me if I am wrong, but these SMS-based login setups are only sending a message to your phone number. It's about as secure as sending an email to your email address. There is no end-to-end security between the original sender and the subscriber's phone and SIM card to ensure that the message only gets to the correct recipient.

You only need to hijack the victim's phone number so that messages are sent elsewhere. This can be done by technical or social hacks such as porting the subscriber's number to a new provider or pretending a phone was lost and having the phone company register a replacement SIM. There is no need to physically intercept the victim's phone, so it is not in fact a second factor.


Google is the one that isn't compliant.

Firefox is compliant.


Does it actually not work on Vanguard... or is it that Vanguard does user-agent sniffing and says Firefox is not compatible?


Unfortunately, doesn't work with Google yet... It does work with Dropbox and Github though.


Thanks


You can make the tab bar and url bar smaller by going to the menu > customize > density > compact.


Thank you so much. That change, combined with the switch to the Light theme, makes Firefox so incredibly better on macOS.


yeah this was such a huge step up, thanks so much. that circled back button was especially driving me nuts so that going away instantly improved my take on this :D


Thanks! By the way, for those who read this, to change the theme is menu > customize > theme.. These things are not easy to find!


Even the scrolling on macOS is more smooth!


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: