A Tour of WebAuthn
Value of the write-up / learning resources
- Many find the article unusually clear and code-focused compared to the dense, hyperlink-heavy WebAuthn specs.
- Some report it finally helped them understand evolving standards (U2F → FIDO2 → WebAuthn → passkeys).
Complexity and usability of WebAuthn
- Several commenters view WebAuthn/passkeys as over-complex and “enterprise-shaped,” with ease of implementation seemingly a low priority.
- Complaints include confusing UX around registration, credential discovery, authenticatorAttachment, and inconsistent site flows.
- There’s frustration that WebAuthn is tightly tied to browser JavaScript APIs with no simple non-browser/CLI path.
Passkeys, syncing, and user control
- Big concern: synced, “discoverable” passkeys feel paternalistic and lock users into vendor ecosystems and paid sync services.
- Lack of robust export/import at launch is widely seen as user-hostile; some expect eventual export but fear “approved provider” lock-in.
- Others note local/no-sync implementations exist (e.g., password-manager-based or self-hosted vaults) and argue “you have to trust something,” though some strongly reject needing to trust any online sync.
Hardware tokens vs software and key management
- Debate over resident (discoverable) vs non-resident credentials:
- Non-resident hardware keys praised for phishing-resistant MFA without capacity worries.
- Resident keys introduce storage limits and management pain (deleting individual credentials, full slots, needing multiple keys).
- Newer hardware supports more resident keys and credential management, but UX is still considered clunky.
Security comparisons: passwords, OTP, WebAuthn
- Some argue strong, unique passwords plus TOTP is a practical “sweet spot.”
- Others emphasize TOTP/SMS are phishable and replayable; WebAuthn’s URL-bound, non-replayable design is seen as a major security upgrade.
- Push-based MFA and “pick the right number” flows are criticized as vulnerable to MFA fatigue and social engineering; “type this number in” is seen as slightly better but still phishable.
Standards process, power, and attestation
- Strong skepticism that WebAuthn/passkeys are corporate-driven and user-controlling.
- Others counter that work happened in public (W3C lists, GitHub), though dominated by big companies.
- Attestation is controversial:
- Critics say it lets sites whitelist/blacklist authenticators, undermining user freedom.
- Others claim major platform passkey implementations have effectively dropped attestation for synchronized credentials, limiting this risk, though references show attestation still exists in some non-passkey or enterprise/MDM contexts.
Implementation pitfalls and tooling
- Noted registration edge case: credential created on client but never recorded server-side (network failure) leading to “split brain” where authenticator thinks it works but server does not. A proposed “Signals API” aims to address this; implementation status is mixed.
- Chrome DevTools’ virtual authenticator is suggested for testing, but there’s no simple curl-style tool for WebAuthn flows.
Adoption trade-offs and user behavior
- Some see passkeys as clear progress and already use them alongside passwords for convenience.
- Others refuse to use services that drop passwords, or view passkeys as a “manufactured solution” that centralizes control and complicates recovery and portability.