Full Title or Meme
The problem of giving and maintaining a continuing identifier for a real-world person on a digital network.
- Simplest of all the User needs to Authenticate from time to time and on a variety of devices under less than ideal conditions where passwords are mistyped and Alternate Authentication factors are lost or fail.
- More severe Recovery problems occur when the User has lost control of their account and needs it to be reset. The level of Authentication for these situation can be severely taxing to a user desperate for access to their accounts.
- When an Authentication factor like an alternate email or phone number is compromised, insecure Recovery methods themselves become a means of attack, especially since factors like phone number were never intended to be secure.
- Shane Weeden, IBM Account Recovery is just another Authentication Method
- Before the user can request a list of data that is held about them, or Redress for mistakes made by a Data Controller they must Authenticate themselves to the data controller to assure that the Recovery process itself does not leak data.
- Before any Data Controller can report to the user about leakage of User Private Information, they just have good contact information for the User.
- Before any Data Controller can allow access methods or factors to be changed on an account, they must be assured that this is not an attack.
- Recovery is a fertile place for attackers to take over user's accounts, particularly when a low security second factor, like SMS, is used for recovery.
- If the account the attacker subverts is an OpenID Provider (OP or IAP), the attacker can then move onto any Open ID Clients (RPs) that subscribe to that OP.
- Many Recovery Use Cases are unpleasant for the user. Following that link will bring you to a list of one dystopian and one eutopian possible uses cases.
- As a part of creating a User Object to hold User Information any Site needs to first of all assure that they can contact the user.
- The two most common contact methods are email address and Smart Phone numbers. But such contact itself can become the vector for attack so any contact email must be recognizable and protected against spoofing by attackers.
- The downside to giving untrustworthy sites yet another means to reach out to users to capture their attention continues to occur
Proposed for Standardization
This proposal assumes that the user has continuing needs to use their identifiers to access their personal resources, even as the authentication factors become obsolete or are lost. Recovery in this sense means key rotation as well. More description can be found in this description of [Did Recovery] or this for [Regeneration]. The following are some of the known ways that loss of use of an authentication factor can occur:
- The device holding the authentication factor is lost.
- The algorithm or key strength is declared obsolete or unable to continue to protect the user's authentication factors.
- A key has become compromised or is otherwise no longer usable.
- The user wishes to enable more than one authenticator to access their resources.
- The identifier method has become obsolete or no longer supported.
For these or any other reason the user needs to enable a different key and bind that key to their resources. Recovery of access uses the same process as identity theft which makes it similar to sim swapping to gain access to a user's phone number, which is often used in identify proofing. This document is designed to provide secure means for that recovery without increasing the risk of identity theft.
Note that recovery of the user access, which is the topic of this specification, may also be a part of a larger process that includes the recovery of user data.
- Key is stored in a (e.g.) pfx file that is encrypted to a user secret.
- Key is contained in a removable data store and can be restored if the user is authenticated.
- Key could be shared between multiple user devices and any one could back up the other. (Android already enables this.)
- A Seed can be used to create the key see examples in: [Emtrust], [SeedQuest] and [DCM],
- WebAuthn dual PRF function that takes two salts are returns two keys, use that with 2FA to get decryption key for user secret.
- OpenID Moderna Account forward spec OpenID Connect Account Porting https://openid.net/specs/openid-connect-account-porting-1_0.html also requires a trusted server.
- Include the WebAuthn credentialID in the did document as part of bootstrapping info. Only the person with the authenticator would be able to decrypt the user secrets into the wallet. (John Bradley)
- A collection of pictures (or phrases) could be presented to the user until the key data was fully recovered. (No small number of matches would suffice.) One example is [Fuzzy Vault]. Another is Account Recovery with Expanded Password System [Regeneration].
- A set of biometric data can be used to grant access as described in [Horcrux].
- A new key could be generated and bound to the user's ID. This would require assistance from a trusted server as well as some helper authentication factors.
The following helper functions can be used to enable recovery when a trusted server approach is chosen.
- A FIDO / Web AuthN key is created on a key fob that can be used to initialize the user's identity on any device.
- A QR could be used to provide the secret information to unlock the user's secrets.
Recovery can aslo be enabled by providing the user with a method to "roll-over" or recreate the key on the device.
- In KERI the keys are "pre-rolled" in the sense that one or more alternative key an listed in the user ID document that can be angled as desired.
- Lily Hay Newman, PHONE NUMBERS WERE NEVER MEANT AS ID. NOW WE’RE ALL AT RISK (2018-08-25) Wired Magazine https://www.wired.com/story/phone-numbers-indentification-authentication
- Zack Whittaker, Twitter admits it used two-factor Phone Numbers and Emails for serving Targeted Ads. TechCrunch (2019-10-08) https://techcrunch.com/2019/10/08/twitter-admits-it-used-two-factor-phone-numbers-and-emails-for-targeted-advertising/