Skip to content
Snippets Groups Projects
  1. Jun 25, 2022
    • Michael Eischer's avatar
      wire up most of TOTP support · b149c493
      Michael Eischer authored
      b149c493
    • Michael Eischer's avatar
      cleanups · 1695c9b9
      Michael Eischer authored
      1695c9b9
    • Michael Eischer's avatar
      Rework counter autoresync · a0dbb9f8
      Michael Eischer authored
      The previous implementation required entering a number of consecutive
      OTPs followed by another OTP value anywhere in the autoresync range. In
      particular it was allowed to just repeat the previous OTP. That is for
      two required consecutive OTPs, it would be possible to resync by
      entering "a", "b", "b". Thus the requirement to enter the last OTP of
      this sequence does not improve security but reduces user friendliness.
      
      The new, simplified implementation, just resyncs automatically once the
      required number of consecutive OTPs is reached. A successful resync also
      counts as a successful authentication. Thus it is sufficient to just
      enter "a", "b".
      
      From a security perspective the requirement for consecutive OTPs should
      (virtually) rule out any chance for an attack. An attacker would have to
      guess all numbers of the two OTPs combined, which essentially doubles
      the OTP length. It is much more likely guess an OTP value within the
      standard lookahead range than to guess two consecutive OTPs correctly.
      
      A similar mechanism for counter resynchronization is also used for
      example by FreeIPA: https://www.freeipa.org/page/V4/OTP#Token_Synchronization_2
      a0dbb9f8
  2. Jun 24, 2022
  3. Feb 03, 2022
  4. Oct 15, 2021
  5. Aug 12, 2019
  6. Aug 09, 2019
  7. Aug 08, 2019
  8. Jul 30, 2019
  9. Nov 21, 2017
  10. Nov 20, 2017
  11. Oct 09, 2017
Loading