Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Mar 2019 19:26:50 +0300
From: Anton Dedov <adedov@...il.com>
To: passwords@...ts.openwall.com
Subject: Re: UX/security of TOTP configuration process

> if it could be used it is not ONE TIME then u r lying to yourself.

Pardon, I did not get it.

пт, 29 мар. 2019 г., 19:07 e@...tmx.net <e@...tmx.net>:

> On 03/29/19 17:03, Anton Dedov wrote:
> > Hello folks!
> >
> > A question on implementing TOTP 2FA in an application.
> >
> > Is it ok to ask users to backup TOTP secret in a secure place during 2fa
> > configuration process? Or it's better to provide one-time recovery codes?
> >
> > The argument against TOTP secret backup can be an assumption that if the
> > secret leak it can be maliciously used without victim user ever noticing
> it.
>
> if it could be used it is not ONE TIME then
> u r lying to yourself.
>

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.