-
-
Notifications
You must be signed in to change notification settings - Fork 5.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
UI to setup FIDO keys is not available until after setting up TOTP #17495
Comments
Ref. my original comment over at Mastodon (same issue):
|
Plus my second comment there: |
The accepted pull request does not really resolve the issue fully. WebAuthn / FIDO2 is both factors in one, it is not a second factor only. The user has 'something they own' (the hardware key) and 'something they know' (the PIN for the device) and possibly also 'something they are' (biometric data). The WebAuthn standard is meant to allow users to log in passwordless. E.g. with a Yubikey Bio, no password is needed, and no PIN is needed unless you mess up the fingerprint scan a couple of times. This is still two factors of authentication. Also note this warning regarding the current protocol Gitea is using: |
This change enables the usage of U2F without being forced to enroll an TOTP authenticator. The `/user/auth/u2f` has been changed to hide the "use TOTP instead" bar if TOTP is not enrolled. Fixes go-gitea#5410 Fixes go-gitea#17495
Gitea Version
1.15
Git Version
No response
Operating System
No response
How are you running Gitea?
https://codeberg.org
Database
No response
Can you reproduce the bug on the Gitea demo site?
Yes
Log Gist
No response
Description
Configuring an account to use FIDO keys to log in first requires configuring TOTP. This is problematic because TOTP is harder to user and vulnerable to phishing.
Screenshots
The text was updated successfully, but these errors were encountered: