Upgrade to Pro — share decks privately, control downloads, hide ads and more …

WTF, 2FA!? Y U NO PROTECT ME? - Omaha Ruby Meetup

WTF, 2FA!? Y U NO PROTECT ME? - Omaha Ruby Meetup

Here are my slides from my 2FA presentation at the 4/11/2019 Omaha Ruby Meetup

Christine

April 11, 2019
Tweet

More Decks by Christine

Other Decks in Technology

Transcript

  1. @tech_christine WTF, 2FA!? Y U NO PROTECT ME? Two factor

    authentication the worst, the best, and everything in-between
  2. “ @tech_christine We learned that SMS-based authentication is not nearly

    as secure as we would hope, and the main attack was via SMS intercept Christopher Slowe Reddit chief technology officer and founding engineer August 2018
  3. @tech_christine What is authentication? The process of verifying that someone

    or something is the actual entity that they claim to be. - OWASP.org (these people know what they are talking about when it comes to security)
  4. @tech_christine ... but what are the different factors of auth?

    1 factor is knowledge (i.e. your password) 2 is the other method choice - Possession (token/soft token) - Identity (biometrics)
  5. @tech_christine 2FA == 2SV == MFA 2FA = Two factor

    authentication 2SV = Two Step verification MFA = Multi-factor authentication What about all those other acronyms...
  6. @tech_christine Let's figure out all the ways SMS can be

    hacked... 1. Sim-swap (aka what just happened to us) 2. Port-out scam 3. Brute force on the application itself
  7. @tech_christine Time-based One Time Password aka app based aka soft

    token •Authy •Google Authenticator •1Password TOTP
  8. @tech_christine Token based Physical keys that can auth •USB drive

    •near-field communication •Many use U2F (Universal 2nd Factor)
  9. @tech_christine OTP U2F •User has physical device •Strong security from

    public key cryptography •No personal information is associated with a key •Users type in codes •Set up and provision required •Secrets stored, providing a single point of attack
  10. @tech_christine So what could you have changed? •Setting up with

    a VOIP number •Secure with alternate authentication method •Pin/password protect phone provider Keep on being @awesome
  11. @tech_christine 2FA Implementation Best Practices •Rate limiting prevents brute force

    attacks •Use truncated exponential back-off algorithm
  12. @tech_christine Example in Ruby login_request if retries <= max_retries retries

    += 1 sleep (retries + rand(100)/1000) retry else raise "You've hit your max retries!" end
  13. @tech_christine Get user buy-in Enforce authentication on all pages Users

    with the most amount of privilege 2FA is a requirement not optional
  14. @tech_christine QR Code Rendering https://github.com/whomwah/rqrcode ROTP: TOTP https://github.com/mdp/rotp Twilio Ruby

    API https://www.twilio.com/docs/libraries/ruby Auth Ruby API https://github.com/twilio/authy-ruby
  15. @tech_christine Thanks for having me Ruby and Open Source Meetup!

    Tyson Reeder for the final graphic(@tysondreeder) For references and further reading checkout https://christine-seeman.com/talks/