-
-
Notifications
You must be signed in to change notification settings - Fork 2.8k
Increase 2FA key size #23585
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: 5.x-dev
Are you sure you want to change the base?
Increase 2FA key size #23585
Conversation
|
Thanks for the PR @tvlooy. Would you be able to update the expected tests as well, please? See https://github.com/matomo-org/matomo/actions/runs/17588686587/job/49979193367?pr=23585#step:3:791 for details on the failure. |
|
Done! |
When scanning the 2FA codes with FreeOTP it reports that the tokens contain insecure cryptographic parameters. The key is too short. Google authenicator standard is 32 characters.
|
Oh, that didn't work the way I expected it. I now updated the PR and sqashed commits. |
|
@michalkleiner can we merge this now or is there still something missing? |
|
@tvlooy We won't merge this for now, as it's unclear if a bigger key size could cause issues with existing 2FA apps. In addition, there are also discussions around the warning in FreeOTP here: |
|
One possible solution I can think of would be to make the key length configurable, defaulting to the current 16 characters. Then if someone wanted, they could adjust the config locally to 32. |
|
While I understand the concern, it would benefit everyone if the security were sufficient by default. It shouldn’t be something people have to think about. Adding options can also create opportunities for misuse. |
Description:
When scanning the 2FA codes with FreeOTP it reports that the tokens contain insecure cryptographic parameters. The key is too short. Google authenicator standard is 32 characters.
Review