←back to thread

248 points dogacel | 4 comments | | HN request time: 0s | source
Show context
notpushkin ◴[] No.43688465[source]
> Also in some examples like Facebook's password recovery, this secret clock is not shared with the user directly but rather server's generated one-time password is sent via a trusted medium, such as an email to the user.

I’m pretty sure Facebook just makes up a random number and stores it?

replies(2): >>43688485 #>>43688851 #
dogacel ◴[] No.43688851[source]
Good catch. In my mind storing that random number is similar to storing a plain-text password, thus I thought they were generating TOTPs. Let's hear from others how they implemented it.
replies(5): >>43688873 #>>43688969 #>>43689277 #>>43689772 #>>43690963 #
1. inferiorhuman ◴[] No.43689277[source]
I have to pull a number from Google Authenticator to log into my FB account so I can only assume they're not simply generating random numbers.
replies(2): >>43689293 #>>43689323 #
2. notpushkin ◴[] No.43689293[source]
But they’re not sending you this number via email.
replies(1): >>43690003 #
3. dogacel ◴[] No.43689323[source]
Two different flows, an online and an offline.

TOTP devices can be powered offline, which makes it extra secure, as you don't transfer any data around, possibility of leaking it is extremely low.

Random numbers could only work in online flow, where server sends you a one-time code using a secure communication method, such as a trusted phone number or email address.

4. inferiorhuman ◴[] No.43690003[source]
Correct. Before they killed mbasic the prompt said they would text me a code, but in reality they were prompting for a TOTP code.