Podcast
Root Causes 470: The MFA False Equivalency Fallacy


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
February 19, 2025
Not all forms of MFA are equally secure. In this episode, we describe the differences between the more secure and less secure forms of MFA.
Podcast Transcript
Lightly edited for flow and brevity.
I wanted to use this Toronto sessions atmosphere, this ability for us to really talk through some of these meaty issues sitting right beside each other. And I remember writing a blog. My face was the picture right beside the article. The title of it was Not All MFA Are Created Equal. I see it in technical journalism. I see it in blogs. I see it all over the place, and it's still used in a serious way. I can't tell if people are being ironic.
So let's really, really name the stronger secrets. Shared secrets in extremely limited use. We'll let those ride. Your strongest secrets, though, are going to be your not shared secrets, also known as asymmetric secrets. Which is why you brought up certificates.
I've been asked many, many times, Jay, if you're going to put locks on the doors, what would you choose? In today's age, what I would choose is out of band. In other words, don't trust your endpoint. Something where the key generation was extremely controlled, and the private key is in an enclave. The ability to access the endpoint to do the out of band authentication is protected by some sort of a - -
Now we've had a podcast talking about there is a weakness because there's a session token sitting underneath that that’s part of the implementation, and it might end up being the fatal flaw. I hope it won't. It probably won't. Let's pray it isn't. People will figure it out. The ecosystem will come together and solve that problem. So how to protect that session token. Again, symmetric secrets have to be highly controlled. I don't think they're controlled enough right now for WebAuthn and passkeys. That's just the truth. I don't think I'm the only person who says that. It's just I'm the person who's annoyingly enough bringing it up every once in a while.
I think, though, that for those of you who are in enterprise environments and you're facing this world of Crypto Wars 3.0, something you and I just were talking about, where if you thought you had to be paranoid before you got to be really paranoid now in this new world, and I think that putting good locks on the doors is something you all need to be doing, and that's the reason for this podcast. It's a call to arms to let go of things that don't work anymore.
Something you have, something you know, something you are, doesn't take into – alone - does not take into account the quality of the secrets underlying.

