Skip to content

Commit

Permalink
Update the README
Browse files Browse the repository at this point in the history
  • Loading branch information
breard-r committed Aug 1, 2023
1 parent 695e245 commit 1b9b5b5
Showing 1 changed file with 2 additions and 4 deletions.
6 changes: 2 additions & 4 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -92,7 +92,7 @@ The code generation protocol is based on the HMAC-SHA-256 function. The hasher i

This hash is then reduced to 5 bytes using the following dynamic offset truncation method. From the last byte of the hash, we take the last 4 bits, which gives an offset between 0 and 15. We then take the 5 bytes of the hash located at this offset.

The code is then generated by encoding those 5 bytes using base32 without padding.
The code is then generated by encoding those 5 bytes using base32 ([RFC 4648](https://datatracker.ietf.org/doc/html/rfc4648)) without padding.


## Frequently Asked Questions
Expand All @@ -111,8 +111,6 @@ The local part can either be a real mailbox or an alias. It is up to you to deci

No, this project is based on the filter API used by OpenSMTPD.

However, if someone implemented it in the exact same way for any other MTA, the progressive web app should work.

### Does it supports IDN?

Yes, internationalized domain names (IDN) are supported. You can specify domain names either using valid UTF-8 or Punycode ([RFC 3492](https://datatracker.ietf.org/doc/html/rfc3492)).
Expand All @@ -127,7 +125,7 @@ That said, you can add a new local part that uses a new key and stop using the p

No, it is not.

Efforts have been made so it is almost impossible to use one or several known valid addresses to create new addresses or recover the key. However, it may not be considered cryptographically secure.
Efforts have been made so it is almost impossible to use one or several known valid addresses to create new addresses or recover the key. However, it may not be considered cryptographically secure because of code's short length (5 bytes).

### Can you detail the efforts made to get a mostly secure code?

Expand Down

0 comments on commit 1b9b5b5

Please sign in to comment.