[Cryptography] On the deployment of client-side certs
Thierry Moreau
thierry.moreau at connotech.com
Tue Nov 15 18:15:21 EST 2016
On 15/11/16 10:38 PM, Tony Arcieri wrote:
> On Tue, Nov 15, 2016 at 2:18 PM, Ray Dillinger <bear at sonic.net
> <mailto:bear at sonic.net>> wrote:
>
> > Is it really that hard to convince people to carry a U2F / OpenPGP token
> > with USB/NFC/BLE capabilities in their keychain? It shouldn't be.
>
> This is actually a quite good idea. The mental model of a keyed
> lock, with a physical key, works reasonably well for at least some
> plausible implementations of client-side authentication.
>
>
> I've been a big fan of FIDO for the past two years and I've really
> wanted to support U2F tokens specifically for the real-world analogy to
> keys, but I don't think it's really practical for everyone to buy a U2F
> token. I would love to see everyone using hardware tokens this way, but
> I just don't see it happening.
>
> That said, another FIDO standard, UAF, should enable smartphones to work
> as cryptographic authentication tokens. I think this approach is much
> more practical.
As an aside piece of information on the adoption of two-factor
authentication, the US federal government has been the largest client
organization with the NIST PIV program and recently had to revert to
client device software-based solution for private key management. The
rationale is to remain compatible with the newer mobile devices.
See NIST Special Publication 800-157, "Guidelines for Derived Personal
Identity Verification (PIV) Credentials"
http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-157.pdf
- Thierry Moreau
More information about the cryptography
mailing list