Yarn

Recent twts in reply to #npkkadq

@justamoment@twtxt.net @prologic@twtxt.net hey, didn’t know that! , as a fan of magic links, I like that it’s available, but “Login with you Email Address” doesn’t make obvious you are going to receive a Dynamic token to your email, in my mind is like “Instead of your Username and Pwd, user your Email and Pwd”

I’d suggest something line “Send an access to your email”, “Send a Magic link”, etc.

⤋ Read More

twtxt_twtxt.1.cytd0qqnwbpw@dm4.mills.io    | time="2022-10-10T05:17:46Z" level=warning msg="sending emails disabled in configuration"

That would be why it’s not working… Hmmm 🤔

⤋ Read More

@prologic@twtxt.net well, not 100% right but it’s a valid assumption.

If you are able to reset your password by email, it’s a pretty similar level of security than receiving an access token by email. Anyone with access to your mail could get access to your accounts.
Adding a second factor of authentication could help, or using something with Public/Private cripto would be better, like Client Certs, Fido2 or even hipster things.

And also giving alerts that someone else is connected in your behalf is great (like is done for some banks or Google) , but that’s a UX compromise between convenience and security.

⤋ Read More

@eaplmx@twtxt.net That’s why we make the tokens short-lived. I’m just pointing out and agreeing with @abucci@anthony.buc.ci that Email security is basically non-existent 😅 – Speaking of which… Is there any desire ot strong push to start thinking about introducing 2FA or MFA to yarnd? 🤔 Note however I have a strong preference for something that is “self-hostable”.

⤋ Read More

You can take a look at the library I’m using, here:
https://eapl.mx/webauthn/_test/client.html

And the implementation there:
https://eapl.mx/twtxt/login.html

What’s missing in the examples is having an identity tied to your Auth device (Hardware token or OS service like Microsoft Hello, Apple Keychain, Android Fingerprint). The explanation is long, but the abstraction is there. Your identity and private certificates are held for you by some ‘magic’ device.

⤋ Read More

@xuu Well, it took me like 4 hours to set up, implement and test the PHP library, with all the setup combinations, devices and such.

Download

So I’ll say that using a password with a simple function like https://www.php.net/manual/en/function.password-verify.php
is much easier than a whole library requiring communication between the server, the browser and the auth device… There is a security reason for that (mainly to avoid phishing, which is something I like compared to other solutions like SQRL)

Download

⤋ Read More

Participate

Login to join in on this yarn.