▲ | sweetjuly 9 days ago | |||||||||||||||||||||||||
Magic links can be used to authorize the session rather than the device. That is, starting the sign in process on your laptop and clicking the link on your phone would authorize your laptop's sign in request rather than your phone's browser. It requires a bit more effort but it's not especially difficult to do. | ||||||||||||||||||||||||||
▲ | johtso 9 days ago | parent | next [-] | |||||||||||||||||||||||||
Wouldn't that be incredibly insecure? Attacker would just need to initiate a login, and if the user happens to click the link they've just given the attacker access to their account.. The reason why magic links don't usually work across devices/browsers is to be sure that _whoever clicks the link_ is given access, and not necessarily whoever initiated the login process (who could be a bad actor) | ||||||||||||||||||||||||||
| ||||||||||||||||||||||||||
▲ | xx_ns 9 days ago | parent | prev | next [-] | |||||||||||||||||||||||||
And we get back to the original point of the article (sort of). Opening a magic link should authenticate the user who opened the magic link, not the attacker who made the application send the magic link. | ||||||||||||||||||||||||||
▲ | KayEss 9 days ago | parent | prev [-] | |||||||||||||||||||||||||
This is what makes securing this stuff so hard when you don't have proper review. What seems like a good idea from one perspective opens up another gaping hole somewhere else. Off the cuff suggestions for improving UX in secure flows just make things worse. |