<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>opinions &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/category/opinions/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Thu, 07 Nov 2019 16:48:22 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>opinions &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Spreading the 2FA word</title>
		<link>https://www.privacyidea.org/spreading-the-2fa-word/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 07 Nov 2019 16:48:20 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[opinions]]></category>
		<category><![CDATA[Ohio Linuxfest]]></category>
		<category><![CDATA[OLF]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1652</guid>

					<description><![CDATA[I gave a talk at the Ohio Linuxfest and totally loved this event.]]></description>
										<content:encoded><![CDATA[
<p>On November 2nd I gave <a rel="noreferrer noopener" aria-label="my talk (opens in a new tab)" href="https://privacyidea.org/talks/OhioLinuxfest-2019/2FA-everywhere.html" target="_blank">my talk</a> about two factor authentication with privacyIDEA at the Ohio Linuxfest. The idea of this talk was to show everybody how easy it can be to add flexible two factor authentication to any other open source project. There are a lot of different ways, no spoilers, <a rel="noreferrer noopener" aria-label="take a look at the slides (opens in a new tab)" href="https://privacyidea.org/talks/OhioLinuxfest-2019/2FA-everywhere.html" target="_blank">take a look at the slides</a>.</p>



<h3 class="wp-block-heading">A lot of Interesting talks</h3>



<p>The conference started on Friday. There were several professional training tracks and one track with talks. Although I am involved into PKI and certificates with Linux for a while, there is always something new, some other aspects, different angles to find. So now I got some insperiation where to look at by the &#8220;<a rel="noreferrer noopener" aria-label="Linux PKI System Parts (opens in a new tab)" href="https://ohiolinux.org/speakers/#jeffreygilbert" target="_blank">Linux PKI System Parts</a>&#8221; talk. How new junior developers could be integrated into your team was elaborated on in &#8220;<a rel="noreferrer noopener" aria-label="They don’t make ’em like they used to: Integrating Junior Developers into your team (opens in a new tab)" href="https://ohiolinux.org/speakers/#robinclower" target="_blank">They don’t make ’em like they used to: Integrating Junior Developers into your team</a>&#8220;.</p>



<p>On Saturday there were five parallel tracks and it was sometimes difficult to decide where to go.</p>



<p>I have not been looking actively into Samba for quite a while. I know Samba started with Heimdal kerberos. Back then this was a petty, since Heimdahl would not play nicely with 2FA. The MIT Kerberos allowed to pass the Authentication Request to a RADIUS server thus adding 2FA into the kinit process. I talked about this <a rel="noreferrer noopener" aria-label="in 2013 in my Kerberos talk (opens in a new tab)" href="https://www.youtube.com/watch?v=YDcVYN7vw3w" target="_blank">in 2013 in my Kerberos talk</a>. Well, in Columbus I learned in the <a rel="noreferrer noopener" aria-label="Samba talk (opens in a new tab)" href="https://ohiolinux.org/speakers/#donvosburg" target="_blank">Samba talk</a>, that you can run Samba > 4.7 also with MIT. Welcome 2FA!</p>



<p>Although I am not a DB admin I like to hear talks about databases &#8211; hoping to learn something. Most of the time I learn, that I am really no DB admin <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /> The talk about &#8220;<a rel="noreferrer noopener" aria-label="Slow MySQL database session analysis (opens in a new tab)" href="https://ohiolinux.org/speakers/#rolfmartinhoster" target="_blank">Slow MySQL database session analysis</a>&#8221; gave a lot of entertaining insights, how you could find slow database queries in large setups, so you would know, where optimization has to occur.</p>



<p>The talk &#8220;<a rel="noreferrer noopener" aria-label="Personal Online Security, Privacy, and Password Management (opens in a new tab)" href="https://ohiolinux.org/speakers/#derhans" target="_blank">Personal Online Security, Privacy, and Password Management</a>&#8221; was filled with distinct tips and and tricks what to do and which tools to use to improve your <em>personal online security</em>. A lot to digest!</p>



<p>The last talk of the day &#8220;<a rel="noreferrer noopener" aria-label="Beyond Zero Trust (opens in a new tab)" href="https://ohiolinux.org/speakers/#john" target="_blank">Beyond Zero Trust</a>&#8221; addressed the same topic but in a more general or maybe even philosophical approach. Some good thinking to conclude the day.</p>



<h3 class="wp-block-heading">A lot of interesting talking</h3>



<p>In between talks, during lunch at the hang out time in the evening the time was filled with a lot of personal talking. I have been to the Ohio Linuxfest the first time but felt very at home. Because everywhere people were interested in exchanging ideas and communicating. To me this was really distinctive compared to other conference I have been in the U.S., Germany, The Netherlands, Austria or Denmark. I have got dry lips during these days. This never happened on Linux conferences before (Might be the air condition <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<div class="wp-block-image"><figure class="aligncenter is-resized"><img fetchpriority="high" decoding="async" src="https://www.privacyidea.org/wp-content/uploads/2019/11/seldom-stop-talking-1024x537.jpg" alt="" class="wp-image-1656" width="584" height="305" srcset="https://www.privacyidea.org/wp-content/uploads/2019/11/seldom-stop-talking-1024x537.jpg 1024w, https://www.privacyidea.org/wp-content/uploads/2019/11/seldom-stop-talking-300x157.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2019/11/seldom-stop-talking-768x403.jpg 768w, https://www.privacyidea.org/wp-content/uploads/2019/11/seldom-stop-talking.jpg 1128w" sizes="(max-width: 584px) 100vw, 584px" /><figcaption>You can not stop talking in Columbus (thanks <a href="https://twitter.com/linode/status/1191373796428660736" target="_blank" rel="noreferrer noopener" aria-label="Linode (opens in a new tab)">Linode</a> for the picture <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></figcaption></figure></div>



<h3 class="wp-block-heading">Great organization</h3>



<p>I also liked the organization a lot. Speakers were greeted warmly and the night before the conference. The organizers always took care, that you would know where to go&#8230; even after the official hours (Thanks Warner! <img src="https://s.w.org/images/core/emoji/17.0.2/72x72/1f609.png" alt="😉" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>



<p>The venue in the Hyatt Regency Hotel is a very good spot. Diner, lunch and the cocktail bar is outstanding. And this is maybe the point: You do not have to worry about life support issues. So there is a lot more time for talking.</p>



<p>A big thanks to the <a rel="noreferrer noopener" aria-label="OLF staff (opens in a new tab)" href="https://ohiolinux.org/about/staff/" target="_blank">OLF staff</a>! I can only recommend the Ohio Linuxfest to anyone!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA and the abolition of cash money</title>
		<link>https://www.privacyidea.org/privacyidea-abolition-cash-money/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 05 Apr 2017 21:24:54 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[bank]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1179</guid>

					<description><![CDATA[What does privacyIDEA have to do with the abolition of cash money? Usually we do no political blogging here, but this is a great case to give you a deeper understand of the idea behind privacyIDEA. Cash Money In Germany certain disoriented politicians suggest the abolition of cash money. Arguing that cash money is used [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2017/04/euro-1863441_640.jpg"><img decoding="async" class="size-medium wp-image-1185 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2017/04/euro-1863441_640-300x222.jpg" alt="" width="300" height="222" srcset="https://www.privacyidea.org/wp-content/uploads/2017/04/euro-1863441_640-300x222.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2017/04/euro-1863441_640.jpg 640w" sizes="(max-width: 300px) 100vw, 300px" /></a>What does privacyIDEA have to do with the abolition of cash money? Usually we do no political blogging here, but this is a great case to give you a deeper understand of the idea behind privacyIDEA.</p>
<h2>Cash Money</h2>
<p>In Germany certain disoriented politicians suggest the abolition of cash money. Arguing that cash money is used by criminals and terrorists. Abolishing cash money and only allowing electronical transactions, these transactions can be tracked and controlled. Crimes will be avoided and terrorism ended. Luckily there are other <a href="http://www.spiegel.de/wirtschaft/soziales/brigitte-zypries-gegen-wolfgang-schaeubles-obergrenzen-vorschlag-in-bargeld-debatte-a-1141955.html" target="_blank">prominent statements</a> to <a href="https://www.heise.de/newsticker/meldung/Gutachter-Bargeld-sichert-die-informationelle-Selbstbestimmung-3676128.html" target="_blank">contradict this wired ideas</a>.</p>
<p>But what does the abolition of cash money have to do with privacyIDEA?</p>
<h2>Central Book Keeping</h2>
<p>In the European Union we usually like to travel to other EU countries and pay with the same Euro, not having to change money or bother about any exchange rate. Usually this is very convenient.</p>
<p>Electronic transactions could be great and convenient, too. We do not need to care about bringing enough money, everything would be smooth and easy and one central book keeping instance would take care to transfer 100 credits from person A to person B. After the transfer is approved and completed, person B could hand person A the goods of interest.</p>
<p>But such a central book keeping instance would not only know, what money was spent by whom on what, but it could also restrict the amount of money person A is allowed to spent or person B is allowed to receive. Even worse this controlling instance could also disallow person A to spent money for certain goods or to buy from certain sellers at all. Thus people could be banned from buying cigarettes, certain medicine or unpleasant newspapers.</p>
<p>Again, what does this have to do with privacyIDEA?</p>
<h2>No Central Book Keeping</h2>
<p>We do not like to be controlled and we do not want you to be controlled either. Many two factor authentication services are running two factor authentication as &#8212; guess what &#8212; a service.  This in fact is such a central book keeping. Such a central service knows, who of your users authenticated where and when. And they could easily allow or disallow access based on other decisions than the right OTP value sent by your smartphone. You do not know and do not control the algorithms used.</p>
<p>This is why we offer privacyIDEA to run on premise. Under your control. With no central book keeping and with no fear, that conditions or laws might change tomorrow.</p>
<p>And this is why it makes me shiver, when I read about any idea for centrally controlled anything or the abolition of cash money.</p>
<p>Fight for your informational self-determination and stand up to keep your cash money!</p>
<p>&#8230;and use privacyIDEA!</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The truth behind privacyIDEA and ownCloud two factor authentication</title>
		<link>https://www.privacyidea.org/truth-behind-privacyidea-owncloud-two-factor-authentication/</link>
					<comments>https://www.privacyidea.org/truth-behind-privacyidea-owncloud-two-factor-authentication/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Sun, 24 Jul 2016 21:48:59 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[ownCloud]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=993</guid>

					<description><![CDATA[I understand there is a bit of confusion about two factor authentication with privacyIDEA for ownCloud. Comments in ownCloud blogpost and in the privacyIDEA Youtube channel indicate this. To do openess and transparancy the honour I would like to elaborate on what has happened. The empire strikes back The subdirectory authmodules in the privacyIDEA github repository contained [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>I understand there is a bit of confusion about two factor authentication with privacyIDEA for ownCloud. <a href="https://owncloud.org/blog/new-in-owncloud-9-1/#comment-78325" target="_blank">Comments in ownCloud blogpost</a> and in the <a href="https://www.youtube.com/watch?v=Lgum_cTY_Y8" target="_blank">privacyIDEA Youtube channel</a> indicate this.</p>
<p>To do openess and transparancy the honour I would like to elaborate on <strong>what has happened</strong>.</p>
<h3>The empire strikes back</h3>
<p>The subdirectory <a href="https://github.com/privacyidea/privacyidea/tree/master/authmodules" target="_blank"><em>authmodules</em> in the privacyIDEA github repository</a> contained a module for ownCloud. In ownCloud speak an &#8220;app&#8221;. This tried to support ownCloud 8. It failed with ownCloud 9. This was due to the fact, that ownCloud &lt;= 9 had no concept or API for attaching two factor authentication system. It even had no concept of passing authentication to another module. It only allowed to change the <em>complete</em> user module. I.e. authentication, user existance and authorization was not separated like you would be used to e.g. from PAM. And this is why providing a module for two factor authentication for ownCloud 8 and 9 was the biggest pain in the ass I ever experienced.</p>
<p>Now several simple users came around and popped up on the mailing list or at github. I call them simple, because they were not able to look behind the scenes, analyze problems, look at a line of code or even add a line of code. I experienced several occasions when such users complained about, that the old privacyIDEA &#8220;app&#8221; for 8 and 9 was not working as <em>they</em> expected.</p>
<p>Finally I got really sick of those users with this simple cosuming attitude. I got sick of claiming having a two factor solution for an application, which did not provide a decently designed and documented authentication interface. And this is why I happily deleted the old ownCloud plugin from the privacyIDEA github repository.</p>
<h3>A new hope</h3>
<p>Finally, ownCloud 9.1 was said to come with a new authentication API &#8211; <strong>which unfortunately again was designed without asking someone, who knows some things about two factors &#8212; like me! Big mistake!</strong> Nevertheless &#8211; I decided to give it a second chance. Thanks to the help of <a href="https://twitter.com/ChristophWurst" target="_blank">Christoph Wurst</a> and <a href="https://twitter.com/Deep_Diver_1975" target="_blank">Thomas Müller</a> I was able to implement a <a href="https://www.youtube.com/watch?v=Lgum_cTY_Y8" target="_blank">new privacyIDEA ownCloud</a> app for ownCloud 9.1.</p>
<p>As I am still very disappointed in any kind of &#8220;community&#8221; regarding the old ownCloud app (for privacyIDEA itself it is a complete other picture!!!), the privacyIDEA ownCloud App for 9.1 is not publically available, yet. I don&#8217;t want to hear any comsumers complaining about things they don&#8217;t understand or are not willing to dive into! But this is no problem. ownCloud users with a handful of accounts can happily use the TOTP app which probably willl run very well for them.</p>
<p>These words might sound hard to some of you. But you may appreciate that they are the real truth of mine!</p>
<h3>The return of the Jedi</h3>
<p>Power users or companies with many users have different requirements. They will also do two factor authentication a the firewall, at portals, terminal servers or the VPN. In this case it makes no sense to manage TOTP tokens within ownCloud. Because these tokens can not be used for the VPN. Other tokens would again have to be managed for the VPN somewhere else&#8230; And for the terminal servers&#8230;</p>
<p>Enterprise environments require to manage the tokens of the users at one central place. All users, for all applications. In this case privacyIDEA and the privacyIDEA ownCloud app make absolute sense. Customers should <a href="https://netknights.it/en/unternehmen/kontakt/" target="_blank">contact NetKnights GmbH</a>, because this is the place <a href="https://netknights.it/en/produkte/privacyidea-owncloud-app/" target="_blank">where they will receive the privacyIDEA ownCloud App</a>!</p>
<p>Kind regards</p>
<p>Cornelius</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/truth-behind-privacyidea-owncloud-two-factor-authentication/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>privacyIDEA community web conference</title>
		<link>https://www.privacyidea.org/privacyidea-community-web-conference/</link>
					<comments>https://www.privacyidea.org/privacyidea-community-web-conference/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 22 Jun 2016 08:08:03 +0000</pubDate>
				<category><![CDATA[events]]></category>
		<category><![CDATA[opinions]]></category>
		<category><![CDATA[Telco]]></category>
		<category><![CDATA[Webcast]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=970</guid>

					<description><![CDATA[I would like to kick off a web cast / web conference with telco to discuss new features in privacyIDEA. Everyone is invited to participate! First I would like to tell about: Event Handler Framework PIN Handling random PIN during enrollment Text message (SMS) improvements It is important to such an open source solution to [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/06/secretary-1249542_640.jpg"><img loading="lazy" decoding="async" class="size-medium wp-image-971 alignright" src="https://www.privacyidea.org/wp-content/uploads/2016/06/secretary-1249542_640-300x192.jpg" alt="secretary-1249542_640" width="300" height="192" srcset="https://www.privacyidea.org/wp-content/uploads/2016/06/secretary-1249542_640-300x192.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/06/secretary-1249542_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a>I would like to kick off a web cast / web conference with telco to discuss new features in privacyIDEA.</p>
<p><strong>Everyone is invited to participate!</strong></p>
<p>First I would like to tell about:</p>
<ul>
<li><a href="https://www.privacyidea.org/privacyidea-2-12-released-event-handler-certificates-pkcs12-pkcs11-much/">Event Handler Framework</a></li>
<li><a href="https://www.privacyidea.org/new-release-2-5-translation-statistics-pinhandler/">PIN Handling</a></li>
<li>random PIN during enrollment</li>
<li>T<a href="https://github.com/privacyidea/privacyidea/issues/392" target="_blank">ext message (SMS) improvements</a></li>
</ul>
<p>It is important to such an open source solution to get your feedback. So then the microphone will be open to everyone and we can discuss these features and future needs!</p>
<p><strong>Please add your <a href="http://doodle.com/poll/2fbxgp7vbhzx4h4y" target="_blank">preferred time slot in this doodle survey</a></strong>.</p>
<p>We will use spreed meeting for this session &#8211; so all you need is either a browser (with flash &#8211; sorry) and a headset or a telephone. The browser will also allow you to view the shared screen.</p>
<p>&nbsp;</p>
<h2>Update</h2>
<p>The conference will be on July 6th, 2016 at 10am CET.</p>
<p><strong>EDIT: The time is 10am CEST. i.e. summertime. Enjoy the light!</strong></p>
<p>You can <a href="https://eu42.spreed.com/selfreg/832477056/register">register at the spreed conference</a>. Please note: You need a flash enabled browser to view. You can either use your computers headset or you can use a normal land line or mobile phone to participate on an audio level.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-community-web-conference/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>RedHat 7.2 SSSD offline functionalities</title>
		<link>https://www.privacyidea.org/redhat-7-2-sssd-offline-functionalities/</link>
					<comments>https://www.privacyidea.org/redhat-7-2-sssd-offline-functionalities/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 24 Feb 2016 15:34:26 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[offline]]></category>
		<category><![CDATA[PAM]]></category>
		<category><![CDATA[sssd]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=897</guid>

					<description><![CDATA[Dmitri Pal blogged about the offline functionalities of the SSSD with RHEL 7.2. These SSSD offline functionalities is intended to increase performance to not contact the IdM server all the time. I wonder if the timeout can not only set to some seconds but also to go offline with the client. The same blog post also [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="http://rhelblog.redhat.com/2016/02/23/new-identity-management-features-in-rhel-7-2/" target="_blank">Dmitri Pal blogged about the offline functionalities of the SSSD with RHEL 7.2</a>.</p>
<p>These SSSD offline functionalities is intended to increase performance to not contact the IdM server all the time. I wonder if the timeout can not only set to some seconds but also to go offline with the client.</p>
<p>The same blog post also talks about OTP multistep prompting. But when going offline you do not want to decrease security by just requiring the first factor. This is why <a href="https://privacyidea.readthedocs.org/en/latest/machines/index.html#application-offline" target="_blank">privacyIDEA provides the hashed OTP values to the client to be able to authenitcate with two factors while offline</a>.</p>
<p>Admitted, going online again is a bit tricky, since the concept of resynchronizating the offline client with the authentication backend also contains possible attack vectors.</p>
<p>I am curious how SSSD will face this problem.</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/redhat-7-2-sssd-offline-functionalities/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Data Privacy Day with privacyIDEA</title>
		<link>https://www.privacyidea.org/data-privacy-day-with-privacyidea/</link>
					<comments>https://www.privacyidea.org/data-privacy-day-with-privacyidea/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Thu, 28 Jan 2016 10:49:48 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Authentication]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=863</guid>

					<description><![CDATA[Today is the Data Privacy Day. In Europe it is called Data Protection Day. Data Privacy Day This day is foremost ment to sensitize companies and users to take care when handling with private data. Especially in social media. But you can not devide your social life from your work life. Many attacks may start [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>Today is the <a href="https://en.wikipedia.org/wiki/Data_Privacy_Day" target="_blank">Data Privacy Day</a>. In Europe it is called Data Protection Day.</p>
<h2>Data Privacy Day</h2>
<p>This day is foremost ment to sensitize companies and users to take care when handling with private data. Especially in social media. But you can not devide your social life from your work life. Many attacks may start in social networks and end up in the heart of the company where the original victim is employed.</p>
<p>This is why you should protect information, that can be used to initiate attacks. This can be personal information, that only you and your personal contacts know, addresses (<a href="http://www.blackmoreops.com/2016/01/27/social-engineering-amazon-customer-service/" target="_blank">Read this very interesting story</a>), dates, usernames and of course any hints to passwords.</p>
<h2>Data Privacy with privacyIDEA</h2>
<p><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640.jpg" rel="attachment wp-att-867"><img loading="lazy" decoding="async" class="wp-image-867 alignleft" src="https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640-300x200.jpg" alt="door-1089560_640" width="206" height="137" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640-300x200.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/door-1089560_640.jpg 640w" sizes="auto, (max-width: 206px) 100vw, 206px" /></a>The job of privacyIDEA is to keep the data in your organization safe. privacyIDEA does this by introducing a second factor for authentication. Credentials for any account gained from social engineering in social networks or phishing will not get the attacker in. If you are using a hardware second factor like a <a href="https://netknights.it/produkte/yubikey/" target="_blank">Yubikey</a> or a <a href="https://netknights.it/produkte/smartdisplayer/" target="_blank">Smartdisplayer OTP card</a> the classic cracker is in a mess, since he would have to get out and perform a real life action like stealing the hardware possession.</p>
<p>When using privacyIDEA it respects your privacy. privacyIDEA is 100% Open Source and 100% Back door free. This way you can know every second what the system is doing and all your data and all your authentication decisions belong to you!</p>
<h2>Also do Encryption</h2>
<p>An additional measure to protect your data is encryption. To get help with <a href="https://netknights.it/en" target="_blank">authentication and encryption you may ask the company NetKnights</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/data-privacy-day-with-privacyidea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Choose required Security Level with privacyIDEA</title>
		<link>https://www.privacyidea.org/choose-required-security-level-with-privacyidea/</link>
					<comments>https://www.privacyidea.org/choose-required-security-level-with-privacyidea/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 20 Jan 2016 11:22:09 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Security]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[Authentication]]></category>
		<category><![CDATA[Google Authenticator]]></category>
		<category><![CDATA[security level]]></category>
		<category><![CDATA[SMS OTP]]></category>
		<category><![CDATA[Token Types]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=852</guid>

					<description><![CDATA[With SMS OTP a one time password is sent to a mobile phone. The user is supposed to enter this one time password in addition to his static password. This way, the authenticating party thinks to verify, that the user is in the possession of the mobile phone. This is a cheap way to establish [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>With SMS OTP a one time password is sent to a mobile phone. The user is supposed to enter this one time password in addition to his static password. This way, the authenticating party thinks to verify, that the user is in the possession of the mobile phone.</p>
<p>This is a cheap way to establish two-factor authentication with something you know and something you have.</p>
<h2>Several attack vectors for Two-Factor Authentication with SMS OTP</h2>
<p><figure id="attachment_856" aria-describedby="caption-attachment-856" style="width: 300px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640.jpg" rel="attachment wp-att-856"><img loading="lazy" decoding="async" class="size-medium wp-image-856" src="https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640-300x167.jpg" alt="Your OTP on the mobile is vulnarable." width="300" height="167" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640-300x167.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/mobile-phone-991494_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-856" class="wp-caption-text">Your OTP on the mobile is vulnarable.</figcaption></figure></p>
<p>But lateley there are again some news about the vularability of OTP values sent via SMS. There are different attack vectors. In one scenario <a href="http://mobilemarketingmagazine.com/97087-2/" target="_blank">the attacker can reroute or &#8220;steal&#8221; the SIM card by doing social engineering at the telephone provider</a>. In another scenario <a href="http://www.businessinsider.de/malware-discovered-that-defeats-two-factor-authentication-symantec-2016-1" target="_blank">a malicious software is installed on the smartphone, that can sniff the OTP value</a>.</p>
<p>Yes, privacyIDEA also supports sending OTP values via SMS and privacyIDEA is also vulnarable to these attacks &#8211; since it is the basic concept that lacks the necessary security.</p>
<h2>Security is shades of grey &#8212; or white</h2>
<p><figure id="attachment_855" aria-describedby="caption-attachment-855" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640.jpg" rel="attachment wp-att-855"><img loading="lazy" decoding="async" class="size-medium wp-image-855" src="https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640-300x199.jpg" alt="Security is shades of grey. Some volume between 0 and 99%." width="300" height="199" srcset="https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640-300x199.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2016/01/mixing-desk-351478_640.jpg 640w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-855" class="wp-caption-text">Security is shades of grey. Some volume between 0 and 99%.</figcaption></figure></p>
<p>But you might have heard that &#8220;there is no 100% security&#8221;. And that &#8220;security is a process&#8221;. And now I add to these idioms &#8220;Security is Shades of Grey&#8221;.</p>
<p>You gain security by using a password on your account to lock the desktop. But are you secure? You gain further security by adding a second factor during authentication. But is your data secure, now? You gain further security by encrypting the harddisk (a.k.a. your data) of your desktop. But is it secure?</p>
<p>Yes, it is good to use a password. You should not use none.</p>
<p>And yes, it is goot to use SMS OTP. It is better than to not use it. In certain cases it might be OK to use SMS OTP being aware of the possible risks.</p>
<p>But there are further steps or other possiblities to increase security.</p>
<h2>Choice of Security Level</h2>
<p>With privacyIDEA you have the choice, which security level you are going to use. And this may even depend on the application and the client.</p>
<p>You may use <a href="https://www.privacyidea.org/about/features/">SMS OTP, Email OTP, Smartphone Apps like the Google Authenticator, hardware key fobs and seedable tokens</a> like the <a href="https://www.privacyidea.org/privacyidea-admin-client-for-yubikey-mass-enrollment/">Yubikey</a>. Using privacyIDEA&#8217;s policy definitions, <a href="https://www.privacyidea.org/enforcing-security-policies-security-levels-with-different-otp-token-types/">you can define which token type is allowed to be used for authentication at which application</a>. This way you can accept the risk of using e.g. SMS OTP for low security applications and hardware devices like the yubikey for applications requiring higher confidentiality.</p>
<p>See the <a href="http://privacyidea.readthedocs.org/en/latest/policies/index.html" target="_blank">online documentation on policies</a> for more information or come to the <a href="https://groups.google.com/forum/#!forum/privacyidea" target="_blank">Google Group mailing list</a>.</p>
<p>If you require any <a href="https://netknights.it/en" target="_blank">professional assistance you may contact the maintainer of privacyIDEA</a>.</p>
<p>&nbsp;</p>
<p>&nbsp;</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/choose-required-security-level-with-privacyidea/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Thoughts about 2.10 &#8211; User self registration and notification</title>
		<link>https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/</link>
					<comments>https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/#comments</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 29 Dec 2015 18:45:09 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[notification]]></category>
		<category><![CDATA[smtp]]></category>
		<category><![CDATA[User Management]]></category>
		<category><![CDATA[user self registration]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=831</guid>

					<description><![CDATA[At the moment we are working on privacyIDEA 2.10. privacyIDEA 2.10 is about user self registration. The classical concept of privacyIDEA was: You have a user database &#8211; a user store &#8211; and privacyIDEA just reads this user store. In classical scenarios such as the enterprise environment with the Active Directory user base this is [&#8230;]]]></description>
										<content:encoded><![CDATA[<p>At the moment we are <a href="https://github.com/privacyidea/privacyidea/milestones/2.10%20User%20Self%20Registration" target="_blank">working on privacyIDEA 2.10</a>. privacyIDEA 2.10 is about user self registration.</p>
<p>The classical concept of privacyIDEA was: You have a user database &#8211; a user store &#8211; and privacyIDEA just reads this user store. In classical scenarios such as the enterprise environment with the Active Directory user base this is a perfect concept, because users are already existing. Over time I had to learn that this covers only 95% of the real world. So <a href="https://www.privacyidea.org/privacyidea-2-4-released-otp-for-hosted-environments/">in version 2.4 we added user management &#8211; or editable userIdResolvers</a>.</p>
<h2>Editable UserIdResolvers</h2>
<p>The editable UserIdResolvers that allow the administrator to manage users from within the privacyIDEA Web UI is an important step for the upcoming version 2.10. The editable UserIdResolvers are only implemented for SQL databases at the moment, but the connector for the LDAP databases like Active Directory or OpenLDAP could be easily enhanced accordingly. But at the moment I don&#8217;t think, that someone would like to have his Active Directory modified by privacyIDEA.</p>
<p>Anyway &#8211; privacyIDEA 2.4 already contained an importand method in the SQL connector, the <a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/lib/resolvers/SQLIdResolver.py#L690" target="_blank">method to created a new user in the SQL database</a>.</p>
<h2>User Self Registration</h2>
<p><figure id="attachment_833" aria-describedby="caption-attachment-833" style="width: 228px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration.png"><img loading="lazy" decoding="async" class=" wp-image-833" src="https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration-300x243.png" alt="privacyIDEA allows user self registration. Users can create their own user account." width="228" height="185" srcset="https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration-300x243.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration-1024x831.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/12/privacyidea-registration.png 1178w" sizes="auto, (max-width: 228px) 100vw, 228px" /></a><figcaption id="caption-attachment-833" class="wp-caption-text">privacyIDEA allows user self registration. Users can create their own user account.</figcaption></figure></p>
<p>Thinking of new use cases with privacyIDEA we came up with the idea to provide a privacyIDEA instance to the public. Or a company or a hotel could provide a privacyIDEA instance to guests, <a href="https://github.com/privacyidea/privacyidea/issues/286" target="_blank">where guests could register a guest account</a>. If it is possible to <a href="https://github.com/privacyidea/privacyidea/issues/292" target="_blank">restrict the registration of a new account to let&#8217;s say email addresses</a>, we could control which email addresses are allowed to created a new account. This way it could also be used within an huge organization without reading the users from an existing user source but by having the users (identified by the email address) register their own account.</p>
<p>I am sure, at the moment we do not see the whole potential of this new feature.</p>
<h3>How does it work</h3>
<p><a href="http://privacyidea.readthedocs.org/en/latest/policies/register.html" target="_blank">The administrator needs to define a policy, that allows the registration of a user</a> in the defined UserIdResolver. If this policy is defined, an additional link &#8220;Register&#8221; is displayed in the login page. Then users may enter account information and will receive a registration token (a kind of registration code) to be able to login with these two factors (The password they defined and the registration code, they received via email).</p>
<h2>Notification</h2>
<p>During the registration process the user receives an email with the registration token. Again &#8211; privacyIDEA needs to notify the user via an email. privacyIDEA already sends emails for the Email token type or the SMTP SMS Gateway token. Also, there is the PIN handler, which could send the OTP PIN, if a random token PIN was created during enrollment.</p>
<p>So you see, that there already were several places in privacyIDEA, where it could be necessary to define an Email connection. Sending the notification during the registration process would be the fourth occasion to send an email.</p>
<p>Now is the time to refactor the email notification code in privacyIDEA.</p>
<h3>System wide SMTP server configuration</h3>
<p>So the <a href="https://github.com/privacyidea/privacyidea/blob/master/privacyidea/models.py#L1597" target="_blank">privacyIDEA database for privacyIDEA 2.10 will come with a new database table</a>, where the administrator can define as many SMTP servers as he needs to.</p>
<p><figure id="attachment_834" aria-describedby="caption-attachment-834" style="width: 300px" class="wp-caption alignnone"><a href="https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration.png"><img loading="lazy" decoding="async" class="size-medium wp-image-834" src="https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration-300x83.png" alt="List of SMTP servers defined in privacyIDEA for notification." width="300" height="83" srcset="https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration-300x83.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration-1024x283.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/12/smtp-server-configuration.png 1166w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-834" class="wp-caption-text">List of SMTP servers defined in privacyIDEA for notification.</figcaption></figure></p>
<p>In all occasions, when privacyIDEA needs to send an email, the configuration will only refer to the identifier of this SMTP configuration. Usually defining one SMTP configuration will be enough an this single SMTP server will be used for sending the email of an Email token and the registration emails and all other notification information to come.</p>
<p>But privacyIDEA would not be privacyIDEA if it did not let you the freedom and choice to define as many different SMTP connections as you will need.</p>
<h2>More to come</h2>
<p>With all these building blocks</p>
<ul>
<li>editable UserIdResolvers</li>
<li>simple token implementations</li>
<li>simple email notification</li>
</ul>
<p>new ideas can be implemented easily and quickly. You can see this in <a href="https://www.privacyidea.org/category/release/">the really short release cycles of privacyIDEA</a>.</p>
<p>We are anxious to hear of your ideas, which I am certain of, can be easily implemented, too. Please <a href="https://groups.google.com/forum/#!forum/privacyidea" target="_blank">join us on the Google group</a> or drop your idea at <a href="https://github.com/privacyidea/privacyidea/issues" target="_blank">privacyIDEA&#8217;s Github issues</a>.</p>
<p>Happy new year and happy authenticating!</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/thoughts-about-2-10-user-self-registration-an-notification/feed/</wfw:commentRss>
			<slash:comments>1</slash:comments>
		
		
			</item>
		<item>
		<title>TSA tries to get grasp on second factor &#8211; taking simple measures</title>
		<link>https://www.privacyidea.org/tsa-tries-to-get-grasp-on-second-factor-taking-simple-measures/</link>
					<comments>https://www.privacyidea.org/tsa-tries-to-get-grasp-on-second-factor-taking-simple-measures/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Sat, 31 Oct 2015 08:20:51 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[Tips and Tricks]]></category>
		<category><![CDATA[TISA]]></category>
		<category><![CDATA[Yubikey]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=778</guid>

					<description><![CDATA[Two factor authentication or multi factor authentication is ment to raise the bar for attackers. They ought to sniff, brute-force or social-engineer your password and in addition steal or &#8220;borrow&#8221; your hardware token for a &#8220;test&#8221;. Still, I wish to think that the Yubikey &#8211; being the product of originally a sole Swedish company &#8211; has no back doors. So [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><figure id="attachment_779" aria-describedby="caption-attachment-779" style="width: 300px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326.png"><img loading="lazy" decoding="async" class="wp-image-779 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326-300x117.png" alt="Tweet by flexlibris" width="300" height="117" srcset="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326-300x117.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-085326.png 551w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-779" class="wp-caption-text">live experience with TISA on twitter by @flexlibris</figcaption></figure></p>
<p>Two factor authentication or multi factor authentication is ment to raise the bar for attackers. They ought to sniff, brute-force or social-engineer your password and in addition steal or &#8220;borrow&#8221; your hardware token for a &#8220;test&#8221;.</p>
<p>Still, I wish to think that the Yubikey &#8211; being the product of originally a sole Swedish company &#8211; has no back doors. So as long as the TISA does not know of side channel attacks or you used a static password with the Yubikey, you might be fine as long as you get the same Yubikey back &#8211; undestroyed.</p>
<p>Nevertheless there are additional measures you can take to improve your security with privacyIDEA.</p>
<p><strong>Disclaimer</strong>: This will only help, if you are using your hardware token to authenticate to remote systems. If you use your hardware token to unlock let&#8217;s say encrypted harddisk of your notebook, you are carrying, this will not help.</p>
<h2>Set up privacyIDEA</h2>
<p>When you manage your hardware token for remote access with privacyIDEA and you are crossing borders or you are in situations where you</p>
<ol>
<li>think your hardware token could be stolen or otherwise compromised and</li>
<li>you do not need the token explicitly (since you are on the plane without internet access)</li>
</ol>
<p>you might want to call your trusted privacyIDEA administrator (some call it help desk) and have your hardware token locked.</p>
<p>This way the hardware token can not be used to access restricted resources. If TISA is still insisting to get your Yubikey, you can say:</p>
<blockquote><p>&#8220;If you take it, you can keep it&#8221;</p></blockquote>
<p>(No of course you can take it back, but you may see it as compromised and you might need to reenroll it.)</p>
<p>If TISA takes the Yubikey there is not use for them, since the token is locked.</p>
<p><figure id="attachment_782" aria-describedby="caption-attachment-782" style="width: 300px" class="wp-caption aligncenter"><a href="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415.png"><img loading="lazy" decoding="async" class="wp-image-782 size-medium" src="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415-300x119.png" alt="Token detail view of a disabled token" width="300" height="119" srcset="https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415-300x119.png 300w, https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415-1024x406.png 1024w, https://www.privacyidea.org/wp-content/uploads/2015/10/Bildschirmfoto-vom-2015-10-31-091415.png 1212w" sizes="auto, (max-width: 300px) 100vw, 300px" /></a><figcaption id="caption-attachment-782" class="wp-caption-text">The token is disabled and can not be used for authentication.</figcaption></figure></p>
<p>If TISA did not get your Yubikey and you crossed the border, customs or control successfully, you may call your trusted privacyIDEA admin again to reactivate the hardware token.</p>
<h2>Conclusion</h2>
<p>This might sound a bit complicated but also to simple. But special events like travelling to certain rogue regimes may require special measures.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/tsa-tries-to-get-grasp-on-second-factor-taking-simple-measures/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>f*** the smartphone</title>
		<link>https://www.privacyidea.org/f-the-smartphone/</link>
					<comments>https://www.privacyidea.org/f-the-smartphone/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 07 Jul 2015 19:13:44 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[FreeOTP]]></category>
		<category><![CDATA[Google Authenticator]]></category>
		<category><![CDATA[rant]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Token Security]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=674</guid>

					<description><![CDATA[I am really puzzled and scared by many modern &#8220;security&#8221; consultants who claim the smartphone to be the next security device or even my identification object. Knowing that the smartphone has more cores than most desktop computers, is connected faster to the internet (thanks to LTE) than most land line bound computers and most older [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><figure id="attachment_689" aria-describedby="caption-attachment-689" style="width: 121px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280.png"><img loading="lazy" decoding="async" class=" wp-image-689" src="https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280-194x300.png" alt="by OpenClipartVectors @pixabay" width="121" height="187" srcset="https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280-194x300.png 194w, https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280-661x1024.png 661w, https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280.png 826w" sizes="auto, (max-width: 121px) 100vw, 121px" /></a><figcaption id="caption-attachment-689" class="wp-caption-text">by OpenClipartVectors @pixabay</figcaption></figure></p>
<p>I am really puzzled and scared by many modern &#8220;security&#8221; consultants who claim the smartphone to be the next security device or even my identification object. Knowing that</p>
<ul>
<li>the smartphone has more cores than most desktop computers,</li>
<li>is connected faster to the internet (thanks to LTE) than most land line bound computers</li>
<li>and most older smartphones get no software updates fixing security issues,</li>
</ul>
<p>this is a really scary scenario.</p>
<p>And the scariest thing of all is, that most users are not aware of this and are installing third party applications (belittling it as &#8220;App&#8221;) by a blink of an eye or the touch of a finger tip. Waving through all rights and access grants such an &#8220;App&#8221; wants to get.</p>
<p>Knowing this I am getting sick reading sentences like that on a daily basis:</p>
<blockquote><p>We can achieve the same level of security as from a physical token using a simple app and a public algorithm to generate Time-based One-Time Passwords (TOTP), for example.</p></blockquote>
<p style="text-align: right;"><a href="http://www.businesscomputingworld.co.uk/the-end-of-the-password-as-we-know-it/">http://www.businesscomputingworld.co.uk/the-end-of-the-password-as-we-know-it/</a></p>
<p>This in fact is not true. A hardware token has NOT far as many attack vectors like a smartphone, from which you can steal the secret key, that is used to calculate the OTP values. TOTP (<a href="https://tools.ietf.org/html/rfc6238#section-1.2" target="_blank">RFC6238</a>) is based on HOTP (RFC4226) which relies on a secret shared key. This secret key is used to generate the OTP value. If the secret key is stolen from the smartphone either by</p>
<ul>
<li>physical access to the smartphone or</li>
<li>by remote access via a trojan</li>
</ul>
<p>the key is also known to the attacker.</p>
<p>And now comes the nasty part with TOTP: As TOTP only relies on the secret key and the time (which is known to everyone), an attacker can impersonate the user WITHOUT him NOTICING it. The OTP value an attacker generates will be a valid OTP value. The OTP value, the user generates a few minutes later, will also be a valid OTP value. The user will only experience a small &#8220;hickup&#8221; if he would try to authenticate within 29 seconds after the attacker did. Would the user care? Or would he just try a second time?</p>
<p>Don&#8217;t get me wrong. The smartphone with a Google Authenticator or FreeOTP is a great device to increase security in an easy and CHEAP! way. But it has those problems a hardware token does not.</p>
<p>A preseeded hardware token of course has the problem, that the secret key was installed at the vendors site and I do not ask you to trust the vendor.</p>
<p>But there are also hardware tokens that you can initialize yourself. Then you are the only one who knows the secret key and the secret key can not get extracted from the hardware remotely.</p>
<p>So it is important to know what you are doing and decide which level of security you want to achieve. But it is a sham telling that a smartphone will get you the same level of security as a hardware token does!</p>
<p>Luckily you can choose what level of security you want to achieve, when using privacyIDEA.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/f-the-smartphone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
