skip to main content
10.1145/3600160.3600174acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaresConference Proceedingsconference-collections
research-article
Open access

Rogue key and impersonation attacks on FIDO2: From theory to practice

Published: 29 August 2023 Publication History

Abstract

FIDO2 is becoming a defacto standard for passwordless authentication. Using FIDO2 and WebAuthn, web applications can enable users to associate cryptographic credentials to their profiles, and then rely on an external authenticator (e.g., a hardware token plugged into the USB port) to perform strong signature-based authentication when accessing their accounts. The security of FIDO2 has been theoretically validated, but these analyses follow the threat model adopted in the FIDO2 design and explicitly exclude some attack vectors as being out of scope. In this paper we show that two of these attacks, which appear to be folklore in the community, are actually straightforward to launch in practice (user PIN extraction, impersonation and rogue key registration). We demonstrate a deployment over vanilla Linux distributions and commercial FIDO2 authenticators. We discuss the potential impact of our results, which we believe will contribute to the improvement of future versions of the protocol.

References

[1]
FIDO Alliance. 2022. Client to AAuthenticator Protocol (CTAP) – Proposed Standard. https://fidoalliance.org/specs/fido-v2.1-ps-20210615.
[2]
Manuel Barbosa, Alexandra Boldyreva, Shan Chen, and Bogdan Warinschi. 2021. Provable Security Analysis of FIDO2. CRYPTO.
[3]
Garret Bekker and Matthew Utter. 2021. Work-from-Home Policies Driving MFA Adoption, But Still Work to be Done. Technical Report. S&P Global Market Intelligence.
[4]
Nina Bindel, Cas Cremers, and Mang Zhao. 2023. FIDO2, CTAP 2.1, and WebAuthn 2: Provable Security and Post-Quantum Instantiation. IEEE Symposium on Security and Privacy.
[5]
Jaime Blasco. 2012. Sykipot variant hijacks DOD and Windows smart cards. https://www.alienvault.com/open-threat-exchange/blog/sykipot-variant-hijacks-dod-and-windows-smart-cards.
[6]
P. Hoffman C. Bormann. 2020. RFC 8949 Concise Binary Object Representation (CBOR). https://www.rfc-editor.org/rfc/rfc8949.html
[7]
World Wide Web Consortium 2019. Web Authentication: An API for accessing Public Key Credentials Level 1 – W3C Recommendation. https://www.w3.org/TR/webauthn.
[8]
Andrea Continella, Michele Carminati, Mario Polino, Andrea Lanzi, Stefano Zanero, and Federico Maggi. 2017. Prometheus: Analyzing WebInject-based information stealers. Journal of Computer Security 25, 2 (2017), 117–137.
[9]
Hui Li, Xuesong Pan, Xinluo Wang, Haonan Feng, and Chengjie Shi. 2020. Authenticator Rebinding Attack of the UAF Protocol on Mobile Devices. Wireless Communications and Mobile Computing (2020). https://doi.org/10.1155/2020/8819790 https://doi.org/10.1155/2020/8819790.
[10]
MITRE. 2021. T1111 - Multi-Factor Authentication Interception. https://attack.mitre.org/techniques/T1111/.

Cited By

View all
  • (2024)Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology EnvironmentsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3671411(1-11)Online publication date: 30-Jul-2024
  • (2024)Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11Proceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664496(1-10)Online publication date: 30-Jul-2024
  • (2024)Cross-Domain Solutions (CDS): A Comprehensive SurveyIEEE Access10.1109/ACCESS.2024.348365912(163551-163620)Online publication date: 2024

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ARES '23: Proceedings of the 18th International Conference on Availability, Reliability and Security
August 2023
1440 pages
ISBN:9798400707728
DOI:10.1145/3600160
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 August 2023

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. CTAP
  2. FIDO2
  3. attack
  4. impersonation
  5. rogue key

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Funding Sources

  • Fundação para a Ciência e a Tecnologia

Conference

ARES 2023

Acceptance Rates

Overall Acceptance Rate 228 of 451 submissions, 51%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)345
  • Downloads (Last 6 weeks)77
Reflects downloads up to 02 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Towards Availability of Strong Authentication in Remote and Disruption-Prone Operational Technology EnvironmentsProceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3671411(1-11)Online publication date: 30-Jul-2024
  • (2024)Digital Forensic Artifacts of FIDO2 Passkeys in Windows 11Proceedings of the 19th International Conference on Availability, Reliability and Security10.1145/3664476.3664496(1-10)Online publication date: 30-Jul-2024
  • (2024)Cross-Domain Solutions (CDS): A Comprehensive SurveyIEEE Access10.1109/ACCESS.2024.348365912(163551-163620)Online publication date: 2024

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media