Check out our companion blog!
Feb. 17, 2025

Passwords vs Passkeys: The Future of Backup Security

Passwords vs Passkeys: The Future of Backup Security

In this eye-opening episode about passwords vs passkeys, W. Curtis Preston and Prasanna Malaiyandi expose why traditional password protection isn't enough for your backup systems anymore. They break down the evolution from basic passwords to MFA, and explain why passkeys and FIDO compliance represent the next level in security.

Learn why hackers target backup systems first, how they exploit password vulnerabilities, and why even multi-factor authentication has its weak points. Discover why there hasn't been a single successful attack against FIDO-compliant systems, and why you should be pushing your backup vendors to support passkeys. Whether you're using a traditional backup system or a SaaS solution, this episode gives you the knowledge you need to better protect your last line of defense.

We talked about this previous episode: https://www.backupwrapup.com/how-do-you-authenticate-with-all-new-hardware/

Transcript
Speaker:

You found the backup wrap up your go-to podcast for all things



Speaker:

backup recovery and cyber recovery.



Speaker:

In this episode, we tackle a critical security topic that every



Speaker:

backup admin needs to understand, passwords versus pass keys.



Speaker:

Listen, if you're still protecting your backup system with just



Speaker:

usernames and passwords.



Speaker:

You are asking for trouble.



Speaker:

Bad actors are targeting backup systems first, and they know



Speaker:

exactly what they're doing.



Speaker:

Persona and I will break down the what, why traditional passwords



Speaker:

aren't cutting it anymore.



Speaker:

Why MFA is better but not perfect, and why pakis are probably



Speaker:

the future of authentication.



Speaker:

Your backup system is your last line of defense.



Speaker:

Let's make sure that you're protecting it right.



Speaker:

By the way, if you don't know who I am, I'm w Curtis Preston, AKA, Mr.



Speaker:

Backup, and I've been passionate about backup and recovery for over 30 years.



Speaker:

Ever since.



Speaker:

I had to tell my boss that we had no backups of the production



Speaker:

database that we had just lost.



Speaker:

I don't want that to happen to you, and that's why I do this.



Speaker:

On this podcast, we turn unappreciated backup admins into cyber recovery heroes.



Speaker:

This is the backup wrap up.



Speaker:

Welcome to the show.



Speaker:

Hi, I am w Curtis Preston, AKA.



Speaker:

Mr. Backup.



Speaker:

I have with me a guy that I think might now be working on cars more than Me.



Speaker:

Prasanna Malaiyandi, how's it going?



Speaker:

Prasanna,



Speaker:

am doing well, Curtis.



Speaker:

Yeah, no, it, so two things.



Speaker:

One, it's not my own cars, but I am learning about cars.



Speaker:

I have taken an auto shop class at the local community college, which is



Speaker:

amazing because as a lot of longtime listeners know, I tend to be, uh.



Speaker:

I attend, or I used to attend YouTube University, which is



Speaker:

what my instructor calls it.



Speaker:

Basically watch a bunch of things on YouTube,



Speaker:

BMA,



Speaker:

that's funny.



Speaker:

learn about it, but never actually do anything with that knowledge.



Speaker:

So I decided to mix things up and so I decided sign up for auto class.



Speaker:

So this is my second quarter doing



Speaker:

chassis stuff.



Speaker:

So learning how to.



Speaker:

Uh, Mount Unmount tires, balance tires, patch tires, take apart



Speaker:

differentials and axles in a solid axle.



Speaker:

Uh, did ball joints and control arm bushings.



Speaker:

Going to learn how to take, uh, remove and replace, uh, shock absorber in the truck.



Speaker:

So



Speaker:

That's all so cool.



Speaker:

Yeah, very, very cool.



Speaker:

Um, I'm a little, I'm a little jelly.



Speaker:

Um, I, I, I don't have the, I don't have the time right now to, to, to do that.



Speaker:

I just got too much going on.



Speaker:

But, uh, uh, you know, the big thing right now, of course, all



Speaker:

of my spare time is being used to try to finish my, the next book



Speaker:

that, uh, uh, Dr.



Speaker:

Mike Saylor and I are writing on, uh, responding to and



Speaker:

recovering from ransomware.



Speaker:

Um, there are.



Speaker:

I, I think dozens of books



Speaker:

on how to prevent from getting ransomware.



Speaker:

I think we're gonna be the first book that's just about



Speaker:

responding and recovering.



Speaker:

And, uh, so I'm, I'm excited about that, but it is taking up all my spare time



Speaker:

Yeah.



Speaker:

of which I didn't have a bunch



Speaker:

of anyway, you know, so,



Speaker:

And, and, and and just a quick question though, uh,



Speaker:

the initial comment, you're like a guy who's working more on cars than you do.



Speaker:

You used to work on cars all the time



Speaker:

on



Speaker:

did.



Speaker:

Yeah.



Speaker:

You did.



Speaker:

all the work on your cars before.



Speaker:

It's just now your current vehicle does not require much



Speaker:

maintenance, if any at all.



Speaker:

Yeah.



Speaker:

Um, I like the first thing that it might need me to do, I'm still



Speaker:

like 120,000 miles away from probably my first break job.



Speaker:

Right.



Speaker:

Because, 'cause I, I have a Tesla and you don't use the brakes a lot.



Speaker:

And so the brakes tend to last like 200,000 miles right now, all



Speaker:

I have to do is, uh, water, uh, windshield washer and, uh, tires.



Speaker:

And, uh, I do the windshield washer, but I do not do the tires.



Speaker:

Um, I, yeah.



Speaker:

Anyway, so, um.



Speaker:

What are we talking about today?



Speaker:

Yeah, today I, I've been spending a lot of time with, again, with the cyber



Speaker:

side of things, and I've been learning a little bit more about the, you know, those



Speaker:

those that have listened to the podcast we're like, we're like, uh, immutable



Speaker:

storage, pa, password management, um, uh.



Speaker:

What, what do you call it?



Speaker:

Security updates and



Speaker:

MFA th These



Speaker:

are the things, if you did these things, then things would be so



Speaker:

much, so much easier for you.



Speaker:

Right.



Speaker:

And, and, and, and I'm, I'm, I'm still down with that, but I'm, I think time



Speaker:

enough time has passed with the new way of doing that, that I think it's



Speaker:

time for us to spend a little bit of time talking about the new way



Speaker:

to manage logins to a system.



Speaker:

Why



Speaker:

are you, you're, you're doing your thing.



Speaker:

the new way is basically things that started 11 years ago or 12 years



Speaker:

Yeah, but, but it's, but it's still, it's still not, for example,



Speaker:

it's still not available in many



Speaker:

systems and products and in other systems.



Speaker:

It's only available as a third



Speaker:

like a third party add-on to that product.



Speaker:

And



Speaker:

so it's still pretty freaking



Speaker:

new.



Speaker:

and I know we'll talk about it, but this is also useful because I've started seeing



Speaker:

this pop up in many places and always been



Speaker:

like, what is this thing?



Speaker:

Why is it



Speaker:

different?



Speaker:

How is it different?



Speaker:

So hopefully this episode, we can dive into some of those differences



Speaker:

and understand, is this really good for you and should you be using it?



Speaker:

Yeah.



Speaker:

And, and by the way, you know, just, just to not completely bury the lead,



Speaker:

we're talking about PAs keys, right?



Speaker:

We're talking about Fido, um, you know, PAs keys, which fall under Fido,



Speaker:

which is basically a whole other way to do authentication and authorization,



Speaker:

right?



Speaker:

Or, uh, would it, would it be IAM Would IAM would be the, the



Speaker:

overarching term that would cover that?



Speaker:

Yeah,



Speaker:

Yeah.



Speaker:

Okay.



Speaker:

So.



Speaker:

Um, we, we've made a lot of talk about that.



Speaker:

If you, basically, your, your backup system is all powerful.



Speaker:

Your backup system is, is I often say that your backup system is helms deep.



Speaker:

Do you get that reference?



Speaker:

Lord, the rings.



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

What was Helm's deep?



Speaker:

Do you remember?



Speaker:

It is in the, it is basically a fortress inside of a mountain that's



Speaker:

supposed to be impenetrable by pretty much anything, and it's



Speaker:

supposed to be like you lock it down and no one's coming to get you.



Speaker:

You will survive,



Speaker:

is the,



Speaker:

goal.



Speaker:

Yeah.



Speaker:

you watch the return of the king, like basically the battle gets



Speaker:

all the way down to Helms deep.



Speaker:

And like, if they get in there like the, but the battle's



Speaker:

over, right?



Speaker:

And the same kind of thing here that it, it's, it's the last defense.



Speaker:

If you lose your backup and recovery system, your disaster



Speaker:

recovery system, why even do it?



Speaker:

Right?



Speaker:

And so.



Speaker:

I spend a lot of time trying to explain to people that, you know, sort of two things.



Speaker:

One, that your backup system is absolutely a target for cyber attacks.



Speaker:

In fact, uh, last night, I, I went to very cool.



Speaker:

It's first, it's been going on pretty regularly and I I haven't



Speaker:

gone and, but now it's my first time and it's this big cyber event in San Diego.



Speaker:

It was great.



Speaker:

I, I kind of like forced myself to go.



Speaker:

I don't know why, because I don't know



Speaker:

I didn't know



Speaker:

you don't want to Yeah.



Speaker:

I had very low expectations and I got there and I'm just gonna



Speaker:

say this, lots of people, lots of fascinating people to talk to.



Speaker:

Um, some of them thought I was one of those fascinating people to talk to.



Speaker:

You just have a lot of stories.



Speaker:

And more.



Speaker:

Yeah, I do have a lot of stories.



Speaker:

More importantly, um, uh, free food and free beer.



Speaker:

So why, why did I wait so long?



Speaker:

Right.



Speaker:

Um, and, uh, I guess so you only got one free drink, but I managed to just



Speaker:

serendipitously be standing next to the guy that had the tickets and so he was



Speaker:

like, you guys want some more tickets?



Speaker:

Nice.



Speaker:

So I got three free beers.



Speaker:

Uh, and, um, no, no, I got two free beers and then I had one that I paid for.



Speaker:

And the craziest part was when they handed me the little, they



Speaker:

had the little, um, the payment



Speaker:

thing.



Speaker:

The choices for TIP were three, five, and 7%.



Speaker:

What



Speaker:

I, I, I



Speaker:

chose not to ask.



Speaker:

I was like, okay.



Speaker:

Um, anyway, I just thought that was interesting.



Speaker:

But it was great and, and I got a chance to talk to some people and I, and I



Speaker:

made this same comment about how much I. Um, the backup system is a target for



Speaker:

ransomware, and the guy's like, oh yeah, that's, uh, he's like, I have clients.



Speaker:

He goes, it happens all the time.



Speaker:

They get in there and they, they, he goes, they immediately, they



Speaker:

look for, and he named a vendor.



Speaker:

Uh, he's like, they immediately look for this vendor and if they find



Speaker:

it, they know what to do and they



Speaker:

take it out.



Speaker:

Right.



Speaker:

Um, and so.



Speaker:

I'm saying you need to understand the degree to which your backup



Speaker:

system is 100% a target of ransomware and that they want to take it out.



Speaker:

Because if they can take it out, then the, and, and, and this guy would,



Speaker:

and, and he clarified that, that they want to do this before they do the



Speaker:

payload of the actual attack.



Speaker:

Right.



Speaker:

Remove all the defenses.



Speaker:

Exactly right.



Speaker:

And so one of the things that you want to do is to make it really, really hard



Speaker:

to be able to log into your backup system



Speaker:

for, for an outsider,



Speaker:

you don't wanna make it really, really hard for you, but you made it a little bit



Speaker:

harder for you, but make it much, much harder.



Speaker:

And what is,



Speaker:

if people aren't doing the things.



Speaker:

That we're talking about either of the things that we're talking about



Speaker:

in this episode, what's the worry?



Speaker:

Uh,



Speaker:

Well, they'll come



Speaker:

into your



Speaker:

people do?



Speaker:

they'll delete your backups.



Speaker:

They'll set a retention time to zero days or one day,



Speaker:

Yeah.



Speaker:

now all your backups, your ability to recover from ransomware are gone.



Speaker:

They'll disable policies, so now you're not even backing up anything anymore.



Speaker:

They'll lock you out of the system.



Speaker:

So they'll reset all the access.



Speaker:

And then the other thing is they now know, like they could look and



Speaker:

say, okay, what are the important systems in your environment?



Speaker:

Because your backup system knows where everything is.



Speaker:

yep.



Speaker:

yep.



Speaker:

Yeah, it's great for exfiltration, it's great for all kinds of things that, uh,



Speaker:

by the way, that was a great answer.



Speaker:

It wasn't the question I was asking,



Speaker:

Oh.



Speaker:

the question that I was asking, and I, and I'll, I'll answer it myself then.



Speaker:

Fine, I'll do it myself.



Speaker:

Uh, what I would say was the problem is if you're not using either MFA or pass



Speaker:

Oh,



Speaker:

Right is that someone ulti.



Speaker:

Ultimately the security of your entire backup system rests on



Speaker:

every single person who has super user access to that backup system.



Speaker:

All it takes is one click,



Speaker:

one, you know, wrong email, whatever.



Speaker:

And boom, your password is exposed,



Speaker:

right?



Speaker:

Your username and password.



Speaker:

And if all that's stopping a threat actor from logging into your backup system is



Speaker:

a username and password, you are just



Speaker:

asking,



Speaker:

for,



Speaker:

asking for it.



Speaker:

Right?



Speaker:

Um, and, and, and honestly, you know,



Speaker:

I'm, I'm gonna have like a little bit of sympathy.



Speaker:

If you get hacked because of that.



Speaker:

But it's hard, it's hard for me to, to dredge up sympathy for



Speaker:

Here's my



Speaker:

little violin.



Speaker:

what's that



Speaker:

my little violin.



Speaker:

pilot?



Speaker:

Yeah.



Speaker:

So like, like I, I do believe strong, and we've talked about this



Speaker:

before, what's, what's our, we have a strong opinion on password managers.



Speaker:

What are they?



Speaker:

What is it?



Speaker:

Use.



Speaker:

Used.



Speaker:

Use.



Speaker:

one more.



Speaker:

Use.



Speaker:

You should be using a password manager if you're



Speaker:

not.



Speaker:

Something's wrong.



Speaker:

Yeah.



Speaker:

By the way, I, I, I saw a great, um, in researching for this episode, I saw a



Speaker:

great quote and it was, I've never known anyone that got hacked because they



Speaker:

used a password manager, but I knew all kinds of people that got hacked because



Speaker:

they didn't use a password manager.



Speaker:

Think about it.



Speaker:

There have been password managers that have been hacked, but the, um, but for



Speaker:

example, like the, the worst of course



Speaker:

was the LastPass.



Speaker:

It, even with that one, you had to severely misuse LastPass



Speaker:

to be attacked via LastPass



Speaker:

because the problem was that basically their, their, their vault got.



Speaker:

Got



Speaker:

accessed, compromised, but that didn't mean people got access to your



Speaker:

passwords, but what they got was access to encrypted versions of your passwords.



Speaker:

So as long as you had a decent password for your passwords, right,



Speaker:

if you didn't have like a six, a six digit password as your you're,



Speaker:

you know.



Speaker:

so I will fault them.



Speaker:

I know this is a long time episode ago, but one thing I will fault



Speaker:

them for right, is they did use weak encryption in the initial versions.



Speaker:

They did.



Speaker:

an old password vault that you've had for years, right.



Speaker:

It was using a weaker algorithm, which could potentially be broken



Speaker:

EP potentially.



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

But we still don't know, we don't know anybody that, yeah.



Speaker:

Anyway, but, but the, so don't do that.



Speaker:

Don't have a weak password and don't, you know,



Speaker:

I, I would investigate that, but, and, and you know, and not all



Speaker:

password managers are equal and all, that's all this kind of stuff, right.



Speaker:

Um, but I do believe strongly in having a separate password for everything,



Speaker:

using a separate password manager.



Speaker:

I also believe strongly in not.



Speaker:

And having your backup system use a completely separate IAM system



Speaker:

than your production network.



Speaker:

Right.



Speaker:

Not having your backup systems join the domain,



Speaker:

for example.



Speaker:

Right.



Speaker:

Which means that you're going to need something separate.



Speaker:

So I'm saying buy an inexpensive password manager for the backup side, only the



Speaker:

backup side, and have it be completely separate from the, you know, from your



Speaker:

main side.



Speaker:

have a question for you.



Speaker:

Yeah.



Speaker:

So you have a backup system,



Speaker:

you have a password manager.



Speaker:

How do you backup up the password manager for the backup system so you could



Speaker:

eventually restore it if you need to?



Speaker:

It's like inception.



Speaker:

The, the answer, the answer to that question will be dependent



Speaker:

on the password manager.



Speaker:

Right?



Speaker:

and we did have an episode, by the way of the.



Speaker:

The catch 22 situation of how do you, how do you delete, how do you



Speaker:

recover when you've lost everything, including your password manager.



Speaker:

Yep.



Speaker:

Um,



Speaker:

With



Speaker:

Suzy.



Speaker:

what's that?



Speaker:

With Suzy, right?



Speaker:

Yeah, Susie, uh, if we, if we could, uh, if you could help me with that, pull up



Speaker:

the spreadsheet and we'll get the link and



Speaker:

I'll put that in the show description of it.



Speaker:

That was a fascinating episode as well.



Speaker:

Uh, okay.



Speaker:

So generally most people are still using usernames and passwords,



Speaker:

hopefully strong passwords, hopefully with a password management system.



Speaker:

But even with all of that, if they're not using an additional



Speaker:

factor to log in, they are still wide open to all kinds of attacks.



Speaker:

Right.



Speaker:

And, um, vendors, SaaS vendors are starting to see this.



Speaker:

One by one.



Speaker:

They are at it literally.



Speaker:

This is in the last like five years, 10 to five years.



Speaker:

Um, they started number one supporting MFA



Speaker:

of some type.



Speaker:

Number two, the better ones, um, like Google for example, require MFA.



Speaker:

Right?



Speaker:

Um, and um.



Speaker:

And, and, and for MFA right.



Speaker:

There's sort of the good, better, best.



Speaker:

Right.



Speaker:

Even for MFAs that you need to take into consideration.



Speaker:

yeah, yeah.



Speaker:

Uh uh, so we we're gonna



Speaker:

cover that.



Speaker:

Yeah, yeah, yeah.



Speaker:

I'm just saying that that.



Speaker:

There, there's sort of two things of like, number one, supporting MFA



Speaker:

and they're



Speaker:

I think that any decent product should be requiring it



Speaker:

at this point.



Speaker:

Right.



Speaker:

Um, I pushed hard for that when I worked at Druva.



Speaker:

Right.



Speaker:

They started supporting it.



Speaker:

But they, at the time, they didn't want to like force it on their



Speaker:

customers.



Speaker:

And I was saying force it like what customer is going to complain that



Speaker:

you're forcing security on their backups.



Speaker:

And, and if that, and if that is a customer, like I don't,



Speaker:

I don't want that customer.



Speaker:

Yeah.



Speaker:

Um, but, um, I, I think that you should on anything that matters,



Speaker:

you should be forcing MFA at



Speaker:

this point.



Speaker:

Right.



Speaker:

Um.



Speaker:

So what, what, what, what is MFA, uh, you, you want to just



Speaker:

talk about what does that mean?



Speaker:

What is,



Speaker:

So, so MFA is basically multifactor authentication, so like you said, right?



Speaker:

You know, your, you enter your username and password to log into a



Speaker:

website, but they want to use another method as well to verify it's used.



Speaker:

So it might be something like send you an email to an email address, registered



Speaker:

in the system, send you a text message to a phone number registered call you.



Speaker:

Um, there's also applications, authenticator, applications like



Speaker:

ti, Google Authenticator, and others that you can use in order



Speaker:

to provide that second factor



Speaker:

to prove that, yes, this is me and not some malicious actor out there.



Speaker:

Right.



Speaker:

And, and the, the order, and by the way, the category of the, like the,



Speaker:

the, um, the, the last category that you talked, that's called an OTP



Speaker:

or a one-time password generator.



Speaker:

Um, the Google Authenticator I think was the first freely available one.



Speaker:

And a lot of people still refer to it as Google Authenticator,



Speaker:

even if you're using like Auie,



Speaker:

which is a competitor.



Speaker:

Um, but.



Speaker:

The, the lid, the order in which you listed them, I think would



Speaker:

be the order in of goodness.



Speaker:

Yeah.



Speaker:

Right?



Speaker:

Good, better, best.



Speaker:

Right?



Speaker:

Um, good is having something



Speaker:

right, using your email as your additional factor, not very good at all.



Speaker:

Email.



Speaker:

That means if that means, if your email was hacked.



Speaker:

Then your, you know, then your factor is hacked.



Speaker:

Right?



Speaker:

Um, and I have seen situations where the entire corporate email system was hacked



Speaker:

and people, and then the, the, the backup system used email as the factor.



Speaker:

And the people, they, they were again, uh, they were attacked.



Speaker:

They were successfully, they successfully took over the backup



Speaker:

system because they had already successfully taken over the email system.



Speaker:

So email not so good.



Speaker:

SMS is also not so good.



Speaker:

Why is



Speaker:

days, right?



Speaker:

Especially the why is that?



Speaker:

well, because SMSs could be.



Speaker:

Um, hijacked, right?



Speaker:

You



Speaker:

could do a sim swap and also if you're following the latest news, right?



Speaker:

Uh, many, many providers have had their SMS or actually their



Speaker:

communications networks compromised,



Speaker:

Right.



Speaker:

And you now have the US government telling people you should use



Speaker:

end-to-end encrypted applications.



Speaker:

Yeah, yeah.



Speaker:

Um, yeah, yeah, for anything that matters, you should totally use that.



Speaker:

Um, and so I, again, either of these is better than nothing.



Speaker:

So if you have a system that only supports email or SMS, then use it anyway.



Speaker:

But strongly encourage that vendor, whoever they are to, to



Speaker:

support, uh, uh, OTP or PAs keys.



Speaker:

We're gonna get



Speaker:

to PAs keys in a minute.



Speaker:

So there are cases where they actually had physical hardware that



Speaker:

would sort of rotate keys, right?



Speaker:

And then when you want to access something, you would basically



Speaker:

read the number off the key, right, and type it in to log in.



Speaker:

And of course it would synchronize with the backend and all the rest.



Speaker:

So it would always know like what the number should be,



Speaker:

and that's kind of how you would access the system.



Speaker:

Yeah.



Speaker:

Not as convenient.



Speaker:

not, not as convenient.



Speaker:

Yeah.



Speaker:

Um, but, but very secure.



Speaker:

Right.



Speaker:

Um, so you had to, you, in order to log in, you had to know the username and



Speaker:

password, and then the, the additional factor came from the fact that you



Speaker:

had physical possession of that.



Speaker:

Thing that key fob Right.



Speaker:

Um, and, um, and then, uh, use that,



Speaker:

right?



Speaker:

That did require that, um, device had to be able to be



Speaker:

synchronized to a, to a clock



Speaker:

so that it, so that it would know exactly when, you know the 'cause it would do like



Speaker:

an extra one every 30 seconds I think.



Speaker:

Okay.



Speaker:

Um, and, uh, so yeah, you were, you were, you were talking about



Speaker:

you, you had to be on the back



Speaker:

end to, so you had to be able to know what number was gonna be on



Speaker:

that device.



Speaker:

That's a very, very strong factor.



Speaker:

Not as convenient because you have to carry it around



Speaker:

Or if



Speaker:

it broke, then you couldn't log in.



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

If it broke you.



Speaker:

If you stepped on it.



Speaker:

Um, yeah.



Speaker:

And so that's why a lot of people, they have gone to the, uh, the OTP, you



Speaker:

know, the Auie or Google Authenticator.



Speaker:

That's what I Prasannally used.



Speaker:

I used Auie.



Speaker:

I used Google Authenticator for a while until I, um, went to, um,



Speaker:

move my phones and I didn't realize that I had to like, transfer it



Speaker:

while my phone was still alive.



Speaker:

And I ended up having to redo all my, all my MFA.



Speaker:

Um, and, um, and, and that's nice because it, it can be, uh, basically it's wherever



Speaker:

you, your, your factor is kind of.



Speaker:

The fact that you, you have sort of actually multiple factors because you



Speaker:

have to have possession of the phone,



Speaker:

the the device where this app is running and you have to be able to log into



Speaker:

that phone to get to that application.



Speaker:

So it's kind of like multiple factors.



Speaker:

Uh, by the way, some people also refer to this as two A.



Speaker:

Technically it's MFA because there could be more than



Speaker:

two factors.



Speaker:

Uh, but that's what some people call it was two FA



Speaker:

back in the day.



Speaker:

Um, and.



Speaker:

I think a strong MFA with, um, with a strong password is a pretty strong,



Speaker:

um, system.



Speaker:

Having said that,



Speaker:

there is, there is a thing called MFA exhaustion.



Speaker:

Do



Speaker:

you wanna talk about that?



Speaker:

Yeah.



Speaker:

This is basically, and we saw this in, what was that case?



Speaker:

There was, was it the Okta breach?



Speaker:

Right.



Speaker:

Where



Speaker:

basically.



Speaker:

People, right?



Speaker:

In the normal case, MFA is great, but bad actors have started exploiting



Speaker:

this and they will try to log in and it will send an MFA request to the user.



Speaker:

And sometimes it's like, okay, accept that this is me.



Speaker:

And sometimes they get so tired of always seeing it.



Speaker:

They're like, fine, screw it.



Speaker:

I'm just gonna



Speaker:

push



Speaker:

Fine.



Speaker:

Exactly.



Speaker:

And so now they've let the bad actor into the system when they shouldn't have.



Speaker:

Which is exactly what happened with the Okta hack, right?



Speaker:

It was actually an inside person at Okta that essentially fell for a, a, a, uh,



Speaker:

an MFA exhaustion attack, and they ended up letting the, the threat actor into



Speaker:

the system and bad things happen as a



Speaker:

result, right?



Speaker:

Um, and so there are exploits known for MFA still way better than the alternative,



Speaker:

right?



Speaker:

And, and I and I, when I think about the MFA exhaustion, me, my



Speaker:

brain, the way it, if I got 57 MFA requests, I'd be like, whiskey,



Speaker:

tango, foxtrot, man, what is going on?



Speaker:

The last thing I'm gonna do is go, yeah, yeah, yeah.



Speaker:

Stop bothering me here.



Speaker:

Let the person in.



Speaker:

I don't, I don't understand MFA exhaustion, but



Speaker:

people are gonna be people



Speaker:

but it could also be the case that while you're legitimately



Speaker:

trying to do something,



Speaker:

you also get a bad actor trying to do something as well.



Speaker:

And so you



Speaker:

may be



Speaker:

is true if, if there's some simultaneously and you may authenticate



Speaker:

the wrong, the wrong, uh, thing.



Speaker:

So there are known attacks against MFA, they are rare, uh, you know,



Speaker:

et cetera, et cetera, et cetera.



Speaker:

Um,



Speaker:

But, but, But, that,



Speaker:

what Go



Speaker:

but there is one downside with MFAs,



Speaker:

Which is.



Speaker:

Well, assuming that you're not using a password manager.



Speaker:

Right.



Speaker:

You still have to remember the password.



Speaker:

Yes.



Speaker:

in an IT environment, you have to rotate your password.



Speaker:

You're now adding password one, password two, password



Speaker:

1, 2, 3,



Speaker:

right?



Speaker:

It's like all the variations,



Speaker:

and so it's still that problem that you run into,



Speaker:

So is password 1, 2, 3, that this is not, that's not a good password.



Speaker:

oh, that is the best password in the world.



Speaker:

It's the most popular.



Speaker:

It's



Speaker:

the most,



Speaker:

dollar signs.



Speaker:

I used dollar signs for the SI know.



Speaker:

Oh, Lord.



Speaker:

Yes, you're right.



Speaker:

That is it.



Speaker:

It is, it is.



Speaker:

It's funny, like one of the, one of the things that people, there,



Speaker:

there's the, um, there's the, um, the horse battery staple, uh, thing.



Speaker:

Right?



Speaker:

Which is a, and, and, and there.



Speaker:

Story, they made a point of saying that by, um, coming up with longer



Speaker:

and longer passwords and more and more complicated passwords, we made sure



Speaker:

that that computers couldn't guess those passwords, but we also made



Speaker:

sure that humans could never remember



Speaker:

them.



Speaker:

Exactly.



Speaker:

So now



Speaker:

you write it down on a sticky note or



Speaker:

Yeah.



Speaker:

Um.



Speaker:

variations.



Speaker:

Exactly.



Speaker:

Yeah.



Speaker:

Um, and I used to have a system before I went to password managers that I've



Speaker:

talked about where I had like one core



Speaker:

password and then I upended and pre-end the, like a shortened



Speaker:

version of the domain name.



Speaker:

And, you know,



Speaker:

that was my, I, I had this way of having a unique password but



Speaker:

without having unique password.



Speaker:

Um, so if, like, if my password was password 1, 2, 3, my Gmail



Speaker:

password was GM password.



Speaker:

1, 2 3, GM.



Speaker:

Right.



Speaker:

That was a, that was a way that I did it back in the day before



Speaker:

I discovered password managers.



Speaker:

Could you imagine remembering all the passwords?



Speaker:

I can't, I can't, I have hundreds, hundreds of accounts.



Speaker:

1 thing that is starting to happen that I do like is being able to



Speaker:

authenticate via, like Google.



Speaker:

Um, I do like



Speaker:

Apple or



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

Um, all right.



Speaker:

So,



Speaker:

um.



Speaker:

So passwords have some downsides.



Speaker:

Remembering the



Speaker:

have some downsides.



Speaker:

MFA has some downsides.



Speaker:

A strong statement was made when I was discussing this with a colleague



Speaker:

the other day, and he said, there are no known successful attacks



Speaker:

against a Fido compliance system.



Speaker:

And I was like, huh.



Speaker:

Right.



Speaker:

And so I, I immediately had to Google Fido



Speaker:

because



Speaker:

this?



Speaker:

Is



Speaker:

this a dog?



Speaker:

what Pasky were.



Speaker:

I didn't know that it was called Fido.



Speaker:

I didn't know that it fell under this thing called Fi



Speaker:

by the



Speaker:

Fido is a framework



Speaker:

Fido is the framework under which Pasky fall, so Fido is a, an



Speaker:

acronym for Fast Identity Online.



Speaker:

Right.



Speaker:

And there is a thing called the Fido Alliance.



Speaker:

Um, you wanna talk about that?



Speaker:

Yeah.



Speaker:

So it's basically a bunch of companies where like, passwords suck,



Speaker:

yeah.



Speaker:

should do something better.



Speaker:

So Microsoft, I don't know if you remember this with Windows



Speaker:

10 or 11, they did Microsoft.



Speaker:

Hello?



Speaker:

Yeah.



Speaker:

Trying to ditch passwords.



Speaker:

This was probably



Speaker:

like five years ago, six years ago, right.



Speaker:

And so there's been this push because companies realize passwords are a pain,



Speaker:

Yeah.



Speaker:

And so there's been a push to sort of get rid of them.



Speaker:

And so Fido was created and it's joined by a bunch of companies and



Speaker:

organizations in order to try to eliminate passwords from the world,



Speaker:

if you wanna put it that way.



Speaker:

Right?



Speaker:

And Fido is a framework.



Speaker:

right.



Speaker:

keys is just one implementation of using Fido.



Speaker:

It is probably the biggest implementation,



Speaker:

but it is just one implementation,



Speaker:

right?



Speaker:

And the idea is that you don't have to remember a password.



Speaker:

Um, it, it's been interesting.



Speaker:

There's been a push by some vendors to do Passwordless login that



Speaker:

is very much not Fido compliant.



Speaker:

I dunno if you've seen this, where I've had some.



Speaker:

SaaS vendors that I'm basically, they don't want, they don't want



Speaker:

you to username and password.



Speaker:

They, they say, give us your email and we will send you a one-time



Speaker:

password to log in.



Speaker:

And I'm like, that's a single factor,



Speaker:

and it's a system that could totally be hacked.



Speaker:

So I, I, I hate that.



Speaker:

That is not what we're talking about.



Speaker:

Right.



Speaker:

Um, the, the, do you want to talk a little bit about what, again, I I think



Speaker:

we should state, we're now getting into.



Speaker:

The, the outer reaches of our, of our technical knowledge.



Speaker:

We are not cybersecurity professionals.



Speaker:

We know enough to be dangerous.



Speaker:

Um, and, um, and when, and if, if we were implementing something for



Speaker:

somebody, we would be bringing in



Speaker:

somebody like, uh, Dr.



Speaker:

Mike Saylor, uh, to, to, to do



Speaker:

this.



Speaker:

So, so do you



Speaker:

want me to walk through kind of how it works



Speaker:

at a high,



Speaker:

concept, first off, what, what, you know, it uses this



Speaker:

concept of, of, uh, public key encryption.



Speaker:

yeah.



Speaker:

So let's talk about first like how normal login works, right?



Speaker:

So



Speaker:

normal website you're logging in, you know, your username and password.



Speaker:

The, uh, hosting provider, whatever you're logging into, has a probably



Speaker:

an encrypted version of that.



Speaker:

And so it



Speaker:

does some computation, sends it over compared and says,



Speaker:

okay, you're all good to go.



Speaker:

Right.



Speaker:

Right now what they've



Speaker:

done is, um, they've gotten rid of the password part.



Speaker:

And, and there's a couple different ways, right?



Speaker:

One is many of these systems, for instance, if you're using a phone, right?



Speaker:

In order to access the, the private key that's stored on the phone, the phone will



Speaker:

require sort of a biometric verification.



Speaker:

So like



Speaker:

your face, your fingerprint, maybe a passcode, potentially.



Speaker:

right.



Speaker:

in order to be able to unlock access to that private key in order



Speaker:

to do the rest of the handshake.



Speaker:

So that's sort of that second factor or the multifactor



Speaker:

to prove that it is you.



Speaker:

So there's a device which contains the key, and then there's the you part to



Speaker:

say you are



Speaker:

that, that's gonna be, you know, like you said, you either like face ID thumbprint,



Speaker:

uh, passcode, depending on that, that that could be picked by the user,



Speaker:

right?



Speaker:

That authenticates you to that device and then the device, then the device



Speaker:

authenticates you to the other system.



Speaker:

Um,



Speaker:

And there's



Speaker:

one other thing to



Speaker:

also add is the private key itself.



Speaker:

So a lot of the new phones, they have a secure area that's completely



Speaker:

cordoned off from everything else where this processing happens.



Speaker:

So in, uh, windows desktop, it's called the TPM or Trusted Processor module.



Speaker:

I think, um, on your iPhones, it's usually called like the secure



Speaker:

enclave and things like that.



Speaker:

So this is a very special, secure area where cryptographic functions are done



Speaker:

and biometrics are being processed.



Speaker:

So your biometrics are never actually sent to the server,



Speaker:

Right.



Speaker:

It's all run locally just to say, you are who you are.



Speaker:

Okay, now I can access that private key.



Speaker:

Another very popular, at least in terms of its, I've seen it a lot.



Speaker:

Another implementation of this has been this company called Ubi O.



Speaker:

Mm-hmm.



Speaker:

And they have these things called UBI Keys.



Speaker:

And they are, uh, you know, little thumb systems.



Speaker:

You know, we call 'em thumb drives 'cause they, you



Speaker:

pull 'em in and out with your thumb, right?



Speaker:

Or, or they look like



Speaker:

they look like a thumb.



Speaker:

And basically it's something that plugs into the USB.



Speaker:

The later ones, they actually have biometric on the device.



Speaker:

Like meaning that you can put a, a, a thumbprint on the device.



Speaker:

They have other ones that don't have that, which means there must be some



Speaker:

authentication in software to the device.



Speaker:

Um, and I. Um, what this does is this, this allows for this



Speaker:

kind of authentication to happen on pretty much any computer,



Speaker:

uh, either a Windows or a Mac or a Linux-based computer.



Speaker:

All you need is that device and some method of authenticating



Speaker:

yourself to that device.



Speaker:

Um, and, and, and what I like about those is that they are incredibly affordable.



Speaker:

Um, you know, I'm not, they're not a sponsor.



Speaker:

I, you know, and, and there are other vendors, but what I really



Speaker:

like about YubiKey is that.



Speaker:

Uh, you, you can get a UV key for like, like their best UV key is like $55.



Speaker:

It's a, you can buy one of them and, uh, and you can start using this with



Speaker:

your,



Speaker:

please don't



Speaker:

in your world.



Speaker:

I, I knew you were gonna say that.



Speaker:

I was waiting for you to say that.



Speaker:

What did you just say?



Speaker:

Please don't just buy one.



Speaker:

Why not?



Speaker:

Because if you lose that UB key, you lose access to everything.



Speaker:

They should only sell them in pairs.



Speaker:

They do.



Speaker:

Actually sell 'em in pairs too.



Speaker:

Okay.



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

Um, so yeah, so re there are other



Speaker:

companies and, um, and those



Speaker:

companies are more than welcome



Speaker:

to, to, to reach out to me.



Speaker:

You go



Speaker:

but this is also where I think like Apple, Microsoft, Google, right?



Speaker:

They also all support PAs keys as well.



Speaker:

And one of the benefits of going with that sort of a software based approach is they



Speaker:

normally handle all the synchronization.



Speaker:

So Apple as an example, they will make sure on your iCloud key chain,



Speaker:

right, which stores all your pass keys and things like that, they'll



Speaker:

synchronize it across your devices.



Speaker:

Right, right.



Speaker:

Which is very helpful.



Speaker:

Um, another, um.



Speaker:

Um, and again, I, I'm on the outer reaches of my, of my knowledge here,



Speaker:

but I believe this also qualifies as Fido and a passkey, and that is how



Speaker:

I currently log into my credit union.



Speaker:

I. So my, currently, when I log into my credit union, I no longer,



Speaker:

I had to switch over to this system.



Speaker:

Um, and like at some point they told



Speaker:

me that this is your choice, right?



Speaker:

And, um, I need my username.



Speaker:

I. And then I need a pin code.



Speaker:

So, uh, in this case, four digits that I do need to remember the pin code.



Speaker:

And then they have an app.



Speaker:

In this case it's um, uh, the semantic VIP.



Speaker:

App that is a one-time password generator.



Speaker:

The, the, the reason why they like that, uh, versus the like Auie.



Speaker:

The problem with Auie is that like, is the synchronization aspect, I think the time



Speaker:

synchronization aspect, but, um, so they use, what they want me to do is they want



Speaker:

me to start up the VIP app, which again, I can only access the VIP app if I'm on.



Speaker:

The device



Speaker:

that's been authenticated.



Speaker:

Um, so I start at the, the, the VIP app, and then I put in my pin



Speaker:

code followed by the six digit, um, number that is generated by the app.



Speaker:

And that is my password.



Speaker:

Uh, you know, it goes in the password field and that way I'm, the only thing



Speaker:

I have to remember is the, the pen code.



Speaker:

And I'm pretty sure this qualifies as, as, I don't know if it does or not,



Speaker:

I, I, it's, so my thing with PAs keys is it's supposed to be seamless, right?



Speaker:

The fact that you have to jump through these hoops, I think is one reason why



Speaker:

I wouldn't say it's quite the same.



Speaker:

My question is, does it qualify under Fido?



Speaker:

Oh, that I don't know.



Speaker:

Is it Fido compliant?



Speaker:

Um,



Speaker:

Because the



Speaker:

process you just



Speaker:

saying is, what you're saying is that you don't have to remember anything.



Speaker:

Under a pasky situation.



Speaker:

Right.



Speaker:

The only thing I have to remember is how to authenticate to the



Speaker:

device that has the thing.



Speaker:

Right.



Speaker:

Um,



Speaker:

Right, because you don't even wanna remember, like you wanna



Speaker:

remember like very minimal, right?



Speaker:

And it shouldn't be something you remember per website,



Speaker:

right,



Speaker:

right,



Speaker:

It's like your password manager, you just remember the master password.



Speaker:

It remembers everything else,



Speaker:

right,



Speaker:

right.



Speaker:

In this case, you just don't even have to remember a master password, right?



Speaker:

You just bring you or whatever



Speaker:

you do to log into



Speaker:

your device, right?



Speaker:

So here's my, so here's my question.



Speaker:

If, if a Fido compliance system



Speaker:

is so much better, why don't we just use it for everything?



Speaker:

Like right now, I, I, I'm a backup guy and I wanna make sure that my backup system



Speaker:

is, is as secure as it could possibly be.



Speaker:

It sounds like Fido is better.



Speaker:

Why don't I just, tomorrow I start using this for everything.



Speaker:

Well, two things.



Speaker:

One is the vendor needs to support Fido, right?



Speaker:

So



Speaker:

it's not simple, right?



Speaker:

They need to actually build the mechanisms to support it.



Speaker:

The other thing too is I don't know if Fido works in a non uh, connected case.



Speaker:

Like if you're not connected to the internet, will it work?



Speaker:

Hmm.



Speaker:

Well, what scenario are you thinking of?



Speaker:

Where I would be running a backup system that's not connected to the internet.



Speaker:

Maybe you're in a skiff or you're



Speaker:

in a, in a secure location where you don't necessarily have outside access.



Speaker:

I'm sure it would work, but I just don't know.



Speaker:

Yeah.



Speaker:

Yeah.



Speaker:

Well, I'm not sure it work.



Speaker:

I think there's a pretty high chance it would work, but again, I also don't know.



Speaker:

Right.



Speaker:

Um,



Speaker:

but us, but, but here's the other thing is I think backup vendors, or sorry, backup



Speaker:

admins should be talking to their vendors and saying, please provide me pass keys.



Speaker:

yeah, and, and, and you, you can tomorrow, right?



Speaker:

You can start using something like UB Key to authenticate yourself if



Speaker:

you've got, if you have servers, right?



Speaker:

There are, there are UB key.



Speaker:

Uh, implementations for Unix windows, you know, or, or Linux, windows and Mac.



Speaker:

And so you could tomorrow.



Speaker:

Reconfigure your logins for all of your devices that have anything to



Speaker:

do with, uh, if, again, if you're using a, a traditional system



Speaker:

that that is based on some sort of server you could change so that the



Speaker:

o you, you can only log into the OS via UB key and, and and pass keys.



Speaker:

Right?



Speaker:

Um,



Speaker:

and two UB keys, by the way, please.



Speaker:

two UBI key two.



Speaker:

Um, and then, um, and then.



Speaker:

The, the harder one will be if you're using a SaaS provider, uh, you,



Speaker:

you, you should be pressuring them



Speaker:

to support, uh, Pasky.



Speaker:

Yep.



Speaker:

That's our, you know, again, we're not experts in this.



Speaker:

Uh, you should talk to an expert in this.



Speaker:

Um, if you like the UB key thing, check that out.



Speaker:

Uh, YUBI key, uh, that's the name of the product.



Speaker:

UB Co. Is the, is the company.



Speaker:

Uh, UB probably stands for something.



Speaker:

I don't know what it stands for.



Speaker:

U You be, you'd be more secure.



Speaker:

That's pretty good.



Speaker:

Maybe they could use you in marketing, Curtis.



Speaker:

Yeah.



Speaker:

Um, the, um, it's probably, I don't know.



Speaker:

I don't know where the name comes from, but, um, so all we're saying is.



Speaker:

All of this is more secure than just a username and password.



Speaker:

MFA's better, uh, than, than nothing.



Speaker:

Uh, there's three levels, right?



Speaker:

You got email, SMS and one-time password generators.



Speaker:

the the latter is definitely the best.



Speaker:

Um, probably the most secure is an actual key fob.



Speaker:

Most people aren't gonna use that.



Speaker:

Most people are gonna use it and as an app.



Speaker:

Um, and then.



Speaker:

The PAs keys is probably the most secure of them all, but it requires more changes



Speaker:

to your, um, to your infrastructure.



Speaker:

Uh, I will say that if you have servers or backup applications or



Speaker:

backup storage, that doesn't require either MFA or PAs keys to log in,



Speaker:

man, you need to fix that stuff now.



Speaker:

Oh,



Speaker:

you concur.



Speaker:

yeah, Oh, definitely.



Speaker:

Yeah.



Speaker:

You're just a matter of time.



Speaker:

Yeah, just a matter of time.



Speaker:

All right.



Speaker:

Once again, we managed to fill 45 minutes



Speaker:

talking about something.



Speaker:

In the beginning I was like, I dunno if we're gonna, if we're gonna fill



Speaker:

the



Speaker:

telling you, I'm telling you, we always figure out a way to fill the time.



Speaker:

It's like sand or



Speaker:

water.



Speaker:

could be that one of us can talk forever.



Speaker:

I don't know which one of us it



Speaker:

would be.



Speaker:

One of us definitely talks more than the



Speaker:

other one.



Speaker:

Anyway, I digress.



Speaker:

You have a nice day Prasanna



Speaker:

Thank you Curtis, and you as well.



Speaker:

I.



Speaker:

and, uh, I hope our



Speaker:

um, our, uh, listeners have a nice day as well.



Speaker:

That is a wrap.



Speaker:

The backup wrap up is written, recorded, and produced by me w Curtis Preston.



Speaker:

If you need backup or Dr. Consulting content generation or expert witness



Speaker:

work, check out backup central.com.



Speaker:

You can also find links from my O'Reilly Books on the same website.



Speaker:

Remember, this is an independent podcast and any opinions that



Speaker:

you hear are those of the speaker and not necessarily an employer.



Speaker:

Thanks for listening.