Biometry in general may be acceptable, but fingerprints should be considered
weak protection, because you share that key with your environment all day, every
day. Getting someone's fingerprint is *really* easy. If your phone gets stolen,
chances are, the fingerprint needed to unlock it is right on there already.

And faking fingerprints is really easy, too.

https://www.theguardian.com/technology/2013/sep/22/apple-iphone-fingerprint-scanner-hacked

Am 30.09.2017 um 20:21 schrieb Bryan Davis:
> On Sat, Sep 30, 2017 at 9:28 AM, Roy Smith <r...@panix.com> wrote:
>> What’s the current best practice for auth on ToolForge?
>>
>> I have a passphrase on my public ssh key.  I’ll be accessing toolforge from 
>> my MacBook which is protected with Apple’s Touch ID fingerprint scanner.  
>> I’ll be nailing up a tmux session.
>>
>> So, most of the time, there will be an active ssh session into wfmlabs 
>> protected only by my fingerprint touch.  If the ssh session goes down (i.e. 
>> reboot or network change), it’ll be a touch plus my ssh passphrase.
>>
>> Is this considered an appropriate level of protection for this environment?
> 
> Having a strong passphrase on your private ssh key is recommended.
> Using an ssh-agent to hold your ssh key when decrypted is reasonable.
> Keeping an ssh session open via screen or tmux is acceptable. I would
> expect these three things to be in common use by a number of Toolforge
> / Cloud VPS users and administrators.
> 
> The only thing that is semi-unique about the setup you describe is the
> use of biometric auth for unlocking your laptop. I don't see that that
> makes your key handling practices inherently weaker (or stronger) than
> having a passphrase for unlocking.
> 
> 
> Bryan
> 


-- 
Daniel Kinzler
Principal Platform Engineer

Wikimedia Deutschland
Gesellschaft zur Förderung Freien Wissens e.V.

_______________________________________________
Cloud mailing list
Cloud@lists.wikimedia.org
https://lists.wikimedia.org/mailman/listinfo/cloud

Reply via email to