-
Notifications
You must be signed in to change notification settings - Fork 12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hide token secret when after token creation #24
Comments
I don't have objections to have the key value hidden by default. But there has to be an option to display and edit it, because I may want:
And with these scenarios given, it doesn't have much sense to hide the value in the standard options dialog. |
Maybe I didn't explained my intent well. I will try to describe intended workflow:
This protects the key when the phone is forgotten somewhere for a while. I would call it security feature. Secret key is shared secret. From definition of shared secret, it should not be used more than once. The only secure way how to establish trust with another party is to create another token. Does it clarify what I have meant? |
I understand your comments. But I like the possibility to display the shared key again. Maybe I'm too lazy to generate and register new keys in all systems I use (when I change the mobile device). I see some possible ways how to handle this:
|
I think that un-settable option "hide my key" is good enough... Can we make it enabled by default to make totp-me secure-by-default? I looked at the code in loadProfiles() and honestly, I have no idea how it is supposed to work and how should I add a boolean to it (and stay backward compatible at the same time). Can you give me some hints, please? |
I'm fine with the secure-by-default profiles. (my laziness is not so hard) The important methods which should be extended are:
|
One more thing came to my mind. The old profiles (created by previous versions) should have the flag set to "unsecure". |
I know it is security through obscurity, but still ... It is really easy to quickly read/take a photo of a token secret when the phone is forgotten somewhere on a table. You need just few tens of seconds for taking photo.
Digging data from Java store somewhere in guts of the phone should take more time. Hopefully it is not feasible in few minutes before I remember where the phone is laying :-)
Would you accept patch with this "functionality"?
The text was updated successfully, but these errors were encountered: