Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[meta] Two Factor #2227

Closed
7 of 8 tasks
whyrusleeping opened this issue Jan 21, 2016 · 13 comments
Closed
7 of 8 tasks

[meta] Two Factor #2227

whyrusleeping opened this issue Jan 21, 2016 · 13 comments

Comments

@whyrusleeping
Copy link
Member

I'm going to start enforcing that people with direct write access to go-ipfs have two factor auth enabled. The following people have write access currently, but have two factor disabled:

@ghost
Copy link

ghost commented Jan 21, 2016

let's do it -- get your yubikeys ready!

@hackergrrl
Copy link
Contributor

hackergrrl commented Jan 21, 2016 via email

@jbenet
Copy link
Member

jbenet commented Jan 24, 2016

And my Axe

@jbenet
Copy link
Member

jbenet commented Jan 24, 2016

You guys ought to add 2-FA, but if you do not want to, let us know and we'll remove write access to go-ipfs for the time being.

@dignifiedquire
Copy link
Member

any reason this is limited to go-ipfs? I suggest enforcing this for write access for all repos on ipfs

@mildred
Copy link
Contributor

mildred commented Jan 25, 2016

I won't do it. I won't give any mobile telephone number to GitHub and won't depend anything too complicated or risking locking me out. My cookies are killed every day and I want to be able to log in fast. Please remove my commit access.

@Kubuxu
Copy link
Member

Kubuxu commented Jan 25, 2016

@mildred buy yourself a Yubikey. Model 4 Nano is awesome.

@mildred
Copy link
Contributor

mildred commented Jan 25, 2016

I don't really trust those devices to keep my keys for me. I want to be able to keep a backup them somewhere safe at home, and these devices are write only, designed to prevent copying of the keys.

I thought a lot about it this morning and found I could use TOTP. There is a command line program that provides this functionality, and I can store the password, protected by a GPG, and backup it to my liking.

@RichardLitt
Copy link
Member

bow

@whyrusleeping
Copy link
Member Author

@lgierth cmon man! you have a yubikey now!

@ghost
Copy link

ghost commented Feb 1, 2016

Got it set up now! The setup instructions with Android app and all that where a bit discouraging (no Play Store on my phone) but with the SMS path is was simple, yay.

@tv42
Copy link
Contributor

tv42 commented Feb 1, 2016

I'm not at all convinced all these secondary routes are much safer than my password was, and this changes nothing about SSH access, but hey, this seems like a popular thing..

@RichardLitt
Copy link
Member

Who is in charge of ipfsbot?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

8 participants