Skip to content

  • Projects
  • Groups
  • Snippets
  • Help
  • Sign in / Register
Minds
  • Group overview
  • Epics 43
    • List
    • Roadmap
  • Issues 1,050
  • Merge Requests 137
  • Security & Compliance
  • Packages
  • Members
Collapse sidebar
  • Minds
  • Epics
  • &51

Open
Opened 10 months ago by Bill Ottman

Secure Auth

Enhanced TOTP Authentication to allow users more, and better methods of authentication for both web and mobile.

Edited 1 month ago by Bill Ottman
To Do
Mar 10, 2020
Start date
Fixed: Mar 10, 2020
Inherited: None
Apr 21, 2020
Due date
Fixed: Apr 21, 2020
Inherited: None
-
0
Labels
None
None
Ancestors
None
11
11 participants
user avatar
user avatar
user avatar
user avatar
user avatar
user avatar
user avatar
Notifications
  • Epics and Issues
  • Roadmap
0 1
  • (feat): TOTP Authentication for user login
    minds/engine#274

  • Bill Ottman :dragon_face: @ottman added issue engine#274 10 months ago

    added issue engine#274

  • Bill Ottman :dragon_face: @ottman mentioned in epic &35 (closed) 10 months ago

    mentioned in epic &35 (closed)

  • Mark Edworthy
    Mark Edworthy @medworthy · 10 months ago

    @ottman, Again I see that you are posting epic topics without including any actual descriptive information and only providing a very vague title. Whilst I do understand and appreciate the time constraints that you may have, I also understand that it does not take more then 10 minutes at the most (and usually a lot less) to provide actual information about said topic.

    I am afraid to say that this ongoing limiting of good administration housekeeping procedures may actually discourage further support and collaboration from the wider community (which is something that none of us would like to see and would want to limit as much as possible, with the aim to encourage further participation within the development and support of the Minds.com project). Also it is worth noting that we all want to encourage further transparency within the Minds.com project and this form of extreamly limited information could be considered as promoting the idea of a lack of wider transparency.

    However, irrelevant of the above critique (which has been provided within the spirit of good faith and with the aim of wanting to improve support of the overall project), as you might be aware, within various previous Help and Support (H&S) enquires, I have been providing replies which have attempted to provide information about why the existing Sort Messaging System Two Factor Authentication facility (SMS 2FA) has not been as successful as originally expected and could be considered as being more of a problem for users that may have limited Global System for Mobile communication (GSM) coverage (I am providing a URL to one of the H&S enquiries that I have provided a reply to -- see below).

    I am extreamly encouraged and pleased to see that the Time-based One-Time Password algorithm (TOTP) based 2FA idea is now being seriously considered as a replacement for the existing SMS 2FA functionality.

    Reference:

    • https://www.minds.com/newsfeed/938018908893708288?comment_guid=938139350238625792
    Edited by Mark Edworthy 8 months ago
  • Bill Ottman :dragon_face: @ottman changed title from TOTP to Secure Auth 10 months ago

    changed title from to

  • Bill Ottman
    Bill Ottman :dragon_face: @ottman · 10 months ago

    https://fidoalliance.org/ thoughts?

    • Mark Edworthy
      Mark Edworthy @medworthy · 9 months ago

      @ottman As far as I can see, FIDO-U2F and FIDO2 specifications require an extra end-user hardware solution for authentication (ie. the usage of a Yubikey or other interface / device) which may not be readily available to the end-user.

      Also, the FIDO-U2F and FIDO2 specifications currently seems to be browser restrictive (ie. fully compatible only with certain browsers) and by using FIDO-U2F / FIDO2 styled authentication, Minds will be further restricting browser accessibility (as I have stated previously, it should not generally be determined by an Internet based platform provider, ie. Minds Inc, which browsers and / or devices the end-user should or should not be using. This is even more of an issue when the Internet based platform provider is trying to promote open source ideals and end-user / consumer choice).

      On a final note, the OATH-TOTP specification is a recognised IETF (Internet Engineering Task Force) standard (RFC6238), whereas FIDO-U2F / FIDO2 specifications are not formally recognised by the IETF.

      Edited by Mark Edworthy 9 months ago
    • Collapse replies
    • Bill Ottman
      Bill Ottman :dragon_face: @ottman · 9 months ago

      Hey, which open source framework do you recommend as an authenticator?

    • Please register or sign in to reply
  • Luculent
    Luculent @luculent · 9 months ago

    @medworthy

    • Mark Edworthy
      Mark Edworthy @medworthy · 9 months ago

      @ottman, Apologise for not replying to this sooner but unless you include the relevant users alias / tag within the comment, the user will not necessarily be notified about said feedback (for future reference, please remember to include users tags within corresponding comments. @luculent, thanks for notifying me about Bill's latest question).

      As far as frameworks are concerned, I would suggest promoting the FreeOTP project to the users, so that they can interact with the optional TOTP framework as part of the authentication process).

      For the backend framework, I suggest looking at the following open source projects (I have not fully reviewed these projects, so am not sure about the suitability of incorporating any of these within the existing Minds frameworks).

      Reference:

      • multiOTP (AGPL)
        https://github.com/multiOTP/multiotp

      • OTPHP (BSD / MIT License)
        https://github.com/Spomky-Labs/otphp

      • TwoFactorAuth (BSD / MIT License)
        https://github.com/RobThree/TwoFactorAuth

      • FreeOTP (Apache 2.0 License)
        https://freeotp.github.io

      Edited by Mark Edworthy 8 months ago
    • Collapse replies
    • Bill Ottman
      Bill Ottman :dragon_face: @ottman · 8 months ago

      thank you. we will review your links. @benhayward.ben @edgebal @msantang78 @eiennohi @brianhatchet @ramialbatal @markeharding

    • Ben Hayward
      Ben Hayward @benhayward.ben · 8 months ago

      Thanks for your time and effort @medworthy. All look nice at a glance, I believe the best course of action from here would be for us to conduct a more objective analysis, so I've spawned a task here so that we can keep that separate and allocate it properly internally. engine#434

    • Please register or sign in to reply
  • Ben Hayward @benhayward.ben mentioned in issue minds#493 (closed) 8 months ago

    mentioned in issue minds#493 (closed)

  • Ben Hayward @benhayward.ben changed the description 4 months ago

    changed the description

  • Bill Ottman :dragon_face: @ottman changed the description 1 month ago

    changed the description

  • Bill Ottman :dragon_face: @ottman changed start date to Mar 10, 2020 1 month ago

    changed start date to Mar 10, 2020

  • Bill Ottman :dragon_face: @ottman changed finish date to Apr 21, 2020 1 month ago

    changed finish date to Apr 21, 2020

  • Bill Ottman
    Bill Ottman :dragon_face: @ottman · 4 minutes ago

    @ottman

Please register or sign in to reply