Skip Navigation

Passkeys are incompatible with open-source software

Comments

Lobste.rs @lemmy.bestiver.se

Passkeys are incompatible with open-source software

3 0
9 comments
  • The spec has issues due to usual RFC bullshit and corporate greed, but as per usual the viewpoint here is too narrow. I'm running my own open source authentication stack and choose what attestations are acceptable, say only allow the FIPS version of Yubikeys. That feature exists because companies want to be able to control which methods they consider secure enough for their own employees. This tech was built for corporate security, using it externally facing with end-users is a bolted on after the fact idea. Having control is necessary, it does not make the spec evil.

    Now say GitHub enable attestations that only allow Windows Hello passkeys to go through, then yes that's technically possible. It would also be a support nightmare so they won't. (It's already a support nightmare for anyone limiting devices since for example security key vendors regularly forget to publish their fingerprints for new products.)

    The whole biometrics thing? Total red herring. UV can be enabled in many different ways and totally "faked" as well, which is what all the software implementations do such as Bitwarden. Only way to stop it is approvelisting specific devices, see point above.

  • A passkey is a FIDO authentication credential that allows a user to sign in to apps and websites with the same process that they use to unlock their device (biometrics, PIN, or pattern).

    … What? Stop. What are you talking about? My Linux desktop doesn’t even have a lock screen. Are you going to somehow notice my screensaver exiting to permit a login? How can that possibly work? Are they trying to tell me that their fancy new login system only works on certain proprietary operating systems? Really?

    Article is bullshit, dude thinks potential use cases are mandatory features. That's mental

9 comments