SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
Secure All Teh Things!
Add 2 factor authentication to your own projects
Who is this dude?
• @robdudley

• CTO

• Software Developer

• Co-host of the 

Localhost.fm Podcast

• Keeps the scores in
CodeMasters!
What are we talking about?
A quick look at
security
We secure by
Hiding things

Making them hard to
access

Making them dangerous
to access
How do we secure computers?
• We didn’t

• Usernames

• Usernames & passwords

(secrets)

• More complex
passwords?
2018 Cost of Data Breach Study, Ponemon Institute Research Report
2017 Data Breach Investigations Report 10th Edition, Verizon
“A single corporate security breach costs an
average of $3.86M , and 81% of breaches
are caused by stolen or weak passwords. ”
Still not secure enough!
What is secure?
Something you know

Something you have

Something you are
Combine these into…
Multi-factor Security!
Common Types of MFA
PIN or Code
Common!

Memorable

Surely just another
password?
SMS
Easy

Slow

DO NOT USE!
TOTP
Open

Common

Still requires phone
Physical Tokens
Many and varied
Biometrics
Handy (heh)

You can’t change your
finger print …

Or your DNA!
Enter
• Founded in 2007

• Leading contributor to 

• FIDO U2F

• FIDO2

• Member of FIDO Alliance,
IDESG, OpenID & W3C
YubiKey
• 5 Versions

• Neo (with NFC)

• USB-A USB-C variants

• FIDO

• Multi function device
Demo # 1
Yubikey OTP
OTP? WTF?
ccccccinrbeglgchferbjblkudbjtebkblggbvfdvjfg
ccccccinrbeglteudtkkccjvkjcfghbtjccbnhhkttlg
ccccccinrbegeubvhflrtecrhbkcknkfuibtilcbbifu
ccccccinrbegfdbghkgvkrvdhukdefubeigkrjrttdfh
ccccccinrbegtvgnjlfvhbituujfujutgduvdgcelcuv
Sample OTPs from a YubiKey
ccccccinrbeglgchferbjblkudbjtebkblggbvfdvjfg
ccccccinrbeglteudtkkccjvkjcfghbtjccbnhhkttlg
ccccccinrbegeubvhflrtecrhbkcknkfuibtilcbbifu
ccccccinrbegfdbghkgvkrvdhukdefubeigkrjrttdfh
ccccccinrbegtvgnjlfvhbituujfujutgduvdgcelcuv
Key ID and
OLD CODE ALERT!!!
Tedious switch to code… please hold
What doesn’t this do?
• No ID verification

• No MITM protection!

• Doesn’t make tea, or coffee
What does this do?
• Types really fast

• Verifies the OTP against the
private key

• Replay protection

• Makes you look cool
https://developers.yubico.com/OTP/
Demo # 2
FIDO U2F
Demo # 2
FIDO U2F
WebAuthN
Why do we need WebAuthN?
• More than just YubiKeys

• Fingerprint

• Face Unlock

• Others?
• End to end assurance
through key exchange /
signing

• W3C standard(s)

• Common device support
How does it work?
Basic FIDO2 registration sequence
Basic FIDO2 authentication sequence
Slightly less tedious switch to demo…
please hold
Browser Support
Implementation
Need to think about:

• Key issuance

• Lost / stolen key revocation

• Replacement key process

• Backup codes
Wait!
There’s more…
YubiKey Manager
YubiKey Personalization Tool
YubiKey 4 also does…
• PGP Key storage for use in signing / encryption

• Challenge Response HMAC for use with PAM 

• Static password output for use with … long
passwords
Resources
Yubico Dev Portal
https://developers.yubico.com/
Expanding YubiKey Keyboard Support (for AZERTY / Non QWERTY)
https://www.yubico.com/2013/07/yubikey-keyboard-layouts/
WebAuthN on MDN
https://developer.mozilla.org/en-US/docs/Web/API/Web_Authentication_API
Updated version of the YubiKey OTP CFC (ColdBox compatible)
https://github.com/akitogo/cbYubikey

Contenu connexe

Similaire à Secure All Teh Things - Add 2 factor authentication to your own CFML projects

Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
University of Hertfordshire
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
Santhosh Tuppad
 

Similaire à Secure All Teh Things - Add 2 factor authentication to your own CFML projects (20)

Safety Bot Guaranteed -- Shmoocon 2017
Safety Bot Guaranteed -- Shmoocon 2017Safety Bot Guaranteed -- Shmoocon 2017
Safety Bot Guaranteed -- Shmoocon 2017
 
Passwords, Passwords and more Passwords
Passwords, Passwords and more PasswordsPasswords, Passwords and more Passwords
Passwords, Passwords and more Passwords
 
Blockchain: professionalità, cultura e change management - Riccardo Spinelli ...
Blockchain: professionalità, cultura e change management - Riccardo Spinelli ...Blockchain: professionalità, cultura e change management - Riccardo Spinelli ...
Blockchain: professionalità, cultura e change management - Riccardo Spinelli ...
 
Smart Locks - too clever by half
Smart Locks - too clever by halfSmart Locks - too clever by half
Smart Locks - too clever by half
 
Zigi gseuk - open source conference 2019 presentation v1.0
Zigi   gseuk - open source conference 2019 presentation  v1.0Zigi   gseuk - open source conference 2019 presentation  v1.0
Zigi gseuk - open source conference 2019 presentation v1.0
 
Securing Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu SecuritySecuring Underprotected APIs - Deja vu Security
Securing Underprotected APIs - Deja vu Security
 
Cyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile WorldCyber Security in a Fully Mobile World
Cyber Security in a Fully Mobile World
 
Business Dimension of Expanded Password System
Business Dimension of Expanded Password SystemBusiness Dimension of Expanded Password System
Business Dimension of Expanded Password System
 
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
ExpoQA 2018 - Why software security has gotten worse? And what can we do abou...
 
Web3 + scams = It's a match
Web3 + scams = It's a matchWeb3 + scams = It's a match
Web3 + scams = It's a match
 
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
Two Factor Authentication (2FA) Deep Dive: How to Choose the Right Solution f...
 
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...Clues to Unravelling  Conundrums - Biometrics deployed 'in parallel' as again...
Clues to Unravelling Conundrums - Biometrics deployed 'in parallel' as again...
 
Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)Basic Security for Digital Companies - #MarketersUnbound (2014)
Basic Security for Digital Companies - #MarketersUnbound (2014)
 
Ha(Attackers) Exposed
Ha(Attackers) ExposedHa(Attackers) Exposed
Ha(Attackers) Exposed
 
Cyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital WorldCyber Threats and Data Privacy in a Digital World
Cyber Threats and Data Privacy in a Digital World
 
Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)Security everywhere digital signature and digital fingerprint v1 (personal)
Security everywhere digital signature and digital fingerprint v1 (personal)
 
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEEDEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
DEFCON 23 - Li Jun Yang Ging - I’M A NEWBIE YET I CAN HACK ZIGBEE
 
Data Privacy for Activists
Data Privacy for ActivistsData Privacy for Activists
Data Privacy for Activists
 
Crush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access ManagementCrush Common Cybersecurity Threats with Privilege Access Management
Crush Common Cybersecurity Threats with Privilege Access Management
 
Pre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint EncryptionPre-Quiz Symantec Endpoint Encryption
Pre-Quiz Symantec Endpoint Encryption
 

Dernier

Dernier (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 

Secure All Teh Things - Add 2 factor authentication to your own CFML projects