Continue Discussion 128 replies
September 2011

SohailH

Something like LastPass gives you the browser plugin and cloud storage. OK, it’s not your dream scenario, but it’s a start.

September 2011

Helge_Klein

You reinvented the password manager.

September 2011

codinghorror

No – I’m proposing this should work out of the box for every website and every browser in the world, on any device.

With absolutely no configuration or thinking or plugin setup or software installation required.

(ideally using W3C blessed standards, but whatever it takes)

September 2011

SiebrenB

Another issue that you run into immediately is the use-case of multiple people using the same computer and user account, and thus, the same browser profile to access the internet, such as the public computers available at most public libraries.

September 2011

codinghorror

Hopefully there would be some “Kiosk Mode” in the browser for this scenario, Siebren.

September 2011

MarkusH

I dare say you’re inventing the past. Soon enough my personal bio-chip will log me in to anything I need access to automatically as soon as I touch the keyboard or the mouse.

September 2011

KrolK

… I dream of the day when I never need to see another password field in my browser ever again …

But from your description I read that you’ll see password field when you “Log In” into your browser :slight_smile:

This dream is almost done with chrome password sync.
And it doesn’t need no extra work in pages.

September 2011

HansV

The problem with doing a lot of things automatically is that some people have multiple identities online. I decide on a per site basis what identity to use (my real identity or my nickname etc).

In the case where you could trust every single site with your real identity this wouldn’t be necessary but in my opinion we’re a long way from that scenario being reality thus I will be choosing an identity for every single site.

From a security point of view I wouldn’t like the above idea either, having functionality like this will enable a worm/virus to not only infect my local machine but possible spread havoc on all my registered accounts as well. Not to mention registering me for new services I don’t want…

September 2011

Boldewyn

Have you heard of BrowserID before? It’s a Mozilla project where they try to move identification in the browser. A very promising approach, that might remedy some of your outlined problems:

https://browserid.org/

(When I first learned about it I thought all the way back to your driver’s license post.)

September 2011

Alsothings

If all the passwords are generated and unseen to the user anyway, wouldn’t it be better to use public/private key pair ala passwordless ssh? then there’s less of a need for https and it’s slowness all over everywhere.

And yeah chrome password sync is a thing of beauty and about 3/4 of the way there…

September 2011

codinghorror

But from your description I read that you’ll see password field when you “Log In” into your browser :slight_smile:

Yes, but my computer runs for days with one instance of Chrome… I’ll gladly accept one browser login every few days!

And yeah chrome password sync is a thing of beauty and about 3/4 of the way there…

Agreed, that’s what emboldened me to propose this as (gasp) a standard.

September 2011

Rengis_2

BrowserID is a Mozilla Labs project, and I’ve come to expect their projects to get discontinued, like it happened to Prism, Ubiquity etc.

September 2011

Trackable

“more and more websites need to know something about who you are to work”

Ah, no. More and more websites WANT to know something about who you are, because your personal data is their money. The more you give them, the better.

You’re describing a single point of failure here, an excellent entry point for data collection, for profiling your behaviour, and to finally control your life. When someone restricts your access to this central login repository, then you’re out.

It’s the very same thing with the movement away from freely programmable production machines, to controlled consumer machines like smart phones, web pads and the like with the restricted app stores. The people are currently giving away the freedom they gained by the computer and internet revolution – and most of them seem to be happy in doing so.

Your dream WILL come true, because the consumer machines require such an infrastructure. But it will turn out to finally be a nightmare, I’m sure.

September 2011

Rcomian

Ok, I must confess, it sounds a lot like LastPass.
It’s much more what lastpass wants to do, rather than what lastpass does, but it’s all there.

Using lastpass, it will detect a sign-up page. It will allow you to auto-fill the page with the identity of your choice and generate a strong password. Once you’re in it will detect the login pages and auto-fill your credentials. I believe you can set it to auto-login to certain sites too.

LastPass stores your credentials in the cloud, but encrypts them on your endpoint so that they’re secure. It runs on almost any device, although the degree of integration is very limited on things like iphone and android, and is usually missing from within applications themselves (spotify, any phone app), which is annoying.

Remember, our web passwords are way beyond just websites now, don’t forget our beloved mobile apps.

Are we asking for a version of lastpass that can be easily integrated with sites, browsers and apps, from both a practical and legal point of view? I guess we don’t want to make a monopoly here, so it presumably couldn’t be last pass explicitly.

September 2011

RoelF

Very good proposal!
What about multiple accounts for one person? Some people like to keep some accounts separated from others (eg a twitter account for a company and a personal facebook), but still be able to manage those sites within the same browser sessions.

Agreed, starting multiple browsers is a small price to pay though…

September 2011

PhilippeP

The weakness I see with your proposal is the need for some kind of cloud storage for usernames and passwords: the end user will have to sign in to their authentication provider anyways. I you have to do that, why not just use OAuth? Sure, your proposal also implies that the default authentication provider / password vault be automatically filled in the browser so that the user does not have to say whether it’s Google, Facebook, etc., but couldn’t this also be done when using OAuth?

Or is your proposal mainly about shifting the complexity of integrating with a third-party authentification provider from the websites to the browser?

September 2011

DimitriM

Too late :wink:
http://www.technologyreview.com/web/38511/?ref=rss

September 2011

Hutchinsfairy

I must admit I use a mishmash of techniques but LastPass is very good at achieving most of what you suggest, it can even be used with YubiKeys to give you a physical “Key” to your logins. I also universally use disposable email addresses to sign up (via Spamgourmet.com). Not only does this not expose my personal email address to spam/abuse but means I can find out which unscrupulous bar steward was prepared to sell me out!

September 2011

Goran_Siska

@Sohail Hussain +1 for LastPass. There’s no way websites will ever agree on any standard as they believe my 10MinuteMail is quite valuable. I’m happy to let LastPass record the hoops needed to login a particular site and let me go on with my work (heck it even creates passwords for you, I have no idea what 90% of my passwords are any more).
Progress is not based on optimal paths but paths of least resistance. I hope Dick Hartd will prove me wrong but until then using (insert favourite password manager) will do.

September 2011

VictorE

The password could be selected by using a hash of some private information and some web site information (private / public keys come to mind). An issue with this approach is when things change - As they can and will. You also need to be able to shift between contexts on the client side to enable more than one account per web site.

September 2011

James

Why are we logging into websites? I log into my PC, why can’t that be enough?

Or at least, for people with multiple logins for stuff or kiosks in libraries why can’t opening my browser prompt me for a login?

Then magic SSL encrypted XML hand waving can make it all work. The details are unimportant, the concept should be “human identifies itself to the computer, human identifies itself to the browser. Browser handles all the other stuff”

We can cope with typing in admin passwords in OSX to do certain things after all. Of course then if someone works out your password, your entire online life is compromised… but that’s about as important as letting people know the PIN for your VISA card (and you don’t do that because it’d be moronic).

September 2011

Id1

Frankly, the password is not what bothers me, nor what I see as the biggest time waster. It’s the damn “email verification”, which often takes a huge amount of time to get to my inbox, usually preventing me from using the website until then.

Passwords have decent solutions already, like LastPass and similar.

September 2011

NeilT

The browser must, unfortunately, prompt the user with a confirm dialog containing a CAPTCHA

That seriously turns me off. I hate CAPTCHAs far, far more than having a sign in.

September 2011

Danthorpe

What you’re proposing should be additions to the HTTP spec, v1.2. It would add CREATEACCOUNT, LOGIN and LOGOUT as HTTP methods. The user would configure (once) on the device their ‘cloud password locker’, which the browser/application would send in the HTTP headers. The HTTP 1.2 based web server would then return a response with appropriate id numbers or whatever if the process was successful.

Any solution for the password problem must be designed from the outset with non-browsers in mind - so it should be part of HTTP(S).

To get rid of the CAPTCHA requirement would need something additional. How about the website generates a QR image, which would need to encode some identifier for that browser session. The user can then scan the image using their Smartphone. The device completes the account creation/login operation (using the principles described above), and the web server can then use the session identifier to refresh the website.

Obviously, lots of assumptions in there.

September 2011

D1165

Multiple Accounts?

September 2011

D1166

Hear, hear! Though I disagree on your proposed solution. CAPTCHA’s, E-Mail verifications, usernames and passwords should be things from the ancient past already.

OpenID was developed with good intentions, but the usability and implementation failed. We have taken what’s good with OpenID and built a service which helps you to get rid of passwords; https://www.mepin.com/

September 2011

Phenwoods

“The browser will also automatically select a completely random, cryptographically secure password for the new account.”

Does that mean that all your passwords are now stored in plaintext on “some form of secure https cloud storage”?

September 2011

Danthorpe

Well, enabling multiple accounts should just be an implementation detail for the OS/browser vendors. You could add multiple identities each with a ‘cloud storage locker’, and when the browser reads these special meta-tags for the create account view your browser/application would prompt you to select the identity you want to use.

September 2011

ChristopherA

All in all this is a good proposal, but there are drawbacks that would need worked out before its viable.

  1. All of your internet passwords would be stored in one central location instead of many different locations. Can’t really do much except distribute this one, but its something to be aware of.
  2. If that location ever gets hacked you are screwed and will be scrambling to change passwords that you don’t know because they were generated. This is a very very very bad situation.
  3. If the central storage site goes down, you have absolutely no recourse. You cannot access anything and you cannot change passwords because you don’t know them. If this is a distributed site then this may be far less likely, but could still be an issue.

Guarantees for uptime and such can be made but we only have to look at what happens when RIM goes down to see how bad things could be. The current approach is by no means perfect, it isn’t even good, but more thought would be required before your proposal would be anywhere near viable. We just need to be sure that in our rush for less annoying security we don’t lose security.

September 2011

NikolayT

I think that your “dream” is exactly the inevitable future! Thanks for the great article, Jeff!

September 2011

D1167

I love how your “I Have a Dream” utopia has a CAPTCHA in it! haha

September 2011

Dangoor

@Reņģis: Identity is a very important area at Mozilla and is not being thought about in the same way as a typical Labs project. The group working on BrowserID is definitely looking to get it into a shipping Firefox release.

September 2011

DentonG

If part of the problem with OpenID is websites deliberately eschewing it in order to “own the identity” of their users, would requiring the addition of meta tags run into the same problem?

Browser scraping of FORM elements works relatively well for autofill. Perhaps a guerilla Browser Identity system by scraping for stuff which looks like a “Create Account” page wouldn’t be so bad.

September 2011

Boldewyn

@Reņģis :heart: It is called “labs” for a reason. And many projects there are now used in production somewhere: Bespin is now the code editor in Github, TestPilot has several tenthousand installations, Sync, Personas and Jetpack are now part of Firefox Core, …

Putting the identity management right in the browser is a very useful approach. And BrowserID even offers a fallback for legacy browsers not capable of it.

September 2011

AnthonyT

First of all why does the cloud need to be a central server somewhere outside of your control? You could have a password repository that you share between your devices and you just poll your desktop to update your passwords to your smartphone or something similar.

Multiple accounts as mentioned earlier is easily handled by the browser maintaining a list of identities and prompting you for which one.

To the security issue, why do your passwords need to be stored in clear text on the cloud, whatever form it takes? Could we not have them stored encrypted with your browser password also being the key that decodes your stored cloud passwords?

September 2011

MichaelH1

I don’t know a whole lot about certificates and their applications but they seem like the perfect fit for the magic data used to identify someone. That is, instead of you still generating some silly ascii password, why not have the site issue you a cert?

Surely the whole cert system (if simplified by a suitable amount of hand waving) can bring a lot to this party?

September 2011

WladimirP

That’s pretty much what Mozilla’s Account Manager prototype is about: http://mozillalabs.com/blog/2010/03/account-manager/

September 2011

Andand

It appears the W3C is at least considering the problem: http://www.w3.org/2011/identity-ws/

September 2011

AramH

Abstracting the problem away won’t solve the problem. It will only create more complexity and more problems in the future.

September 2011

Quppa

From a privacy point of view, I rather like being able to keep accounts at different websites entirely separate. This kind of system might be acceptable provided that it remained entirely optional, which is impossible to guarantee.

September 2011

Izaak

Unfortunately, there are 2 words that can bust this dream, just like any other “secure” password mechanism: keylogger malware. You either have to intially sign into your browser, or the “cloud” identity store at some point (think public terminal browsing), and then you’re still vulnerable to man-in-the-middle attacks for stealing your online identity, which has suddenly become much more dangerous because your bank account, 401K login, etc. are all tied into the cloud identity store, so once that’s cracked, you’re toast. At least with separate passwords, you might be smart enough to protect your bank password more vigilantly (i.e.: don’t access your bank account from a public terminal).

That said, I agree with the initial premise: password proliferation on the internet is totally busted and in need of urgent help.

September 2011

Phenwoods

“To the security issue, why do your passwords need to be stored in clear text on the cloud, whatever form it takes? Could we not have them stored encrypted with your browser password also being the key that decodes your stored cloud passwords?”

Fair point, though it would make it difficult to change your browser password.

September 2011

Stefankendall

Unfortunately, I think any developer capable enough to work with such a standard is also the same developer pushing for OpenID logins. “Just use OpenID, damnit” will quickly become “Just use standard login/password registration forms, damnit.”

But frameworks auto-generating username/password stuff will be slow to migrate, or old UIs that integrate across multiple non-browser mediums will never migrate, or…

you get my drift. I say we just push harder for OpenID.

September 2011

Phenwoods

Another question that would need to be addressed is how the browser authenticates the site requesting a login.
If this isn’t secure it would make it very easy to create an automatic phishing site as the password is being sent without any user input.

September 2011

Chris_Breen

You have just described LastPass.

September 2011

MikaelH

Finally! It seriously took me about 5 minutes to create a profile (which I still had to provide a username/password for ;)) because the other sites didn’t work! That said, I do believe passwords can be abolished. Though, I don’t trust any other identity provider. There is no reason why I should be bound by some other system to verify who I am other than me.

That said, I think a fairly solid solution would be to use the PGP model that would act as a plug-in for browsers. You would have an application that would sit on your PC and it would create and manage a secret key. Profiles could be generated from this secret key and generate public keys which can be shared at will. The browser plug-in would then detect if the site is using the same authentication scheme and, if the site is authorized by you, the public key and profile would be shared with the site over an encrypted connection and you would have instant access to your sites. Granted, this would need a critical mass of user penetration to be considered useful but it would require no passwords and could be shared across devices (This could create a management headache. Though, why you would have a different address for your ebay profile from device to device is beyond me.).

The entire purpose would be to store identity profiles and not payment methods so there shouldn’t be much worry about the boogie man lurking around the corner. The only real issue is if your computer is compromised and your keys were stolen. This would also defeat keyloggers, as Izaak mentioned, as no keystrokes would ever be required to generate and pass around the keys that identify your profile. There would be no risk of mistaken identity from site to site as the keys for each profile would be unique.

Basically, I trust no corporation or institution to vouch for me as ultimately they will only serve their own interests and there is always the risk that if the “trusted” source says you’re someone different, through fluke or otherwise, than who you say you are then who are you to disagree? Eventually we must all take responsibility for who we are online and I think only we, as individuals, can do that. This might not be a perfect system but I do believe it to be in line with these ideals.

September 2011

Skyborne

I also want to remind you that SSL is horribly, terribly, keeps-me-up-at-night broken. My browser still has 1024-bit trusted roots, which were expected to become breakable as early as 2006 or as late as, um, 2011, depending on your source. And once any of them is broken, the attacker holds the keys to the Internet. (This is in addition to demonstrated attacks: sslstrip and sslsniff, outright forged certs (the Comodo reseller snafu and hacking of DigiNotar), certain CAs signing multiple certs for “localhost”, and the unbridled “we’ll do what we were supposed to be doing in the first place, for a price” avarice of EV certificates.)

The multiple identity problem, raised above, is important to me as well: I need to select Skyborne vs. other identities at will, e.g. to write about sexuality without having any stigma from that attached to my real life.

September 2011

PilotBob

Dare I say it? Card Spaces and InfoCards. It was very similar to your “drivers license”. It also allowed for various identity providers so you aren’t limited to 1 issuer.

There are only 2 small problems that I think prevented it from being used.

  1. Identities were not portable. (BIG PROBLEM)

  2. It was mostly Windows.

If you solve problem 1 then problem 2 will solve it self because web sites would start supporting it.

Of course, info cards are very similar to client certificates. I believe these can be installed on multiple PCs. However, don’t think they have the security of InfoCards due to the fact that every web site sees the same id, where as with InfoCards each web site gets a different token so they can’t match you from site to site.

BOb

September 2011

AnyGould

Aren’t we most of the way there?

To sign in just now and post this very comment, I hit “sign in”, it asked me which credentials I wanted to use, and ta-da.

I can’t remember the last time I had to sign on to SE. I hit log in, use OpenID, and it works.

September 2011

MikaelH

The problem I see there, AnyGould, is that your identity provider is still some third party. If you’re on the web to be able to hit a web site there is no reason any resource should be hit other than your PC for identity verification. “Trusted” identities for sensitive systems is a different concern but just for posting on codinghorror.com shouldn’t take any sort of “trusted” status and you telling this site who you are should be enough. But, this is one thing I care particularly about though so I am biased.

September 2011

Mason_Gup

Your “dream scenario” sounds remarkably similar to how LastPass works now. On the downside, auto-scrape and fill of account creation and login info isn’t quite perfect. On the upside, they already store a strongly-encrypted password list in the cloud that is only decoded on the device, and it’s available on almost all devices and browsers.

They don’t have a captcha, and I don’t see what the purpose of it is either. Why bother having the browser side verify that there’s a person at the computer?

September 2011

DevonR

Why not just mature and use Public Key Infrastructure?

September 2011

GabrielD

Mozilla seems to put your idea to work:

http://identity.mozilla.com/post/7616727542/introducing-browserid-a-better-way-to-sign-in

September 2011

JonC

Sounds marvelous. One thing that I especially like about it is that I don’t see any reason why it couldn’t be implemented by LastPass, and they have a lovely bookmarklet interface that means they’re portable to just about any browser.

Have you considered asking LastPass if they’d be interested in prototyping a test implementation of something like this? They’d seem to be ideal since they already have the secure-password-management-in-the-cloud side of things taken care of, and users who would presumably be very receptive to even more automation. You could implement the provider part on Stack Exchange to give it some production usage.

September 2011

Randomtexan

I’ll see your xkcd comic and raise you another http://xkcd.com/927/

Already see this effect in the comments

September 2011

Phenwoods

“They don’t have a captcha, and I don’t see what the purpose of it is either. Why bother having the browser side verify that there’s a person at the computer?”

I think the point is to stop the cloud sending all your personal details to any website that requests them.

September 2011

Mattcaron

The problem is, I don’t want what you describe. I don’t want my browser holding those credentials or passing them by proxy. It’s too easily compromised or spoofed. I don’t want the cloud holding those credentials, for the same reason. Regardless of what the credentials are, I want them either in my brain or in a passphrase-encrypted store which does not directly interface with the browser.

So, your proposal needs a big “do it the old way” button.

September 2011

RichardW

Why do we need password protected accounts for websites at all? I can (and will) tell lies on account-creation pages as well. And, really, who cares who I am? Even with the account-based model I can easily make 42 different accounts.

No, the real solution is banging the heads of all web-devs who think they’ll need accounts against a sufficiently stable wall - until they don’t think that anymore.

Nobody with at least half a brain stores anything private unencrypted on the web. Passwords didn’t save the dropbox or PlayStation-Network users, and they won’t save you.

So, just get rid of your fake security and wannabe identification device named password-“protected” accounts.

Problem solved.

For real security use encryption. With a password. Stored in your brain.

September 2011

LeviV

In Belgium, everyone (over 12 years old) has an electronic ID-card. Which basically contains a few certificates which you can use for digital signatures. (E.g. paying your taxes online.) You only need a cardreader, and the software (which is open sourced and can be found here: http://code.google.com/p/eid-mw/).
I’m not an expert on the topic, but I suppose a certificate for everyone might work… More info here: http://en.wikipedia.org/wiki/Belgian_national_identity_card

September 2011

govert

+1 for LastPass.

September 2011

IonatanW

mmmm, I agree that something must be done, but your solution seems flawed to me… You have one password to rule them all, if someone gets your master password, you are screwed, he has access to all the sites ever.
I get that like this xkcd comic says http://xkcd.com/792/ (noticed how many things can be explained with an xkcd comic?), a lot of people use the same credentials for different sites, but that’s another subject.

September 2011

RickyS

+1 for LastPass,

The Security Research Team at the Cambridge University Computer Lab came up with a more radical idea to represent utopia, named ‘Pico’ ( http://www.lightbluetouchpaper.org/2011/03/27/pico-no-more-passwords/ ). Proposing a clean slate approach.

September 2011

AdrienA

Another solution my guts believe is safe is (I have no formal proof) to replace

http://…/signin
by
https://…/signin?uid=123456798123456798…

With the uid to be a huge random unique key.

TLS makes sure nobody can read the url, so your uid/ukey is safe on the wire.

Bookmark it.

Make sure your laptop is not stolen. (anyway…)

Done.

September 2011

Ape_Inago

Lastpass does a lot of this for me, although when it does mess up, it dies hard. Thankfully they make it pretty easy to manage the accounts it stores, and can handle multiple accounts well.

September 2011

Sigivald

  1. re. the XKCD - he ignores that many sites have a password length limit - and a few of them, at least, will be silently truncating, which makes a phrase worse than using linenoise.

Also, I don’t know about him, but in my world, the sites I care about all limit login attempts or speed, so you can’t brute force - the “1000 guesses per second” problem is solved by not having the same password on every account; use different ones on banking and Important accounts - none of which will tolerate that sort of behavior from outside, and a shitty generic one on useless sites like forums because who gives a damn about forums.

And lastly, the Bad People don’t care about my account. They care about getting “easy” accounts; the people who use “Password123” and the like are all screwed.

On your suggestion - I absolutely reject any centralized system where a single point of failure breaks everything and a single security issue compromises everything I do.

Have fun pushing it - I ain’t taking it.

I mean, sure, it makes your life as a website operator easier.

Good for you. Not my problem as a user, however. I don’t care about making your life easier (nothing personal!); I care about mine, and “magical browser-based just works once you give a browser your master super-password” is BAD.

I don’t want to have to give Someone Else’s Computer my Master Credential Authorization to, say, play Kingdom of Loathing.

No. Just no.

September 2011

JoelC

For those wondering about still needing to sign in to the browser or cloud service, this is where something like a smartcard, keyfob, or other physical authentication device would come in handy. They are unappealing in today’s world of separate accounts on every site, but under this scheme (when paired with a quality account recovery service) it makes a lot more sense.

I’m curious about how we would prevent a malicious (or temporarily hacked) web site from showing a specially crafted sign-in page to the browser, and having the browser send along your private information to the wrong place without you every noticing. It seems… exploitable.

Also: captchas are not appealing to me for this. But I reference my first point: combine it with a hardware security key, and maybe the hardware key allows you to bypass the captcha.

September 2011

Richie5um

Couldn’t agree more. There has to be a better way. And, there very nearly is with OAuth. However, and this is a pet peeve, whenever I use a OAuth account to log in to a 3rd party site, they require far more entitlements than they need. Thus making me nervous, and resorting to site specific user/passwords.

To enable me to post this comment. I logged in with my Twitter ID, which asked fir the following entitlements (this is the actual text):
• Read Tweets from your timeline.
• See who you follow, and follow new people.
• Update your profile.
• Post Tweets for you.

What a joke!!!

A little more respect, and we’d already be there with a Internet identity.

September 2011

Daniel_Root

I get that Jeff’s saying a browser standard and not a plugin like LastPass, but WRT @Christopher and some of the other “LastPass” posts: one of the nuances about LastPass is that it only stores encrypted copy of your password database in “the cloud”. A local copy is downloaded to each device using it, and is accessible offline. So it supports “occasionally connected” scenarios, though obviously you can’t sync up new passwords from other devices while offline. The encryption is AES256 I believe, so it should be good until quantum computers come out next year. :wink:

Seriously, Jeff, look at LastPass if only for the technical details about what would be necessary to implement something like this. I’d love for it to be standard, better integrated into websites, and free-er, but it really follows the spirit of what you’re saying here, I think.

Another kink in your plan is that not only websites need passwords. As a consultant, I have VPN passwords, AD accounts, 3rd party apps. Not to mention personally, I have PIN codes for bank cards, membership cards, etc. So, you’re right that it all boils down to identity, but a full solution has to be bigger than a web browser.

September 2011

Kevin_Peno

http://www.w3.org/wiki/WebID

Is argue that TSL (aka SSL) is not broken. The “trusted authorities” model is broken, which typically only effects HTTP+SSL for browser communication. WebId is not affected by this, nor is the public+private key system in general. We should just move to client keys period, which is all the “trusted authorities” are emulating because of the lack of processing power in the past.

September 2011

C_W

I do NOT want to use any “internet ID”.

Besides, it’s certainly not working well with Korea.

http://www.techdirt.com/articles/20110729/13491215321/hack-attack-south-korea-gets-access-to-data-over-70-everyone-country.shtml

September 2011

Mike_Mooney

A bit of a low-tech version of what you are talking about, but it’s worked well for me for years (Password Safe + DropBox): http://mooneyblog.mmdbsolutions.com/index.php/2010/04/16/password-management-for-dummies-and-developers/

September 2011

MartinDoms

No. No no no no no. I’m sick of people behaving like websites are the only things that require passwords. Your “solution” offers no affordance for those of us with passwords on our Windows accounts (several at work and home), our phone lock screens, buildings, bank/telecoms telephone lines, etc etc etc. We need a password solution that doesn’t require internet access. This “cloud-based” solution is completely worthless for a massive number of use cases.

And no, don’t give me that crap about ubiquitous internet. Maybe in your country, but it’s YEARS AND YEARS away from being a reality where I’m from.

September 2011

JasonW

Wouldn’t this tie me to a single browser? I use several browsers on several devices, and I need access from all of them.

September 2011

DaquanW

Jeff, you are a genius.

Yes, yes, yes. I have a text file with my passwords/usernames and I have to refer back to it when going to another site. It’s a gigantic pain in the ass.

This is a major restriction of the web, versus the desktop. But I’d like for the web to act more like the desktop. When you logon to your desktop, you input your username/password and are able to access all programs without a hitch. This is what I’d like for the web later, as you stated, having an ID/Password and accessing any site in the world on any device.

There is however, one big catch. The only way it’s possible is if either:

  1. People use one identity
    or
  2. The system is able to present multiple identities and you plug which identity you want to use into the website.

Realistically, the more websites we go to, the bigger a problem this will be. I know I’m not the only one that goes to tons of forums/blogs/e-com sites and gets pissed off when you have to click the “forgot password button.”

September 2011

Ohazi

Agreed, that’s what emboldened me to propose this as (gasp) a standard.

http://xkcd.com/927/

September 2011

JonathanW

CAPTCHAs don’t work well in any case. Spammers just pay people to solve them and computers are better than humans at deciphering mangled text/identifying puppies/etc once trained.
http://bitland.net/captcha.pdf

September 2011

D1168

The number one biggest concern I have reading your description of this is when you say the word ‘etcetera’ in this sentence: “retrieves the user’s standard information fields like name, email address, etcetera from some form of secure https cloud storage”. Sites are all the time asking for information I may or may not be willing to give. Especially when I’m trying something out. So maybe I start with a mailinator address and a fake birthday, and then based on the usefulness I’ll sign up for a real account. But even then, there’s not much chance I’m giving my real phone number. I don’t want any sort of automatic data pull happening from some cloud storage. I have to control what data I share, 100%.

I remember reading an article by Doc Searls back in 2005 where he completely missed the same point: http://www.linuxjournal.com/article/8357. Identity information is essential… valid demographics are often optional. If the system doesn’t allow me to remain semi-anonymous, fake data, or outright lie when I’m asked for information that I don’t want to give, the system won’t gain acceptance. Identity and demographics are different and have to remain so for any system like this to work.

September 2011

VladS

I agree with the approach above using SSL certificates. Using a single cloud solution is a single large point of failure. If Amazon Service or Google ever goes down (and they both have) then the internet is broken. I put a more formalized solution up for the method described above using SSL and a private key store.

http://oim.ae/rdRKtY

September 2011

D1169

Sure sounds a lot like CardSpace.

September 2011

ItakoM

Why not using fingerprint scanners?
I think they’ve gotten pretty cheap.

September 2011

D1170

I just don’t see this as such a big problem as you point out.

I have very few websites where I have a unique username/password. Basically just Google, Facebook and Amazon.

Almost all remaining sites support my Facebook account or OpenID in some other form (posted this comment through my Yahoo! account).

September 2011

Seth_Heeren

What @Sigivald said:

Good for you. Not my problem as a user, however. I don’t care about making your life easier (nothing personal!); I care about mine, and “magical browser-based just works once you give a browser your master super-password” is BAD

+1 (mamy times)

September 2011

Serbrech

Sounds scary that there would be a database of the passwords of everyone in the world…

And I agree with most of the comment mentionning LastPass to be as close as can be from your proposition…

Why do people prefer lastpass over 1password?

September 2011

TheC

How about this: you have a PGP key pair installed on your machine. Your username (everywhere) is the public key. Your password is the url (or something in a meta tag), encrypted with the private key. Both base-64 encoded. You can also install that certificate on the cloud, in which case you would get each password by logging in there, so you wouldn’t need to install the certificate when you’re a guest. In other words, you’ll only use the cloud when you’re not on your default machine.

Isn’t that simpler, and just as secure?

September 2011

ChrisF

@Jeff,

Any chance you will consider adding authentication via a X.509 certificate as an additional option on stackexchange? It sure seems like this should be pretty easy to implement. It seems like it should be as useful for proving the identity of someone as trusting 3rd party identity providers, or cookie based authentication. You already support multiple authentication providers adding another should be easy.

Just setup a page, which requires a certificate. If you have never seen the public certificate before, ask the user if they wish to associate the certificate with an existing account or create a new one, store the certificate for future logins. If you have seen the public cert before, then look up the account details and log the user in.

I would suggest that you should not care about what CA the certificate is signed by. Just accept any certificate signed by any CA, or self-signed. If you don’t spend time trying to verify anything to do with CAs, certificate based auth basically just becomes trust on first use.

September 2011

jcape

The technology you’re looking for is called “Kerberos” :slight_smile:

September 2011

TampopoC

Internet driver’s license or another third party centralized authentication. With government approbation or / and control = Instantaneous worldwide censorship.

Also attack that password combining random words from a dictionary. Your entropy become useless in no time.

September 2011

JosephS

Scan your eye/fingerprints as your identity. I hope in near future all computers/devices will have camera and browsers should be able to scan your eyes/fingerprints and use that to identify yourself

September 2011

Mark_Kalmes

Jeff - what exactly does the browser integration get you over the current state of affairs at StackExchange? I click to ‘log in with Google’, and I have to confirm the first time, after that logging in seems to be just transparent without any prompts.

September 2011

VincentM

Google should buy Lastpass and make it a default in Chrome and Android. Lastpass is great on the Desktop, but sucks on the iPhone because of a lack of important public APIs on iOS.

September 2011

FelixC1

It would be great if all the Internet switched to SSL, and used client certificates to identify people.

September 2011

tz110

You need a revokable and replaceable token. The site sends me a random string (there was an Ansi token that used DES). I type it in or have something like a yubikey maybe with pin or fingerprint (and/or clock) in a usb port. It returns a cryptographic response.

Something like this exists with cell phones where you can get texts or voice responses.

September 2011

Dsadinoff

Note that from the user’s perspective, you have reinvented SPNEGO.
This is implemented in all interesting browsers, and is how Microsoft implements Kerberos in IIS.

I have a feeling that your solution is implementable on top of the existing SPNEGO infrastructure, which is IE, Chrome & FF

http://en.wikipedia.org/wiki/SPNEGO .

September 2011

Rossmac2310

I agree - aren’t we all sick to death of passwords. Well how about a passwordless solution. One which requires you to identify yourself through SSO or OpenID but then authenticate yourself securely through a ‘secret’ code sent to your browser and validated by your mobile phone. I won’t say anymore - we launch this service next week and we will revolutionise this space. Check it out. LiveEnsure. http://www.liveensure.com/ The key principle is ’ identification is not authentication’ . !!

September 2011

AaronC

What about PKI? Why don’t more sites support this? Especially banks. In the absence of more universal adoption banks should be acting as CA’s and issuing PKI certificates for secure access to their own service. Browsers already support it and it works tremendously well.

You know what I would love to see? Smart Card driver’s licences with identity certificates on them.

September 2011

Simonsc

Jeff, might I point you to this XKCD comic? http://xkcd.com/927/

September 2011

Silvercode

I posted a message here recently, but it didn’t even get to the messages, not to talk about that I have to log in.

September 2011

MattP

The problem with passphrases is that MANY well known sites don’t allow spaces in passwords (twitter for example - you would have thought they would know better).

And the number of sites I’ve come across that won’t let me use symbols in a password, or limit the password length to like 10 characters. I usually go for 20+ totally random characters/symbols using (the awesome) lastpass password generator, but it feels like the websites are against me. It’s like they don’t want us to be secure.

Seriously - if I want to create a 256 character password then freaking let me (I know there will be collisions shorter than that).

September 2011

HolgerR

I think the Android os locks the device the best: It lets me lock it with drawing a gesture with my thumb and that’s all needed to unlock me into Android and then everything. So there is no password and still a lock.

I like the idea of software and apps acting “on user behalf” i.e. the software is allowed to act on a user’s behalf and that can mean a lot of things like predefining accounts for services that a users might like so that a user can be already “registered.”

A programming problem is these different user models when a facebook user and a google user can be very well defined and no interaction or relation was defined. So I think internet communities should “sync user data” and if you allow a software realtime uptimes then that’s as easy as pushing the button if already logged in from a known account.

September 2011

Matias_Nino4

The problem of web identity isn’t caused by passwords, it’s addressed by passwords. Eliminating passwords only obfuscates the problem!

Remember that cutting the Gordian knot was a bad thing. It symbolized a regression to brute force and violence. The knot puzzle represented intellectualism over barbarism. By cutting the knot with a sword, Alexander the Great propounded brute force as the solution, when in reality that was the problem.

The brute force approach of addressing Web Identity by re-engineering browsers/html/protocols to natively support automatic password handling is a fool’s errand at this stage in the development of the Internet.

Thankfully what’s great about the Internet is that it solves its own problems through a bottom up natural selection process based on pure useage.

Much like every other web usability paradigm that came before it, proper and effective third party login credentialing will become second nature to the web development platform and ultimately a norm of internet usability.

Until an ubiquitous hardware solution changes the game, users will always need to remember (or use tools to remember) the passwords to their major account providers, but eventually any website and/or service that requires identity to function properly will not have to annoy the user by requiring their own identity forms/procedures.