Security News Google Authenticator’s Hidden Passkey Architecture Could Open New Passwordless Attack Paths

Parkinsond

Level 62
Thread author
Verified
Well-known
Dec 6, 2023
5,185
14,805
6,069
Passwordless authentication was supposed to mark the end of account takeovers. Designed to replace traditional passwords with cryptographic keys tied to physical devices, it promised a future where stolen credentials could no longer unlock user accounts.

But a close examination of how Google has actually built its passkey ecosystem reveals something far more complex than the clean, secure image that “passwordless” typically projects.

Beneath every passkey login powered by Google Password Manager, a hidden cloud component is silently performing sensitive cryptographic operations — and it may be creating new attack paths that have never been publicly discussed.

Google’s passkey system does not work like a conventional hardware authenticator locked to a single device.

Every time a Chrome user logs into a service using a passkey backed by Google Password Manager (GPM), the browser quietly opens a connection to a remote service hosted at enclave.ua5v[.]com.

This domain functions as a cloud-based authenticator responsible for generating passkey keys, handling authentication requests, and keeping credentials synchronized across all of a user’s enrolled devices.

Chrome generates two hardware-backed key pairs using the device’s Trusted Platform Module (TPM) — an identity key and a user verification key — then registers them with the cloud authenticator.

The cloud authenticator stores these public keys, assigns a device-specific wrapping key, and issues a member key pair to establish the device as a trusted participant in the user’s security domain.

The entire state resulting from this onboarding is saved locally in a file called passkey_enclave_state, stored within the Chrome profile directory.

 
I experimented with some passkeys using a Google account. I thought it was interesting that I could choose not to sync my passwords to my Google account (keeping them on the device only), but for passkeys I DON'T have this option; the passkeys are automatically synced. Now we know: you probably can't use GPWM's passkeys without Google's cloud infrastructure, even when not used via Chrome (but through cross-device authentication).

You probably can't lose the passkeys' private keys from your device this way, but if you lose access to your Google account, you might not be able to use the passkeys either. That seems like a big and unexpected drawback given uncertainties in the world. You may not be able to back up all of the data either. This may not be data you really own since you may not be able to back it up in its entirety.

Beware using GPWM's passkeys.