Follow @Openwall on Twitter for new release announcements and other news
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date: Fri, 29 Mar 2019 19:52:37 +0300
From: Anton Dedov <>
Subject: Re: UX/security of TOTP configuration process

So, keeping TOTP secret as a backup should be considered anti-pattern?


пт, 29 мар. 2019 г., 19:50 Jim Fenton <>:

> Many TOTP agents have mechanisms for transferring the secret from one
> device to another (for example, when a user’s smartphone is replaced). This
> is somewhat out of control of the application using TOTP (and unfortunately
> some of these applications do not do this transfer in a fully 2FA manner,
> but again that is out of the application’s control).
> But I think it’s good to provide one-time recovery codes in case the user
> can’t transfer the recovery secret.
> -Jim
> > On Mar 29, 2019, at 5:03 PM, Anton Dedov <> wrote:
> >
> > Hello folks!
> >
> > A question on implementing TOTP 2FA in an application.
> >
> > Is it ok to ask users to backup TOTP secret in a secure place during 2fa
> configuration process? Or it's better to provide one-time recovery codes?
> >
> > The argument against TOTP secret backup can be an assumption that if the
> secret leak it can be maliciously used without victim user ever noticing it.
> >
> > --
> > Anton Dedov

Content of type "text/html" skipped

Powered by blists - more mailing lists

Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.