OPAQUE protocol for server authentication #1558
Replies: 2 comments 2 replies
-
iiuc, "security against pre-computation attacks upon server compromise" is only a benefit in comparison to other aPAKE schemes, and not in comparison to more traditional password authentication schemes (i.e. what's currently in use). |
Beta Was this translation helpful? Give feedback.
-
Thanks for the reference! We consider our current authentication scheme to not be finalized, and will revisit it before a v1 of atproto, though it may end up looking very similar (or be compatible) with what we have. We do intend to support 2FA and possibly things like passkeys as part of that iteration. You mentioned Argon2, but I believe we currently use |
Beta Was this translation helpful? Give feedback.
-
I noticed that
com.atproto.server.createSession
sends the password in plaintext to the server. While this is a common and still be considered best practice nowadays there would be an opportunity to use a modern protocol like OPAQUE to make sure the server never receives the password.Benefits are:
Another benefit is a stable
export_key
after every authentication that could be used for end-to-end encrypted backups in the future.While the protocol itself is not released as an RFC yet, there are production ready implementations:
More resources:
Beta Was this translation helpful? Give feedback.
All reactions