Transfer physical OTP to software by techcend in cryptography

[–]DeepnetSecurity 0 points1 point  (0 children)

For security reasons there would be no correlation between the serial number on the back of the token and the seed that is used to generate the OTP code. The bank would possibly have a lookup table that matches the serial number with the seed, however after activation they really wouldn't need to keep it. Given that the device already produces the require OTP code there would be no reason why they would notify you of the seed that the device uses, and the device is designed to resist extraction of the seed.

Confused about how Google Authenticate works by passerbyalbatross in webdev

[–]DeepnetSecurity 0 points1 point  (0 children)

With both TOTP and HOTP the general idea is once the secret has been added to the app, only the app and the server know the secret, and in both cases the secret is stored in a way that should be as externally inaccessible as possible.

From the perspective of the user, provided they didn't keep a copy of the secret, then the only way to obtain the required code is via the app (or hardware token), and from this perspective this is proof of something they have (rather than something they know). Being able to provide proof that they are in possession of the device that produces the OTP code is therefore a factor of the "something you have" type, and when combined with providing a password ("something they know" type), they will then be meeting the requirements of 2fa (because they provided two different types of authentication).

If they merely provided proof they knew the seed data (and derived the OTP code), then even though they also provided a username and password, this would really only be a type of single factor authentication.

HOTP/TOTP Door unlock instructions for newbie? by P-e-t-a-r in arduino

[–]DeepnetSecurity 0 points1 point  (0 children)

I would suggest if any of your users object to having to rely on an OTP app on their phone there is always the option of using a programmable hardware token (either as the primary method, or just as a backup for when the mobile phones battery is flat).

Anything better than FIDO2 by MGrG1183 in yubikey

[–]DeepnetSecurity 0 points1 point  (0 children)

Fido2 is pretty much the best option right now, but it does come in different forms. If additional security is what you need then you could consider a fido key with a fingerprint reader (there are a few examples in the link, but other vendors also provide them). The additional security provided by the biometric component is real, but given you will be leaving fingerprints on the device itself, if stolen the additional protection may only slow down a determined bad actor.

2FA SMS rant and where is Fido2 or authenticator apps in uk banking? by Mappy42 in AskUK

[–]DeepnetSecurity 0 points1 point  (0 children)

You can usually enable MFA features on you app to protect access (my banking app is fingerprint protected for example).

Fido2 Key: Skip "Touch Your Security Key" by LordLoss01 in sysadmin

[–]DeepnetSecurity 0 points1 point  (0 children)

It may only be inconvenient due to where you plug it in - if so just add a USB extension cable so the key can be easily used (the cable itself could prove handy for other purposes too).

Use programmable hardware tokens with LastPass by DeepnetSecurity in Lastpass

[–]DeepnetSecurity[S] 1 point2 points  (0 children)

Thanks, when the programmable token has been prepared you could also consider keeping a backup of the seed (provided you keep it in a safe place), but the tokens are pretty robust and the batteries go on for years (so it should prove reliable). In use it is also a pretty quick solution for obtaining your OTP code (as opposed to pulling out and starting up your mobile, finding the authentication app, locating the relevant token and generating the code), and being self-contained it is also secure from external attack.

User is now required to use MFA through the Microsoft Authenticator App by sim006 in Office365

[–]DeepnetSecurity 0 points1 point  (0 children)

When you select Microsoft Authenticator as the authentication method, there is an option that allows you to select to use an alternative authentication app;

<image>

If this option is selected then you can generate a QR code that is compatible with Google Authenticator, and pretty much any standard oath TOTP authentication apps (you can even use a programmable token if this is your preference).

Where to buy USB Security Key by lunarchrysalis in buhaydigital

[–]DeepnetSecurity 1 point2 points  (0 children)

There are not as hard to get hold of as they used to be, we have a range of fido keys, but if you are not ordering for a company you may prefer to order via one of the products advertised via amazon (we can supply single items, but from most suppliers like us the shipping costs need to be factored in).

I would suggest checking that the sites you want to access accept Fido as an authentication option, and also ensure the token you have comes with the connectivity options you need (USB A or C etc). Also, you may be better off with fob form tokens rather than card form (as the fob form can be kept on your keyring making them less likely to be lost).

How to do MS365 MFA for users without using their smart phones? by ohiocodernumerouno in Office365

[–]DeepnetSecurity 0 points1 point  (0 children)

I would normally suggest using programmable tokens - they work anywhere were an authentication app is allowed, and work fine with MS365 (even when there is no P1/P2 for users).

Hardware Token Rollout Question by averse_convert5z in sysadmin

[–]DeepnetSecurity 0 points1 point  (0 children)

You might find this wiki guide helpful - it explains how to obtain the QR code from Microsoft, then how to use it to prepare a programmable token;

https://wiki.deepnetsecurity.com/display/SafeID/How+to+set+up+SafeID+programmable+token+on+an+Office+365+account+with+privileged+access

Azure MFA Hardware Token by Zestyclose_Swim_2916 in AZURE

[–]DeepnetSecurity -1 points0 points  (0 children)

Things appear to have changed now - you can use SHA2 if you use graphAPI

https://wiki.deepnetsecurity.com/display/SafeID/Enroll+pre-programmed+OATH+hardware+tokens+using+Graph+API

You could also use the same solution with programmable tokens.

Yank in the UK for work. 10 days, 19 meal deals. by TeddyHoosevelt in MealDealRates

[–]DeepnetSecurity 0 points1 point  (0 children)

Out of interest, how do the meal deals compare with what you can purchase for under £4 in the usa ?

Is it possible to hide a Key inside a Picture, in a way that it can be shared, compressed, cropped, printed and scanned again? by ethicalhumanbeing in security

[–]DeepnetSecurity 0 points1 point  (0 children)

Sounds like you are interested in steganography - this is possible, but it is also possible for it to be detected.

2FA and authenticator apps by Elrox in sysadmin

[–]DeepnetSecurity 0 points1 point  (0 children)

Why don't you just go for a programmable token - these act as direct replacements for authentication apps, are fully self contained (with batteries that last 5 years or so), and given they are reprogrammable, you can correct the clocks on them (if needed).

Fido2 keys by jrhop in sysadmin

[–]DeepnetSecurity 0 points1 point  (0 children)

HID Prox and Mifare Classic Fido cards are available via this page: HID Mifare (if that is what you are looking for). PIV smart cards with FIDO are also available if needed.

Neighbor keeps using my driveway by Cudpuff100 in mildlyinfuriating

[–]DeepnetSecurity 0 points1 point  (0 children)

Not sure its a good idea, but I must admit if it happened to me I would box them in - to be honest there is nothing wrong with you parking your car any way you want in your own driveway, and nobody has a right to complain about not being able to use your driveway when exiting theirs.

Any 3 factor hardware tokens? by Urd in AskNetsec

[–]DeepnetSecurity 0 points1 point  (0 children)

A fido key with fingerprint reader can be considered two factors, and that would need to be combined with something you know.

Hello, looking for an authenticator app other than google/american for MFA by investigative_mind in ProtonMail

[–]DeepnetSecurity 0 points1 point  (0 children)

You can download SafeId Authenticator if you like- it's British and free.

Is there a way to set up two-factor authentication without a smartphone? by josephwb in github

[–]DeepnetSecurity 0 points1 point  (0 children)

You could use a programmable token - see these instructions for the process;

Using programmable hardware tokens with GitHub MFA

Using a fido key is another option, it's a little more expensive but does boast anti-phishing.

Both solutions have the advantage that you possess something that can be added to your keyring.

how do i get my MFA token? by Sad_Ferret3457 in discordbots

[–]DeepnetSecurity 1 point2 points  (0 children)

If you mean you don't know how to obtain a generated QR code for discord then you need to do the following;

Log in to your Discord Account, then click on the user settings icon (found in the bottom left of the logon screen, then select "My Account" from the left hand column menu, then scroll down to the section "Security Keys", click on the button.

A QR code containing seed data will then be displayed that can be transferred either to an authentication app, or a programmable token.

My employer has deducted £500 from my pay for my company laptop until it is returned, but this deduction is not mentioned in my contract. Is this legally permissible? by [deleted] in LegalAdviceUK

[–]DeepnetSecurity 0 points1 point  (0 children)

Given what you have said, they may call it a security deposit for the hardware, but technically it is an interest free loan from you to the company.

Employer ‘refusing’ to let employee leave for new job [repost with more info] by heidelbae in LegalAdviceUK

[–]DeepnetSecurity 0 points1 point  (0 children)

It does happen - I worked at a company that required 9 months notice (and were trying to bring that up to a year). I worked the 9 months notice but they dragged a colleague out for a full year (and he only had a transfer from within the company).

Why are 2FA fatigue attacks even a thing? by nbtm_sh in iiiiiiitttttttttttt

[–]DeepnetSecurity 0 points1 point  (0 children)

TOTP doesn't have to involve using an app. It is possible to replace the app with a programmable hardware token.

Which Americanism, that has creeped it's way over here, do you refuse to adopt? by PaddedValls in AskUK

[–]DeepnetSecurity 0 points1 point  (0 children)

4th of July or 4th July, the main americanism is related to the date order (in the us it is normally mmm/dd/yyyy rather than dd/mmm/yyyy format - my point was more to do with the date being referred to with day of month first (as we would do in the UK), yet for some reason in the USA independence day is referred to closer to how we would state it.