Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

Unless I'm missing something these are nothing like SSH keys. They would be closer to regular password auth with SSH where you store the password in a file that's only readable by SSH.

SSH keys are asymmetric such that I can make a public half available publicly and then use that to generate signatures of any challenge the server sends.

With passkeys either the server needs to store the value raw(making it susceptible to data breaches or malicious actors), or store the hashed value(making it impossible to do a challenge-response, and making it susceptible to MITM/replay attacks).

It seems to be all the downsides of SSH keys(aka losing it having implications), with none of the upsides, plus additional downsides(hardware devices can only generate 25 unique ones instead of using 1 and sending the public to all services with confidence it hasn't exposed any private info).



I think you might be missing something.

https://fidoalliance.org/how-fido-works/




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: