this post was submitted on 05 Jun 2024
46 points (78.0% liked)

Open Source

31679 readers
815 users here now

All about open source! Feel free to ask questions, and share news, and interesting stuff!

Useful Links

Rules

Related Communities

Community icon from opensource.org, but we are not affiliated with them.

founded 5 years ago
MODERATORS
 

Just wondering what people are using to meet the 2FA requirement GitHub has been rolling out. I don't love the idea of having an authenticator app installed on my phone just to log into GitHub. And really don't want to give them my phone number just to log in.

Last year, we announced our commitment to require all developers who contribute code on GitHub.com to enable two-factor authentication (2FA)...

you are viewing a single comment's thread
view the rest of the comments
[–] [email protected] 10 points 6 months ago (1 children)

I don’t love the idea of having an authenticator app installed on my phone

For anything? Why not? Surely you don't believe SMS-based TOTP is safer, right?

[–] [email protected] 0 points 6 months ago (1 children)

Wut. TOTP doesn't involve sending an OTP. That's the point.

"SMS-based TOTP" is a nonsensical phrase

[–] [email protected] 2 points 6 months ago (1 children)

"Time-based One-Time Password" literally says nothing about the delivery method. Who said it can't involve remote sending?

And what would you call it, then, SOTP?

Anyway, regardless of the terminology-nitpicking, my point still stands.

[–] [email protected] 1 points 6 months ago (1 children)

The point of being time based is to not send it. That's the whole point. To avoid that vecotor of attack.

[–] [email protected] 1 points 6 months ago (1 children)

Do you think the SMS codes are not time-based on the companies' ends? How are they deriving the digits, then?

[–] [email protected] 1 points 6 months ago (1 children)

They are not time based, correct.

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago) (1 children)

Interesting, I didn't know that. So how do they derive the digits?

[–] [email protected] 2 points 6 months ago* (last edited 6 months ago)

Best practice for a cryptographic nonce is to generate them randomly every time