Hacker News new | past | comments | ask | show | jobs | submit login

(Edited and removed) Let's start with the basics, many applications do not support webauthn, full stop. Even shops who roll it out are forced to keep holes open for business critical applications that don't support it. Security is not easy, and the entire field is not negligent - the problem is massively asymmetrically stacked against security practitioners, enhanced by poisonous attitudes like the ones expressed here.



An underlying issue is that Microsoft Active Directory does not support MFA of any kind at all. That's why third party PAM vendors exist, but they don't really change the fact that you the most widely deployed authentication service in business is effectively run by password hashes. That's the whole reason we so commonly see the "mimikatz scraped a hash from RAM and it was all over" write up in incidents.

Smartcards exist, but their use is clunky in practice (I'm aware Yubikeys may now function this way). For everything else, Microsoft's current MFA solution is "just use the cloud".


Worse: un-salted hashes.


Worst: The hashes are actually the passwords (for all services that allow NTLM authentication).


> many applications do not support webauthn, full stop

You don't need the application to, only your IDP. Everything should be SSO from there.


What if that application doesn't support that setup either? So many services online barely manage to let you setup TOTP, nothing like this...


Stick it behind something like authentik before exposing it


[removed by author]


Fair play.


> Security is not easy, and the entire field is not negligent - the problem is massively asymmetrically stacked against security practitioners, enhanced by poisonous attitudes like the ones expressed here.

Is remaining in a role in which it's not possible to be effective negligent?


What is your alternative? Should we do nothing instead? Should all SWEs quit because they can't stop writing security bugs?


I don't have a specific alternative, but I think that if it's not possible to be effective in a role, one should decline it. It's possible to be an effective SWE while still writing (and hopefully also sometimes fixing) bugs.


One could argue the security industry exists because of the failings of computer science.

Maybe swes should start facing legal liability for thier failings like most other engineering disciplines. We would see this problem change overnight.


By productivity going completely down the drain.


that is not happening in commercial engineering though is it?


Should doctors quit and find another field because people keep on breaking their legs?


If doctors not only had to treat broken legs but also somehow prevent people breaking them in the first place...




Join us for AI Startup School this June 16-17 in San Francisco!

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: