Services/Sync/WEP/115: Difference between revisions

m
(Add automated testing key for CAPTCHA)
Line 11: Line 11:
= Issues with the current scheme =
= Issues with the current scheme =
== “Secret Phrase” considered harmful ==
== “Secret Phrase” considered harmful ==
The current implementation uses a secret phrase to generate an encryption key to protect user data. The actual scheme is [http://kix.in/2009/10/11/how-does-weave-use-cryptography/| more complex than that], but at the end of the day, the secret to protect is this 256 bit key. This secret is never transmitted to to the server, which means the server cannot access user data. All well and good, but we haven’t been able to communicate this to the end user very well.
The current implementation uses a secret phrase to generate an encryption key to protect user data. The actual scheme is [http://kix.in/2009/10/11/how-does-weave-use-cryptography/ more complex than that], but at the end of the day, the secret to protect is this 256 bit key. This secret is never transmitted to to the server, which means the server cannot access user data. All well and good, but we haven’t been able to communicate this to the end user very well.
=== “A security question would work better.” ===
=== “A security question would work better.” ===
Users often think that the role of the secret phrase is to verify password recovery requests. There have been several messages on the mailing list about this, suggesting that account setup was too complex, and that security questions would be better.
Users often think that the role of the secret phrase is to verify password recovery requests. There have been several messages on the mailing list about this, suggesting that account setup was too complex, and that security questions would be better.
=== “What do you mean you can’t tell me my secret phrase?” ===
=== “What do you mean you can’t tell me my secret phrase?” ===
Similarly, there have been messages on the list from users who have lost or forgotten their secret phrase, and thus cannot recover their data from the servers. While Sync was not designed or intended to be a backup service, 70% of our users have only one client. Backup is the only function Sync provides in this case.
Similarly, there have been messages on the list from users who have lost or forgotten their secret phrase, and thus cannot recover their data from the servers. While Sync was not designed or intended to be a backup service, 70% of our users have only one client. Backup is the only function Sync provides in this case.
== User-generated long term secrets are often weak ==
== User-generated long term secrets are often weak ==
Humans are pretty bad at picking passwords. UX concerns have prevented us from requiring a strong secret phrase, and we currently have a 12-character minimum with no further restrictions. Assuming a 94 character alphabet, the [http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf| NIST guidelines] estimate this at a mere 24 bits of entropy. PBKDF2 or not, this is a pretty poor protection for user data, and we can help the user do much better.
Humans are pretty bad at picking passwords. UX concerns have prevented us from requiring a strong secret phrase, and we currently have a 12-character minimum with no further restrictions. Assuming a 94 character alphabet, the [http://csrc.nist.gov/publications/nistpubs/800-63/SP800-63V1_0_2.pdf| NIST guidelines] estimate this at a mere 24 bits of entropy. PBKDF2 or not, this is a pretty poor protection for user data, and we can help the user do much better.
Confirmed users
188

edits