-
Notifications
You must be signed in to change notification settings - Fork 786
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Implement OTP/AgentAuthentication in the Island #3078
Comments
Regarding the OTP itself, I would suggest that we use alphanumeric OTPs, because a 6-digit numeric OTP can have 1 million possible combinations (10^6), whereas a 6-character alphanumeric OTP using upper and lowercase letters and numbers can have over 2 billion possible combinations (62^6). For the length itself, based on some research I would suggest somewhere between 8-10 alphanumeric chars. I am keen on 10 alphanumeric chars as the possible combinations are 62^10 which is roughly 839 trillion combinations. So no place for brute-forcing. |
The Flask-Limiter package will allow us to rate-limit our endpoints. We can specify a limit like "10/s" that will limit the endpoint to a maximum of 10 in a second. A key_func can be provided, which allows one to specify how keys are determined (the rate limit is applied per-key). It defaults to using the remote IP, but we can leverage it to specify users |
Description
Tasks
Remove unused endpointssecure_generate_random_string()
utility, with at least the 62 alphanumeric, preferably with known command-line safe chars as well(optional) Add a BB test for manual runsMake OTP all *@ilija-lazoroskictrl-c
Better display?Add BB testNot worth the struggle ATM.AGENT_OTP_FLAG
feature flag (agent)The text was updated successfully, but these errors were encountered: