On Tue, Aug 06, 2024 at 11:07:14PM +0700, Max Nikulin wrote:
> On 06/08/2024 11:37, to...@tuxteam.de wrote:
> > TOTP is a standard (rfc6238 [1]) so it actually/should/  give the same
> > numbers regardless of the application.
> > 
> > (This is what miffs me most: those marketing departments always sell you
> > some unspecified snake oil -- "authenticator app", "2FA" -- instead of
> > telling you what's technically behind it.
> 
> It is mostly true, however authenticator applications may use
> vendor-specific protocols that relies on network connection instead of
> displaying TimeOTP code to confirm login. The worst case is when TOTP is
> disabled for specific service and alternative applications can not be used.

I just today set up one more: it /was/ TOTP, after all. The instructions,
of course didn't say so, but talked a lot about scanning the QR code with
your smartphone (there is the TOTP key beneath this ready for c&p, but no
mention of it).

That's what I call nudging.

> While passwords are salted and hashed to make it harder to steal them from
> servers,

...but of course they must be stored in plain text in your password "vault".
(OK, technically they may be encrypted, but usually the "vault" has a key)

> the same approach is not applicable for TimeOTP. The same secret
> must be available on client and server to derive a code valid for the
> current (half of) minute.
> 
> I am not recommending against TOTP. Just be aware that enabling and using it
> may require more efforts than for application specific to particular vendor.

Nor am I. It is a specific tool for a specific job -- my point is, that most
of the time it's being pushed without really understanding what it affords.

Cheers
-- 
t

Attachment: signature.asc
Description: PGP signature

Reply via email to