New issue
Advanced search Search tips
Note: Color blocks (like or ) mean that a user may not be available. Tooltip shows the reason.

Issue 846559 link

Starred by 4 users

Issue metadata

Status: Assigned
Owner:
Cc:
Components:
EstimatedDays: ----
NextAction: ----
OS: Linux , Android , Windows , Chrome , Mac
Pri: 2
Type: Bug



Sign in to add a comment

vanguard.com qualifies for U2F blacklisting

Reported by m...@sowbug.com, May 25 2018

Issue description

UserAgent: Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36

Steps to reproduce the problem:
1. Sign into account at https://personal.vanguard.com/
2. Wish to register an off-brand U2F device with account.
3. Navigate to https://personal.vanguard.com/us/U2FKeyEnrollment#/welcome
4. Explore links on page.

What is the expected behavior?
Site should explain that it's possible to register this U2F device, per standards at https://www.chromium.org/security-keys: "Site attestation requirements [¶] Chrome’s users have an interest in ensuring a healthy and interoperable ecosystem of Security Keys. To this end, public websites that restrict the set of allowed Security Keys should do so based on articulable, technical considerations. They should regularly update their set of trusted attestation roots that meet their policies (for example, from the FIDO Metadata Service) to ensure that new Security Keys that meet their requirements will function. [¶] Chrome expects Security Key manufacturers who have passed FIDO certification to keep their attestation metadata updated in the FIDO Metadata Service. [¶] If Chrome becomes aware that websites are not meeting these expectations, we may withdraw Security Key privileges from those sites. If Chrome becomes aware that manufacturers are not maintaining their attestation metadata we may choose to disable attestation for those devices in order to ensure a healthy ecosystem."

What went wrong?
See attached screenshot. Site limits interoperability to four models of a single manufacturer (and not even the four most recent that company produces!). Site explains reasoning as "Please note that these keys must also support FIDO U2F specifications (which are universal 2-factor online security standards) or they will not work to access your Vanguard account. Vanguard does not design, manufacture, or sell security keys. This list may be modified from time to time." This is in a section titled "Security key technical requirements."

Because many other security keys "also support FIDO U2F specifications," and because that is the only technical requirement specified in the section entitled "Security key technical requirements," the site has failed to express "articulable, technical considerations" for excluding the others.

Did this work before? N/A 

Chrome version: 66.0.3359.181  Channel: stable
OS Version: Ubuntu 18.04
Flash Version: 

This is why Chrome should "withdraw Security Key privileges from" vanguard.com.
 
Screenshot from 2018-05-24 20-12-27.png
187 KB View Download
Cc: sindhu.chelamcherla@chromium.org
Labels: Triaged-ET TE-NeedsTriageFromHYD
As per comment#0 this seems to be security key related, hence forwarding it to Inhouse. Could someone from Inhouse please help in triaging this issue.

Thanks!
Components: Blink>WebAuthentication
We have no 
To finish my incomplete sentence from comment #2.

This seems like a policy request which we generally do not do but over to the WebAuth team since it is in their domain. I believe the correct avenue is for the customer to escalate this with Vanguard.

Comment 4 by engedy@chromium.org, May 25 2018

Labels: Needs-Feedback OS-Android OS-Chrome OS-Mac OS-Windows
Mike, do you know if they are actually blocking registration of security key models outside of that list?

Comment 5 by m...@sowbug.com, May 25 2018

They do block. Turns out they do accept the new FIDO2 blue security key from Yubico (thus I retract "and not even the four most recent that company produces!" although it's possible that Yubico is using the same attestation cert as the v1 of the blue SK), but it absolutely does reject the inexpensive Feitian U2F device. See attached screenshot.

Vanguard is the only firm I've encountered that actually makes you agree to a specific U2F ToS when you set it up: https://personal.vanguard.com/us/U2FKeyEnrollment#/consent. This is not relevant to the bug report.
vanguard-feitian.png
19.5 KB View Download
Project Member

Comment 6 by sheriffbot@chromium.org, May 25 2018

Cc: engedy@chromium.org
Labels: -Needs-Feedback
Thank you for providing more feedback. Adding the requester to the cc list.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot

Comment 7 by mkwst@chromium.org, May 26 2018

Cc: agl@chromium.org
+agl@, who might have opinions.
Cc: kkaluri@chromium.org
Labels: Needs-Feedback
mike@ Could you please help us with sample credentials or html page to triage this issue from TE end

Thank You...

Comment 9 by m...@sowbug.com, May 28 2018

Neither of those requests is reasonable. I'm not going to give you my Vanguard account password, and I'm surprised you're even asking for them. The screenshots I've already provided are enough to see the issue. HTML would provide no more information whether Vanguard has a policy of rejecting specific brands/models of U2F keys.
Project Member

Comment 10 by sheriffbot@chromium.org, May 28 2018

Labels: -Needs-Feedback
Thank you for providing more feedback. Adding the requester to the cc list.

For more details visit https://www.chromium.org/issue-tracking/autotriage - Your friendly Sheriffbot
Labels: -TE-NeedsTriageFromHYD
Owner: engedy@chromium.org
Status: Assigned (was: Unconfirmed)
Mike, apologies for the miscommunication on our side, I forgot to remove the NeedsTriage label, which confused the TE folks. We don't need more data at this point, and certainly not your Vanguard account password.

As a next step, I would like to hear what other people who are CC'ed think, although today is Memorial Day in the US so I suppose most folks are out. I'll assign this to myself for now.

Comment 12 by agl@chromium.org, May 29 2018

Owner: agl@chromium.org
Status: Available (was: Assigned)
We have been in contact with Vanguard about this a couple of times and we agree that this is not the way that we want to see sites supporting security keys. We are choosing to continue working with them rather than taking more active measures at this time:

1) Vanguard are an early adopter of security keys and we want to encourage this in general. 

2) The FIDO metadata service (which, if you want some form of attestation checking, is supposed to be the source of truth) is still incomplete and the ecosystem around it isn't yet developed.

3) FIDO were, last I heard, revamping their defined security levels and I don't know if that process has completed yet.

So, as unfortunate as this vendor lock-in is, Vanguard would have a fair argument that the "right thing" is not yet ready and thus this stop-gap is more reasonable in that light.

We continue to watch developments in this space and hopefully the MDS will mature to the point where it's the obvious and easy answer. We're very interested in hearing about any other sites that may employ a similar attestation policy and, as you've probably noticed, we introduced a permissions prompt for sites wishing to obtain attestation information in Chrome 66.

Comment 13 by m...@sowbug.com, May 31 2018

Thanks for the overview, Adam. I see the need to be more lenient while community building. At the same time, I worry that this behavior from a name brand like Vanguard will become a U2F best practice.
Status: Assigned (was: Available)

Sign in to add a comment