• jet@hackertalks.com
    link
    fedilink
    English
    arrow-up
    6
    arrow-down
    1
    ·
    8 months ago

    They are fine, just ssh public private keypairs but for “the web”… worse than fido2… so not really sure why they are being pushed so much above fido2

      • jet@hackertalks.com
        link
        fedilink
        English
        arrow-up
        3
        ·
        8 months ago

        Wow! I had no idea. I assumed the yubikey bioseries didn’t work with passkeys. But I read the documentation that you linked, and I just tested it out on the demo site. It works.

        That’s amazing! Thanks

        Can only store 25 keys but hey that’s still something.

        • NaN@lemmy.sdf.org
          link
          fedilink
          English
          arrow-up
          2
          ·
          edit-2
          8 months ago

          I like that you are able to query what keys are stored, so if you are ever replacing or upgrading the key you can see where you should update to the new one. That is tough on the current yubikey, I’ve got a few generations of them and have to hold onto them just in case I happened to use them for 2FA somewhere and don’t remember it. 2FA is dynamically generated so there’s not really a way to change that, it’s just inconvenient.

          • jet@hackertalks.com
            link
            fedilink
            English
            arrow-up
            2
            arrow-down
            1
            ·
            edit-2
            8 months ago

            I prefer the yubikey webauthn fido2 non passkey approach. It’s not limited to 25 slots. And if your key gets compromised, or you’re forced to unlock it, there isn’t a list of sites that it works on.

            With passkeys, if somebody compromises you, physically, they can see everything you can log into. That makes me feel icky

            • NaN@lemmy.sdf.org
              link
              fedilink
              English
              arrow-up
              4
              ·
              8 months ago

              There are definitely pluses and minuses. It will lock you out after 8 incorrect pins so if it came down to it, you could probably force it to lock pretty quickly.

            • tippl@lemmy.world
              link
              fedilink
              arrow-up
              4
              ·
              8 months ago

              if somebody compromises you, physically, they can see everything you can log into

              Can they though? I own a few yubikeys with passkeys stored inside and i cannot query stored logins without entering a pin.

              • jet@hackertalks.com
                link
                fedilink
                English
                arrow-up
                1
                arrow-down
                2
                ·
                8 months ago

                Right, so they coerce you to unlock the yubi key (threats, torture, finger removal, etc) and now they see all your passkeys and what they belong to. It’s a menu of your activity.