Fork me on GitHub

Security

Security

Unlike in the golden era of BBSing, modern Internet-connected systems are prone to hacking attempts, eavesdropping, etc. While plain-text passwords, insecure data over Plain Old Telephone Service (POTS), and so on was good enough then, modern systems must employ protections against attacks. ENiGMA½ comes with many security features that help keep the system and your users secure — not limited to:

Two-Factor Authentication via One-Time Password

Enabling Two-Factor Authentication via One-Time-Password (2FA/OTP) on an account adds an extra layer of security (“something a user has”) in addition to their password (“something a user knows”). Providing 2FA/OTP to your users has some prerequisites:

  • A configured email gateway such that the system can send out emails.
  • One or more secure servers enabled such as SSH or secure WebSockets (that is, WebSockets over a secure connection such as TLS).
  • The web server enabled and exposed over TLS (HTTPS).

:information_source: For WebSockets and the web server, ENiGMA½ may listen on insecure channels if behind a secure web proxy.

User Registration Flow

Due to the nature of 2FA/OTP, even if enabled on your system, users must opt-in and enable this feature on their account. Users must also have a valid email address such that a registration link can be sent to them. To opt-in, users must enable the option, which will cause the system to email them a registration link. Following the link provides the following:

  1. A secret for manual entry into a OTP device.
  2. If applicable, a scannable QR code for easy device entry (e.g. Google Authenticator)
  3. A confirmation prompt in which the user must enter a OTP code. If entered correctly, this validates everything is set up properly and 2FA/OTP will be enabled for the account. Backup codes will also be provided at this time. Future logins will now prompt the user for their OTP after they enter their standard password.

:warning: Serving 2FA/OTP registration links over insecure (HTTP) can expose secrets intended for the user and is highly discouraged!

:memo: +ops can also manually enable or disable 2FA/OTP for a user using oputil, but this is generally discouraged.

Recovery

In the situation that a user loses their 2FA/OTP device (such as a lost phone with Google Auth), there are some options:

  • Utilize one of their backup codes.
  • Contact the SysOp.

:warning: There is no way for a user to disable 2FA/OTP without first fully logging in! This is by design as a security measure.

ACS Checks

Various places throughout the system that implement ACS can make 2FA specific checks:

  • AR#: Current users required authentication factor. AR2 for example means 2FA/OTP is required for this user.
  • AF#: Current users active authentication factor. AF2 means the user is authenticated with some sort of 2FA (such as One-Time-Password).

See ACS for more information.

Example

The following example illustrates using an AR ACS check to require applicable users to go through an additional 2FA/OTP process during login:

login: {
    art: USERLOG
    next: [
        {
            //  users with AR2+ must first pass 2FA/OTP
            acs: AR2
            next: loginTwoFactorAuthOTP
        }
        {
            //  everyone else skips ahead
            next: fullLoginSequenceLoginArt
        }
    ]
    // ...
}