vanguard.com qualifies for U2F blacklisting
Reported by
m...@sowbug.com,
May 25 2018
|
||||||||||
Issue descriptionUserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36 Steps to reproduce the problem: 1. Sign into account at https://personal.vanguard.com/ 2. Wish to register an off-brand U2F device with account. 3. Navigate to https://personal.vanguard.com/us/U2FKeyEnrollment#/welcome 4. Explore links on page. What is the expected behavior? Site should explain that it's possible to register this U2F device, per standards at https://www.chromium.org/security-keys: "Site attestation requirements [¶] Chrome’s users have an interest in ensuring a healthy and interoperable ecosystem of Security Keys. To this end, public websites that restrict the set of allowed Security Keys should do so based on articulable, technical considerations. They should regularly update their set of trusted attestation roots that meet their policies (for example, from the FIDO Metadata Service) to ensure that new Security Keys that meet their requirements will function. [¶] Chrome expects Security Key manufacturers who have passed FIDO certification to keep their attestation metadata updated in the FIDO Metadata Service. [¶] If Chrome becomes aware that websites are not meeting these expectations, we may withdraw Security Key privileges from those sites. If Chrome becomes aware that manufacturers are not maintaining their attestation metadata we may choose to disable attestation for those devices in order to ensure a healthy ecosystem." What went wrong? See attached screenshot. Site limits interoperability to four models of a single manufacturer (and not even the four most recent that company produces!). Site explains reasoning as "Please note that these keys must also support FIDO U2F specifications (which are universal 2-factor online security standards) or they will not work to access your Vanguard account. Vanguard does not design, manufacture, or sell security keys. This list may be modified from time to time." This is in a section titled "Security key technical requirements." Because many other security keys "also support FIDO U2F specifications," and because that is the only technical requirement specified in the section entitled "Security key technical requirements," the site has failed to express "articulable, technical considerations" for excluding the others. Did this work before? N/A Chrome version: 66.0.3359.181 Channel: stable OS Version: Ubuntu 18.04 Flash Version: This is why Chrome should "withdraw Security Key privileges from" vanguard.com.
,
May 25 2018
We have no
,
May 25 2018
To finish my incomplete sentence from comment #2. This seems like a policy request which we generally do not do but over to the WebAuth team since it is in their domain. I believe the correct avenue is for the customer to escalate this with Vanguard.
,
May 25 2018
Mike, do you know if they are actually blocking registration of security key models outside of that list?
,
May 25 2018
They do block. Turns out they do accept the new FIDO2 blue security key from Yubico (thus I retract "and not even the four most recent that company produces!" although it's possible that Yubico is using the same attestation cert as the v1 of the blue SK), but it absolutely does reject the inexpensive Feitian U2F device. See attached screenshot. Vanguard is the only firm I've encountered that actually makes you agree to a specific U2F ToS when you set it up: https://personal.vanguard.com/us/U2FKeyEnrollment#/consent. This is not relevant to the bug report.
,
May 25 2018
Thank you for providing more feedback. Adding the requester to the cc list. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
May 26 2018
+agl@, who might have opinions.
,
May 28 2018
mike@ Could you please help us with sample credentials or html page to triage this issue from TE end Thank You...
,
May 28 2018
Neither of those requests is reasonable. I'm not going to give you my Vanguard account password, and I'm surprised you're even asking for them. The screenshots I've already provided are enough to see the issue. HTML would provide no more information whether Vanguard has a policy of rejecting specific brands/models of U2F keys.
,
May 28 2018
Thank you for providing more feedback. Adding the requester to the cc list. For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
,
May 28 2018
Mike, apologies for the miscommunication on our side, I forgot to remove the NeedsTriage label, which confused the TE folks. We don't need more data at this point, and certainly not your Vanguard account password. As a next step, I would like to hear what other people who are CC'ed think, although today is Memorial Day in the US so I suppose most folks are out. I'll assign this to myself for now.
,
May 29 2018
We have been in contact with Vanguard about this a couple of times and we agree that this is not the way that we want to see sites supporting security keys. We are choosing to continue working with them rather than taking more active measures at this time: 1) Vanguard are an early adopter of security keys and we want to encourage this in general. 2) The FIDO metadata service (which, if you want some form of attestation checking, is supposed to be the source of truth) is still incomplete and the ecosystem around it isn't yet developed. 3) FIDO were, last I heard, revamping their defined security levels and I don't know if that process has completed yet. So, as unfortunate as this vendor lock-in is, Vanguard would have a fair argument that the "right thing" is not yet ready and thus this stop-gap is more reasonable in that light. We continue to watch developments in this space and hopefully the MDS will mature to the point where it's the obvious and easy answer. We're very interested in hearing about any other sites that may employ a similar attestation policy and, as you've probably noticed, we introduced a permissions prompt for sites wishing to obtain attestation information in Chrome 66.
,
May 31 2018
Thanks for the overview, Adam. I see the need to be more lenient while community building. At the same time, I worry that this behavior from a name brand like Vanguard will become a U2F best practice.
,
Aug 2
|
||||||||||
►
Sign in to add a comment |
||||||||||
Comment 1 by sindhu.chelamcherla@chromium.org
, May 25 2018Labels: Triaged-ET TE-NeedsTriageFromHYD