Page MenuHomePhabricator

Add a rate limit for enroll attempts when adding new MFA configurations
ClosedPublic

Authored by epriestley on Jan 23 2019, 3:29 PM.
Tags
None
Referenced Files
F15413339: D20019.id47791.diff
Wed, Mar 19, 6:09 PM
F15391824: D20019.id47791.diff
Sat, Mar 15, 11:49 AM
F15378583: D20019.diff
Thu, Mar 13, 3:28 PM
Unknown Object (File)
Feb 13 2025, 8:59 PM
Unknown Object (File)
Feb 13 2025, 8:59 PM
Unknown Object (File)
Feb 13 2025, 8:59 PM
Unknown Object (File)
Feb 9 2025, 6:59 AM
Unknown Object (File)
Feb 9 2025, 6:59 AM
Subscribers
None

Details

Summary

Depends on D20018. Ref T13222. When you add a new MFA configuration, you can technically (?) guess your way through it with brute force. It's not clear why this would ever really be useful (if an attacker can get here and wants to add TOTP, they can just add TOTP!) but it's probably bad, so don't let users do it.

This limit is fairly generous because I don't think this actually part of any real attack, at least today with factors we're considering.

Test Plan
  • Added TOTP, guessed wrong a ton of times, got rate limited.
  • Added TOTP, guessed right, got a TOTP factor configuration added to my account.

Diff Detail

Repository
rP Phabricator
Branch
mfa14
Lint
Lint Passed
Unit
Tests Passed
Build Status
Buildable 21644
Build 29515: Run Core Tests
Build 29514: arc lint + arc unit