-
Notifications
You must be signed in to change notification settings - Fork 61
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2FA OTP token not accepted everywhere #1103
Comments
bump, anyone? cc @nirik , maybe I should have mentioned you in here right from the start 😬 |
I don't have any idea whats happening here... we need to wait for cycles from @abompard / a noggin developer. The only thing that stands out to me is the "extended ASCII and specials" but you tried a password with just a-zA-Z0-9 and it did the same thing right? How many characters long was it? |
128 chars only alphanumerical. That's the one I'm using right now which I can log in just fine. Didn't dare to touch the 2FA again since you reset it for me twice. |
I have recreated this issue on IPA's demo server (authentication fails with long passwords when TOTP is enabled), and filed an issue here: |
As I responded on the IPA's issue (thanks, @ryanlerch for filing that), we cannot support larger passwords for OTP/RADIUS pre-authentication methods without breaking RFC 2865 compatibility. @9Lukas5, since MIT Kerberos internally uses RADIUS protocol for communication between KDC and the RADIUS backend in which we implement 2FA support, and that backend also implements RADIUS proxying to an external RADIUS servers, we have no chance to violate RFC 2865 requirements. We might have some changes for internal IPA use case but then it becomes quite confusing to users. I'm inclined to document that both OTP and RADIUS authentication methods in FreeIPA only support up to 128 characters in user credentials (including OTP token value, in OTP case). |
Okay, so now this issue really should be: "Restrict Passwords in Noggin to 122 characters (122+6)" |
Based on the failure I just reproductive trying to authenticate to comment on the FreeIPA issue, the encoding overhead may reduce the available password length to less than 95 characters, though the inconsistency of authentication failure described in #1394 may indicate otherwise. This situation appears analogous to the more common case of folks who use bcrypt but don't limit passwords to 72 characters. |
I newly created an Fedoraproject account and enabled 2FA, resulting in being locked-out from the account, as the log-in didn't accept the OTP token I entered.
After the token got reset I tried it again. This time I stayed logged in on one device to play around a bit more. Following are my steps taken and what I found:
Steps taken
from device 1:
from device 2:
from device 1:
already, it doesn't allow to remove all OTP tokens
requires the password AND and OTP token to confirm
password manager and autofill it, so mistyping it is basically not a thing
generate a new alphanumerical one to test
new one and the OTP token
accepted the OTP token :o
from device 2:
from device 1:
Right now the OTP token got reset again on my account and I'll wait for a response from here, before I try it again.
I'm using a current Firefox on Fedora and the Authenticator App andOTP on Android.
I'm especially flustered that it works on confirming the new token and changing the password, but not for loggin in or adding another token.
The text was updated successfully, but these errors were encountered: