ML
    • Recent
    • Categories
    • Tags
    • Popular
    • Users
    • Groups
    • Register
    • Login

    Anyone using yubikey, smart card or other hardware device for MFA?

    IT Discussion
    5
    11
    416
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • 1
      1337
      last edited by 1337

      Anyone using yubikey, smart card or other hardware device for MFA?

      I wonder how it works from the users perspective. I've never used any of them myself and I wonder if it's practical or not.

      And if it makes MFA more secure or not. I guess it should.

      scottalanmillerS 1 Reply Last reply Reply Quote 1
      • scottalanmillerS
        scottalanmiller
        last edited by

        @CCWTech @pchiodo and I were discussing this just this week. @CCWTech got a classic RSA key from his bank and we were talking about what a total joke it was. It's this bulky key you have to carry around and the security on it is a joke. It shows the key at all times and is super visible. You can't hide it, you can't secure it.

        Using Authy, OneAuth or Authenticator you have all this heavy security protecting access to the app, it's in a convenient place on a device that you have with you anyway, and it's only visible when you want it to be visible. And it's on a device you know if you've lost. Rather than being a key you can go months without using, easily misplace, and if someone stole it you'd likely not know for months.

        The degree to which these MFA keys are often vastly less secure than 'free', already existing, much more convenient solutions is significant.

        I like Authy best because it's free, works on my phone AND on my watch. I like Zoho OneAuth second best because it integrates with everything else that I do.

        pmonchoP 1 Reply Last reply Reply Quote 0
        • scottalanmillerS
          scottalanmiller @1337
          last edited by

          @Pete-S said in Anyone using yubikey, smart card or other hardware device for MFA?:

          And if it makes MFA more secure or not. I guess it should.

          SO much less.

          1 Reply Last reply Reply Quote 0
          • pmonchoP
            pmoncho @scottalanmiller
            last edited by

            @scottalanmiller said in Anyone using yubikey, smart card or other hardware device for MFA?:

            @CCWTech @pchiodo and I were discussing this just this week. @CCWTech got a classic RSA key from his bank and we were talking about what a total joke it was. It's this bulky key you have to carry around and the security on it is a joke. It shows the key at all times and is super visible. You can't hide it, you can't secure it.

            Using Authy, OneAuth or Authenticator you have all this heavy security protecting access to the app, it's in a convenient place on a device that you have with you anyway, and it's only visible when you want it to be visible. And it's on a device you know if you've lost. Rather than being a key you can go months without using, easily misplace, and if someone stole it you'd likely not know for months.

            (Using Authy for the last 3 years)

            I have thought this for a while now but felt I was wrong somehow. With the articles I have read over the last few years it seems most point to physical hardware based tokens are more secure.

            I have limited knowledge in this area, so, what the heck am I missing? Does yubikey provide better security than Authy????

            1 1 Reply Last reply Reply Quote 0
            • 1
              1337 @pmoncho
              last edited by 1337

              @pmoncho said in Anyone using yubikey, smart card or other hardware device for MFA?:

              @scottalanmiller said in Anyone using yubikey, smart card or other hardware device for MFA?:

              @CCWTech @pchiodo and I were discussing this just this week. @CCWTech got a classic RSA key from his bank and we were talking about what a total joke it was. It's this bulky key you have to carry around and the security on it is a joke. It shows the key at all times and is super visible. You can't hide it, you can't secure it.

              Using Authy, OneAuth or Authenticator you have all this heavy security protecting access to the app, it's in a convenient place on a device that you have with you anyway, and it's only visible when you want it to be visible. And it's on a device you know if you've lost. Rather than being a key you can go months without using, easily misplace, and if someone stole it you'd likely not know for months.

              (Using Authy for the last 3 years)

              I have thought this for a while now but felt I was wrong somehow. With the articles I have read over the last few years it seems most point to physical hardware based tokens are more secure.

              I have limited knowledge in this area, so, what the heck am I missing? Does yubikey provide better security than Authy????

              I did some research now and one obvious difference is that yubikey can't be phished.

              Authy uses a OTP, same as Google Authenticator and many others and a user can be tricked into entering their credentials and their OTP into a fake website. The attacker then uses that information within seconds on the real website and has now gained access.

              Since yubikey is a physical device it can't be phished, because the attacker doesn't have the physical device.

              Another thing is that even if someone has gained remote access to your desktop/phone, the yubikey device can't be used to authenticate - even if it's plugged in. The user has to press a physical button on it.

              That's what I've gathered so far. And that Cloudflare swears by them.

              On wikipedia it also says that Google, Amazon, Microsoft, Twitter, and Facebook uses yubikeys to secure employee accounts.

              JaredBuschJ 1 Reply Last reply Reply Quote 1
              • JaredBuschJ
                JaredBusch @1337
                last edited by

                @Pete-S said in Anyone using yubikey, smart card or other hardware device for MFA?:

                I did some research now and one obvious difference is that yubikey can't be phished.

                I am sure they can. All the attacker needs is to be MitM to get the approved session information. It is not like your Yubikey is communication non stop with the website you used it to authenticate.

                1 1 Reply Last reply Reply Quote 1
                • 1
                  1337 @JaredBusch
                  last edited by 1337

                  @JaredBusch said in Anyone using yubikey, smart card or other hardware device for MFA?:

                  @Pete-S said in Anyone using yubikey, smart card or other hardware device for MFA?:

                  I did some research now and one obvious difference is that yubikey can't be phished.

                  I am sure they can. All the attacker needs is to be MitM to get the approved session information. It is not like your Yubikey is communication non stop with the website you used it to authenticate.

                  OK, let me rephrase that then. The yubikey MFA can't be phished. Doesn't mean that the website or browser or traffic between them can't be hacked in other ways. The yubikey can also be stolen from you.

                  JaredBuschJ 1 Reply Last reply Reply Quote 0
                  • JaredBuschJ
                    JaredBusch @1337
                    last edited by

                    @Pete-S said in Anyone using yubikey, smart card or other hardware device for MFA?:

                    The yubikey MFA can't be phished.

                    And this is no different than my use of Authy and MS Authenticator not able to be phished.

                    Sure a MitM can get it. There are known exploits for O365 accounts that do this.

                    But it is as secure as a hardware key for day to use usage. Sure, if someone else knows the seed (alomst always shown when signing up) you used for the TOTP, they can also get a valid code, so I would never say it is as totally secure as a Yubikey.

                    1 1 Reply Last reply Reply Quote 0
                    • 1
                      1337 @JaredBusch
                      last edited by 1337

                      @JaredBusch said in Anyone using yubikey, smart card or other hardware device for MFA?:

                      @Pete-S said in Anyone using yubikey, smart card or other hardware device for MFA?:

                      The yubikey MFA can't be phished.

                      And this is no different than my use of Authy and MS Authenticator not able to be phished.

                      Sure a MitM can get it. There are known exploits for O365 accounts that do this.

                      But it is as secure as a hardware key for day to use usage. Sure, if someone else knows the seed (alomst always shown when signing up) you used for the TOTP, they can also get a valid code, so I would never say it is as totally secure as a Yubikey.

                      No, as I understand it it's quite different. There is traditional MFA methods (like Authy) and then there is phishing resistant MFA (like yubikey). I don't understand all the details yet though.

                      You can read more about it here where Okta has an overview of all the different methods they support:
                      https://www.okta.com/blog/2022/10/the-need-for-phishing-resistant-multi-factor-authentication/

                      Just a few month ago there was an executive order for government to move to phishing resistant MFA.

                      Here is an overview on MFA by CISA (Cybersecurity & Infrastructure Security Agency):
                      https://www.cisa.gov/sites/default/files/publications/fact-sheet-implementing-phishing-resistant-mfa-508c.pdf

                      dbeatoD 1 Reply Last reply Reply Quote 0
                      • dbeatoD
                        dbeato @1337
                        last edited by

                        @Pete-S I have used it for DUo and Office 365 and works well. It makes it so much easier for users that refuse to have a mobile or digital device.

                        1 1 Reply Last reply Reply Quote 1
                        • 1
                          1337 @dbeato
                          last edited by

                          @dbeato said in Anyone using yubikey, smart card or other hardware device for MFA?:

                          @Pete-S I have used it for DUo and Office 365 and works well. It makes it so much easier for users that refuse to have a mobile or digital device.

                          That sounds good. I think I'll order a pair of keys to try it myself.

                          1 Reply Last reply Reply Quote 0
                          • 1 / 1
                          • First post
                            Last post