-
Notifications
You must be signed in to change notification settings - Fork 113
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Do you have any plans to introduce MFA when you log in? #295
Comments
Bonus points if you use WebAuthn (W3C Standard, supported by all major browsers) and very simple to implement. https://auth0.com/blog/webauthn-a-short-introduction/ |
WebAuthn would be nice but requires a https connection. As far as this is currently not the case? I'm also unsure if self signed certificates are allowed by the major browsers for WebAuthn. TOTP on the other side should be pretty doable while locking at the code. |
Without an RTC? Otherwise you hit the real possibility of not having internet, booting the KVM and not being able to log in at all... |
Yes, I'll add this to the roadmap. |
sorry, didn't thought about that. NTP might be a solution but only if internet connection is present. HOTP might be an option and has also an RFC (it's counter based instead of time). Of course Webauthn might be nice but then we first need to solve the missing TLS/HTTPS. |
Yeah - TOTP won't work if booted with no ability to sync time - so when you'd need a KVM the most, you wouldn't be able to use TOTP.
Potentially, but I haven't seen anything actually use HOTP for a very long time. Webauthn would require both a working DNS infrastructure (it must use a domain name), and TLS certificates to match. I personally think the majority of implementations of MFA would be overkill for this device - and the majority have the potential to lock you out when you'd need the KVM the most - ie when having problems where you need a console. |
Having it as an optional feature would alleviate any concerns. Personally I already have an FQDN for my NanoKVM and a TLS cert is a trivial thing these days with LetsEncrypt so IMHO those shouldn't be blockers to the implementation of WebAuthn. TLS seems like a pretty important thing too, if only to protect passwords in single factor auth. Personally, I'd rather be locked out of my KVM than leave it exposed, or more accurately the server it's connected to exposed. Call it an abundance of caution, even if I'm not putting my KVM directly onto the internet and I'm using tailscale to connect, I still prefer to have some depth to my security - particularly in time when there are so many devices already in the LAN that cannot be entirely trusted. |
However having a method to bypass it when it breaks is just as good as not having it at all. |
Optionally enabled, not optional when logging in once it has been enabled. |
Sure - and, say your DNS dies. Or your cert expires with no internet to renew. How do you recover your device if using WebAuthn without disassembling it to factory reset it? I kinda think you guys underestimate how these ways kill what is essentially a 'last resort recovery' for problems. Sure, maybe you like it, but I wouldn't even call it a good idea for an option to be selectable. I mean, the good thing about open source is you can fork the project and then break it to your hearts content, but the majority of KVM users (not just this project) need them to be fully operational in even minimal network conditions. |
SSH ... Or as you say factory reset. Why are you searching so hard for some reason not to improve security of a device I own? I mean if I don't have internet access etc surely I have bigger issues than not being able to access the KVM? If users manage to lock themselves out of it, that's their problem, what does it matter to you? If you don't want the option, don't enable it?
It's only the last resort if you don't have physical access to the machine it's connected to. By your own argument, if you don't have internet and not your not physically local you're already stuffed?
And maybe you would not like it, so just don't use it?!?
How is it you think you speak for the majority? I mean frankly speaking every large organisation I've worked with in recent years wouldn't even allow a device with just password authentication anywhere near their networks. |
Which MFA should be used to secure SSH? Or is it only important for the web UI? |
This is a security-related question.
I think it will help with security when logging in to MFA, do you have any plans to introduce it?
The text was updated successfully, but these errors were encountered: