Twitter just got it. Apple recently got it, too. Google, Microsoft, Facebook, and Amazon have had it for a while. But why's two-factor authentication important, and will it keep you safe? Twitter announced on Wednesday that they've started supporting two-factor authentication, joining a growing list of major Web services that offer the more secure login method. Twitter's advice to media after high-profile hacksTwo-factor authentication, or 2FA as it's commonly abbreviated, adds an extra step to your basic login procedure. Without 2FA, you enter in your username and password, and then you're done. The password is your single factor of authentication. The second factor makes your account more secure, in theory. "Twitter made the decision to use SMS [to deliver its second factor] because it makes sense from their position," said Jon Oberheide, a two-factor authentication expert and co-founder and Chief Technology Officer of Duo Security, which uses apps to prove identity. "[SMS is] universal in some respects, all you need is a mobile phone." But Twitter has faced some backlash, he said, because many of the highest-profile Twitter hacks have been against corporate Twitter accounts. "Two-factor authentication does help, but Twitter is a high-value target and it needs to be protected like one," said Jim Fenton, Chief Security Officer at OneID, an enterprise password replacement system. Here's a rundown of what two-factor authentication is, how it can work for you, and what its limitations are. What is two-factor authentication?
How old is two-factor authentication? Okay, not really. But 2FA is nothing new. When you use your credit card and you must enter in your zip code to confirm a charge, that's an example of 2FA in action. You must provide a physical factor, the card, and a knowledge factor, the zip code. Related stories:But just because it's been around for a long time doesn't mean that it's easy to set up or easy to use. Wait, it's hard to use? Fenton said that while two-factor authentication makes it harder to log in, it's not "hugely" so. "An attacker might be able to collect a cookie or an OAuth token from a Web site and essentially take over their session," he said. "So, 2FA is a good thing, but it does make the user experience more complicated... It's done when you're logging into an account on your device for the first time, for example." Will two-factor authentication protect me? It's true that two-factor authentication is not impervious to hackers. One of the most high-profile cases of a compromised two-factor system occurred in 2011, when security company RSA revealed that its SecurID authentication tokens had been hacked. Fenton explained both sides of the effectiveness problem. "The thing that concerns me as a security guy is that people don't look at what the cause of the threats might be. 2FA mitigates the problems, but there are a lot of awful attacks can run on 2FA." At the same time, he said, two-factor offered more protection than logging in without it. "When you make an attack harder, you're disabling a certain subset of the hacker community," he said. How is 2FA vulnerable to hackers? An RSA SecurID key fob. (Credit: Via Wikimedia Commons)If you remember what happened to journalist Mat Honan, his accounts were compromised by leveraging the "account recovery" feature. Account recovery resets your current password and e-mails you a temporary one so that you can log in again. "One of the biggest problems that's not adequately solved is recovery," said Oberheide. Account recovery works as a tool for breaking two-factor authentication because it "bypasses" 2FA entirely, Fenton explained. "Just after [the Honan story was published], I created a Google account, created 2FA on it, then pretended to lose my data." Fenton continued: "Account recovery took some extra time, but three days later I got an email helpfully explaining that 2FA had been disabled on my account." After that, he was able to log back in to the account without 2FA. Account recovery is not a problem without a solution, though. Or at least, solutions are being worked on. "I see biometrics as an interesting way to solve the recovery problem," said Oberheide. "If I lost my phone, it would take forever to go through each account and recover them. If there's a very strong biometric recovery method, a passcode of my choosing and a voice challenge or something like that, it becomes a very reasonable and usable recovery mechanism."
Basically, he's suggesting using one form of two-factor for logging in, and a second, different two-factor combo for recovery. What's next for 2FA? Oberheide said that many of his customers start off think that implementing 2FA will be expensive or hard to use, but often find that their experience with it is the opposite. "I think that will come faster in the consumer space because they're not dealing with all this cruft from the legacy of 2FA from the 80s," he said. But, he noted, that older systems can have a hard time getting 2FA going. "A few months ago we published the bypass of Google's two-factor scheme," he explained. "It's not a ding against two-factor in general, but against Google's complicated legacy system." Fenton noted that increased adoption could create opportunities to refine the technology. "Should we be planning now on designing something that can scale to large numbers of sites? It seems that 2FA is really exploding right now," he said. Despite its problems, Oberheide sounded an optimistic tone for two-factor authentication. "If we can increase the security and usability of 2FA at the same time, that's a Holy Grail that's often difficult to achieve," he said. ![]() via Technology - Google News http://news.google.com/news/url?sa=t&fd=R&usg=AFQjCNF8Dts7fM5UfSVs0C1y0UO_Og1dzw&url=http://news.cnet.com/8301-1009_3-57586014-83/two-factor-authentication-what-you-need-to-know-faq/ | |||
| |||
| |||
|
Thursday, 23 May 2013
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment