On 8/12/13 6:55 AM, Lloyd Hilaiel wrote:

> What are the cons of reducing the security of recoverable class A data
> such that it could be accessed with a persona assertion asserting
> ownership of the email address stored in your account?

If I understand you correctly, the proposal is to replace the "help I
forgot my password" flow from:

1: we email you a code, you type the code into your browser, you replace
   the password with something you can remember

to

2: you use that browser to get a Persona assertion for the email, then
   you replace the password with something you can remember

If that's correct, I'm all in favor of the change. I don't even think
it's a reduction in security, especially if we improve the Persona
email-verification like you suggested.

Using Persona for this would allow IdPs to use other (non-email)
authentication mechanisms, which is is part of the whole
enabling-competition story of Persona. There are technical details to
figure out (the assertion should probably be delivered to chrome code
instead of a web page, so figuring out what the audience should be is
non-trivial), but overall I think it's the right thing to do.

If you meant "instead of typing in a password to connect a new browser
to the account, you use an assertion", then 1: that won't give access to
any class-B data, and 2: we can't provide the "changing your password
causes other devices to be disconnected" behavior, because we wouldn't
have a password. If we were offering a class-A-only service, it could
work.

Toby> Is the idea that the data would sit on the servers unencrypted?
Toby> How far reduced are you thinking?

Class-A data is encrypted by a key which lives on our key-server. We
have access to that key, which means we can be coerced into revealing
it. From the user's point of view, it's mostly just encryption-at-rest
(which is either "best practice", "defense in depth", or "CYA",
depending upon your mood that day). The one improvement over completely
transparent server-side encryption is that the IdP (or someone who can
create valid Persona assertions for that address) must actually reset
the account password first, to learn the class-A key. This leaves a
trail (for us to see), and the user can discover they've been a victim
because they won't be able to log in (they'll have to reset the password
again before they can get in).

Karen> From previous discussions when we initially settled on class B
Karen> several months ago, that felt like a really good place as default
Karen> for most of our data types. Like the others are asking, What's
Karen> the benefit of moving it to class A? This will help me understand
Karen> the pros / cons of changing our recommendation from a while back.

I don't think Lloyd is talking about switching any defaults from B to A.
I think he's just talking about changing the way you recover your
class-A data.

As far as I know, we still haven't decided what the defaults ought to
be. I agree that B is a good default for most of our datatypes.


cheers,
 -Brian
_______________________________________________
Sync-dev mailing list
[email protected]
https://mail.mozilla.org/listinfo/sync-dev

Reply via email to