I've begun researching good examples for security questions, as I imagine
they are hard to solicit unique and memorable responses across the globe. I
came across this paper by Google that is essentially declaring them dead.
https://security.googleblog.com/2015/05/new-research-some-tough-questions-for.html
They make the case for SMS as it's twice as successful as security
questions.

On Tue, Sep 6, 2016 at 11:13 AM, Alex Davis <[email protected]> wrote:

> Thanks Chris for sharing.
>
> I have a 1:1 with RFeeley today and we will look over this together.
>
> --
> Alex Davis // Mountain View
> Product Manager // FxA & Sync
> (415) 769-9247
> IRC & Slack: adavis
>
> On Fri, Aug 26, 2016 at 4:44 PM, Christopher Karlof <[email protected]>
> wrote:
>
>> Let me take this opportunity to make sure this problem is framed
>> correctly:
>>
>> *Our goal is increase user success and satisfaction in their experience
>> using Sync, specifically when connecting additional devices.*
>>
>> The obvious problem that’s been identified is that in the current system,
>> when users go to login to FxA (for Sync or otherwise), many user’s
>> instinctive reaction is to "login via reset password”, either because they
>> don’t remember it or they just think it’s easier. This, of course, will
>> create a sad time, because after the password reset, none of the data they
>> are expecting will appear, and just to rub it in, your currently connected
>> devices will be disconnected. Sad times all around.
>>
>> I see two high level approaches to address this problem: we can either
>> limit the consequences of resetting your password (e.g., start using kA) or
>> create flows that make it less likely users will trigger the password reset
>> flow described above.
>>
>> Either way, the flows we create have to be simple, easy to use, and
>> understandable (and of course, secure), because otherwise it’s unlikely
>> we're increasing user success and satisfaction. Many of the approaches
>> discussed here don’t seem that simple to me, either from the implementation
>> POV or user POV (or both). We can likely eat implementation complexity if
>> it results in a simple user flow, but unlikely the other way around.
>>
>> I feel it would be great to do some structured brainstorming around these
>> two general approaches that persistently captures the pros and cons of
>> various approaches (outside of an email thread) and perhaps enables people
>> to vote on the most promising ideas. It could even lead to a Google
>> Ventures style sprint. *Ryan F. or Alex [1], could you take the lead
>> here?*
>>
>> Me personally, I have two favorites, one that limits consequences of
>> reset and one that tries to reduce the frequency of resets:
>>
>> 1) I’d love to understand what it would take to start using kA for some
>> datatypes (technically, legally, and operationally).
>> 2) I’d love to see how good we could make various pairing flows as an
>> alternative to password reset, and if we can get users to use them.
>>
>> -chris
>>
>> [1] Both Ryan and Alex are out next week, so my timing is perfect.
>>
>>
>> On Wed, Aug 24, 2016 at 12:44 AM, Rémy Hubscher <[email protected]>
>> wrote:
>>
>>> Thank you for your answer Richard.
>>>
>>> > Ryan's thread is about ways we can give those users an experience
>>> closer to Dropbox: reset your password but keep your data.
>>> >
>>> > It sounds like you're talking about the space on the other side:
>>> reducing the dependence on a single password.
>>> > Am I reading you correctly?
>>> >
>>> > 2FA could be part of a key escrow solution, but probably isn't enough
>>> protection on its own.
>>> Yes it makes sense.
>>>
>>> Regards,
>>>
>>> Rémy
>>>
>>> Le 23/08/2016 à 18:01, Richard Newman a écrit :
>>>
>>> I like the idea of having an encryption key that is generated randomly.
>>>>
>>> We used to do that. The difficulty was in moving it around between
>>> machines. We used J-PAKE to exchange credential bundles, but that required
>>> users to have both devices together at the same time. We used
>>> printable/savable keys, but those are hard to type. And of course, users
>>> didn't remember to save the third credential.
>>>
>>> Getting away from the harm caused by strong random keys was the core
>>> motivation for FxA's existence: the second or third try at a better login
>>> experience for Sync (indeed, the second attempt called "Firefox Account"!).
>>>
>>>
>>>> This encryption key could be encrypted and decoded using kB and stored
>>>> decrypted on the user computer so that when users change their password the
>>>> encryption key can be re-encrypted with the new kB.
>>>>
>>> This is what happens with the Sync keybundle when you change your
>>> password.
>>>
>>>
>>>> However, I usually use the "forgot password" feature when I am
>>>> connecting a new computer to Sync and in that case the new computer doesn't
>>>> have the previous encryption key.
>>>>
>>> That's why Sync 1.5 uses kB, derived from your password, as the root of
>>> its crypto: users are not good at managing keys.
>>>
>>>
>>>
>>>> "You changed your password, please login with your new password from a
>>>> previously connected computer to update your encryption key and sync your
>>>> data."
>>>>
>>>
>>> That's what we do now: when you change your password on one device, you
>>> need to log in again on all of the others.
>>>
>>> We tried pairing-based UX flows before, and didn't have much success.
>>>
>>>
>>> I personally like the fact that the "forgot password" feature prevent an
>>>> attacker from using it to grab my Sync data.
>>>>
>>>
>>> Then it sounds like current Sync 1.5 is a good fit for you! And I don't
>>> think anyone is suggesting that we don't continue to support that level of
>>> resistance.
>>>
>>>
>>>
>>>> However it is still possible for an attacker with my password to do so.
>>>> Could we have a 2FA workflow that could help us there or maybe even a key
>>>> recovery process based on the fact that the user have got their registered
>>>> device with them?
>>>>
>>>
>>> I think you're talking about a different direction.
>>>
>>> Sync is currently fairly biased towards security: I'd guess 99% of the
>>> time a password reset is a user who forgot their password, not an attacker,
>>> but we force those users to lose their server data. Ryan's thread is about
>>> ways we can give those users an experience closer to Dropbox: reset your
>>> password but keep your data.
>>>
>>> It sounds like you're talking about the space on the other side:
>>> reducing the dependence on a single password.
>>>
>>> Am I reading you correctly?
>>>
>>> Ryan's last question is key here — a user who already has a device
>>> connected to Sync doesn't need to lose their data. They can turn a password
>>> reset into something equivalent to a known-kB password change.
>>>
>>> From my perspective, 2FA could be part of a key escrow solution, but
>>> probably isn't enough protection on its own.
>>>
>>>
>>>
>>> _______________________________________________
>>> Sync-dev mailing list
>>> [email protected]
>>> https://mail.mozilla.org/listinfo/sync-dev
>>>
>>>
>>
>
_______________________________________________
Sync-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to