Page MenuHomePhabricator
Feed Advanced Search

Jan 18 2019

epriestley triaged T13237: Stripping MFA configs with `bin/auth strip` should disable, not delete, the factor configurations as Low priority.
Jan 18 2019, 3:50 PM · Auth
epriestley created T13237: Stripping MFA configs with `bin/auth strip` should disable, not delete, the factor configurations.
Jan 18 2019, 3:47 PM · Auth

Jan 7 2019

aleb added a comment to T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019.

There is a Migrate from Google+ Sign-In howto for web apps.

Jan 7 2019, 9:05 AM · Auth

Jan 5 2019

epriestley added a comment to T13123: Plans: Improve SSH key parsing and handling.

The other component of that report is that there are 32,768 low-entropy "2048-bit" RSA keys which Debian systems generated until ~2008:

Jan 5 2019, 4:08 AM · Plans, Auth
epriestley added a comment to T13123: Plans: Improve SSH key parsing and handling.

See https://hackerone.com/reports/474897, which suggests that ssh-keygen -l ... ("Show fingerprint of specified public key file.") is probably a pretty good starting point for ssh --is-this-a-valid-public-key:

Jan 5 2019, 3:50 AM · Plans, Auth

Jan 3 2019

epriestley added a comment to T5591: Add default domain to Google auth.

Since T13227 has an actual realtime deadline, that's probably a good time to take care of this, too.

Jan 3 2019, 7:25 PM · Restricted Project, Restricted Project, Auth
epriestley moved T5591: Add default domain to Google auth from Backlog to Next on the Auth board.
Jan 3 2019, 7:25 PM · Restricted Project, Restricted Project, Auth
epriestley moved T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019 from Backlog to Next on the Auth board.
Jan 3 2019, 7:24 PM · Auth
epriestley moved T13231: Duo MFA Support from Backlog to Next on the Auth board.
Jan 3 2019, 7:24 PM · Auth
epriestley closed T4256: Support Azure as an auth provider as Wontfix.

This can be implemented as a third-party extension. We're unlikely to ever pursue it upstream without customer interest.

Jan 3 2019, 7:23 PM · Auth
epriestley merged task T1205: Allow grey users in some form or other into T12738: Nuance: As a Helpdesk, for Phabricator/Phacility support.
Jan 3 2019, 7:22 PM · Restricted Project, People, Auth, Wikimedia
epriestley added a comment to T1205: Allow grey users in some form or other.

I'm going to merge this into T12738. Although that task primarily discusses Nuance as a Phacility support tool and we ended up building a standalone Support tool instead, I generally believe Nuance is the most likely pathway for interactions falling under the general "helpdesk" umbrella.

Jan 3 2019, 7:22 PM · Restricted Project, People, Auth, Wikimedia
epriestley merged task T5504: Figure out how to render external accounts in the UI into T12738: Nuance: As a Helpdesk, for Phabricator/Phacility support.
Jan 3 2019, 7:21 PM · Restricted Project, Auth
epriestley added a comment to T5504: Figure out how to render external accounts in the UI.

I'm going to merge this into T12738. Although that task primarily discusses Nuance as a Phacility support tool and we ended up building a standalone Support tool instead, I generally believe Nuance is the most likely pathway for interactions falling under the general "helpdesk" umbrella.

Jan 3 2019, 7:21 PM · Restricted Project, Auth
epriestley merged task T4310: Allow external users to establish real sessions into T12738: Nuance: As a Helpdesk, for Phabricator/Phacility support.
Jan 3 2019, 7:18 PM · Auth
epriestley added a comment to T4310: Allow external users to establish real sessions.

I'm going to merge this into T12738. Although that task primarily discusses Nuance as a Phacility support tool and we ended up building a standalone Support tool instead, I generally believe Nuance is the most likely pathway for interactions falling under the general "helpdesk" umbrella. That is, the future for these use cases mostly looks like "lightweight/external users interact with Nuance, then staff triage issues into other objects like Tasks that only real users interact with", not "lightweight/external users interact with every application and every application gains support for email/external/grey interactions".

Jan 3 2019, 7:18 PM · Auth

Jan 2 2019

epriestley added a comment to T13123: Plans: Improve SSH key parsing and handling.

See PHI500 and T13179. Recent versions of SSH support passing the key fingerprint to the AuthorizedKeysCommand by specifying it like this:

Jan 2 2019, 8:22 PM · Plans, Auth

Dec 31 2018

avivey added a comment to T13231: Duo MFA Support.

I expect Google to expose a similar solution to Duo soonish (if you use Android and try to login to Google, MFA is just like Duo now).

Dec 31 2018, 6:29 AM · Auth

Dec 29 2018

epriestley added a revision to T13231: Duo MFA Support: D19935: Add a skeleton for configurable MFA provider types.
Dec 29 2018, 1:54 AM · Auth

Dec 28 2018

epriestley triaged T13231: Duo MFA Support as Normal priority.
Dec 28 2018, 11:18 PM · Auth
epriestley renamed T8787: Add support for U2F MFA once browser implementations improve and compatible hardware is more widely available from Yubikey Multi-Factor Authentication support to Add support for U2F MFA once browser implementations improve and compatible hardware is more widely available.
Dec 28 2018, 10:02 PM · Haskell.org, Auth
adamchainz added a comment to T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019.

Yes the exact text from the announcement about the intermittent failures states:

Dec 28 2018, 6:42 PM · Auth
kristo.mario added a comment to T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019.

I received email from google announcing the deprecation few days ago. In the announcement they stated that they'll introduce intermittent failures on responses from the G+ API as soon as 01/2019.

Dec 28 2018, 5:55 PM · Auth

Dec 23 2018

epriestley added a comment to T8787: Add support for U2F MFA once browser implementations improve and compatible hardware is more widely available.

The original request focused on OTP, not U2F, but I think the amount of configuration required by OTP and the lack (?) of a pathway on mobile make it a better candidate for third-party integration than first-party integration. If we were supporting OTP in the upstream I'd want to run a first-party verification service so we aren't dependent on Yubikey's service, but the whole thing seems very messy and very bound to the Yubikey stack. It also looks (?) like Yubikey OTP and Yubikey U2F aren't linked to the same key (I think?) so you can't use U2F on one device and then fall back to OTP on mobile, even if you want to type in 44 characters? You have to enroll OTP and U2F separately.

Dec 23 2018, 1:06 AM · Haskell.org, Auth
epriestley added a comment to T8787: Add support for U2F MFA once browser implementations improve and compatible hardware is more widely available.

This browser doesn’t support the FIDO U2F standard yet.

Dec 23 2018, 12:00 AM · Haskell.org, Auth

Dec 22 2018

epriestley triaged T13227: Figure out if Google Auth needs to be updated before Google+ shutdown on March 7, 2019 as Normal priority.
Dec 22 2018, 2:36 PM · Auth

Dec 18 2018

epriestley added a revision to T13226: Consider login/session alerts, and other security alerts (for example, around MFA): D19905: Make partial sessions expire after 30 minutes, and do not extend them.
Dec 18 2018, 7:58 PM · Auth, Security
epriestley triaged T13226: Consider login/session alerts, and other security alerts (for example, around MFA) as Low priority.
Dec 18 2018, 2:20 PM · Auth, Security

Dec 17 2018

epriestley closed T9770: It is possible to use the same 2FA token more than once as Wontfix.

After the stack of changes under D19897 land:

Dec 17 2018, 10:22 PM · Security, Auth

Dec 13 2018

epriestley added a revision to T9770: It is possible to use the same 2FA token more than once: D19886: Track MFA "challenges" so we can bind challenges to sessions and support SMS and other push MFA.
Dec 13 2018, 11:44 PM · Security, Auth
epriestley added a comment to T2549: Support linking multiple external accounts from the same provider with one Phabricator account.

Sorry, yeah, I meant T6703.

Dec 13 2018, 12:48 PM · Restricted Project, Restricted Project, LDAP, Auth, OAuthServer
urzds added a comment to T2549: Support linking multiple external accounts from the same provider with one Phabricator account.

I believe that instead of T7667 you meant to write T6703.

Dec 13 2018, 11:20 AM · Restricted Project, Restricted Project, LDAP, Auth, OAuthServer

Dec 12 2018

epriestley moved T5504: Figure out how to render external accounts in the UI from Backlog to Grey Users / Nuance on the Auth board.
Dec 12 2018, 8:36 PM · Restricted Project, Auth
epriestley moved T4310: Allow external users to establish real sessions from Backlog to Grey Users / Nuance on the Auth board.
Dec 12 2018, 8:36 PM · Auth
epriestley moved T1205: Allow grey users in some form or other from Backlog to Grey Users / Nuance on the Auth board.
Dec 12 2018, 8:36 PM · Restricted Project, People, Auth, Wikimedia
epriestley moved T6115: Allow multi-factor authentication to be a requirement for user subgroups, including administrators from Backlog to MFA on the Auth board.
Dec 12 2018, 8:29 PM · Haskell.org, Auth
epriestley moved T4184: API does not contain user.create from Backlog to Far Future on the Auth board.
Dec 12 2018, 8:28 PM · Restricted Project, FreeBSD, Auth, Conduit
epriestley merged T6117: The login screen is pretty confusing when you have LDAP and Username/Password enabled into T11514: Authentication should have a way to customize the credentials name.
Dec 12 2018, 8:27 PM · Auth, LDAP, Feature Request
epriestley merged task T6117: The login screen is pretty confusing when you have LDAP and Username/Password enabled into T11514: Authentication should have a way to customize the credentials name.
Dec 12 2018, 8:27 PM · Auth
epriestley moved T6549: Backup codes for multi-factor authentication from Backlog to MFA on the Auth board.
Dec 12 2018, 8:26 PM · Restricted Project, Auth
epriestley moved T8787: Add support for U2F MFA once browser implementations improve and compatible hardware is more widely available from Backlog to MFA on the Auth board.
Dec 12 2018, 8:26 PM · Haskell.org, Auth
epriestley moved T4279: Improve auth/LDAP import tools to assist in linking/merging accounts and migrations across providers from Backlog to LDAP is Special on the Auth board.
Dec 12 2018, 8:25 PM · Auth
epriestley closed T4131: Store LDAP domain as credential source for LDAP external accounts as Wontfix.

I think we're going to fix this with T7667 instead. Binding to a particular domain creates headaches if you actually move the LDAP server, and unlocked authentication creates a lot of other problems that we can't address in a similar way.

Dec 12 2018, 8:25 PM · Auth, Security
epriestley moved T4131: Store LDAP domain as credential source for LDAP external accounts from Backlog to Next on the Auth board.
Dec 12 2018, 8:24 PM · Auth, Security
epriestley closed T5210: Support GitHub Enterprise as an OAuth Provider as Wontfix.

This is conceptually easy but we have no outstanding requests from customers.

Dec 12 2018, 8:24 PM · Auth
epriestley moved T5351: Phabricator shows "Anyone can register an account" even if no registration-enabled auth providers exist from Backlog to Next on the Auth board.
Dec 12 2018, 8:23 PM · Restricted Project, Auth
epriestley closed T814: Support HTTP Basic Auth as an authentication mechanism as Wontfix.

At this point, I don't anticipate this ever coming upstream. This is probably a good candidate for third-party maintenance after T5055.

Dec 12 2018, 8:23 PM · Restricted Project, OpenStack, Auth
epriestley moved T6703: Allow multiple copies of the same auth provider type from Backlog to Next on the Auth board.
Dec 12 2018, 8:20 PM · Auth
epriestley moved T7667: Provide `auth lock` and `auth unlock` to restrict authentication provider management to the CLI from Backlog to Next on the Auth board.
Dec 12 2018, 8:19 PM · Auth, Security
epriestley moved T8029: make it possible to "approve" a user from the profile view from Backlog to Next on the Auth board.
Dec 12 2018, 8:19 PM · Auth, People
epriestley moved T8630: Prompt users when they login with an account that has changed email addresses from Backlog to Far Future on the Auth board.
Dec 12 2018, 8:18 PM · Restricted Project, Auth
epriestley moved T8907: Auto-focus first login field on login page from Backlog to Next on the Auth board.
Dec 12 2018, 8:05 PM · Auth
epriestley moved T10071: New account e-mail invites do not allow registration on auth providers that do not allow registration from Backlog to Next on the Auth board.
Dec 12 2018, 8:04 PM · Auth, Bug Report
epriestley moved T9770: It is possible to use the same 2FA token more than once from Backlog to Next on the Auth board.
Dec 12 2018, 8:03 PM · Security, Auth
epriestley moved T11514: Authentication should have a way to customize the credentials name from Backlog to Next on the Auth board.
Dec 12 2018, 8:02 PM · Auth, LDAP, Feature Request
epriestley closed T10095: provide administrators more hints to track down initial failed logins as Wontfix.

This doesn't seem to be cropping up terribly often and I think this use case is fairly weak.

Dec 12 2018, 8:01 PM · Restricted Project, Restricted Project, Auth, Feature Request
epriestley closed T10221: upgrading to ubuntu 15.10 breaks google authentication as Invalid.

Presuming something fixed this.

Dec 12 2018, 7:58 PM · Auth, Bug Report
epriestley closed T11277: Provide a generic SSH public key store for users as Wontfix.

This might happen eventually, or as a side effect of T7303, but the use case here is pretty narrow and there's currently no customer interest so I don't currently anticipate building it.

Dec 12 2018, 7:55 PM · Auth, Feature Request
epriestley closed T2549: Support linking multiple external accounts from the same provider with one Phabricator account as Wontfix.

There are two flavors of this:

Dec 12 2018, 7:53 PM · Restricted Project, Restricted Project, LDAP, Auth, OAuthServer
epriestley moved T10452: Provide more flexible management over disabling/changing ldap user accounts from Backlog to LDAP is Special on the Auth board.
Dec 12 2018, 7:46 PM · Restricted Project, LDAP, Auth, Feature Request
epriestley closed T10392: Verify that VCS Password does not match LDAP Password as Wontfix.

Password management is in good shape after T13043 , and this would now be fairly easy to implement in a general way by adding a check in PhabricatorAuthPasswordEngine->isUniquePassword().

Dec 12 2018, 7:46 PM · Auth, Feature Request
epriestley moved T4256: Support Azure as an auth provider from Far Future to Not Likely on the Auth board.
Dec 12 2018, 7:39 PM · Auth
epriestley moved T13044: SAML Support from Backlog to Not Likely on the Auth board.
Dec 12 2018, 7:39 PM · Auth

Apr 13 2018

epriestley added a comment to T13123: Plans: Improve SSH key parsing and handling.

We don't validate that private keys in Passphrase are really usable private keys.

Apr 13 2018, 2:25 PM · Plans, Auth
epriestley triaged T13123: Plans: Improve SSH key parsing and handling as Normal priority.
Apr 13 2018, 2:03 PM · Plans, Auth

Mar 14 2018

epriestley closed T9972: Profile image from Google not being picked up as Wontfix.
Mar 14 2018, 5:11 PM · Auth, Bug Report

Jan 25 2018

epriestley added a revision to T13043: Improve authentication revocation behaviors: D18929: Add test coverage for SSH key revocation.
Jan 25 2018, 2:56 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18928: Make SSH key revocation actually prevent adding the same key back.
Jan 25 2018, 2:44 PM · Phacility, Auth, Security

Jan 23 2018

epriestley closed T13043: Improve authentication revocation behaviors as Resolved.

Add a temporary token revoker.
Add a session revoker.
Add an SSH key revoker.
Add a password revoker.
Add a VCS password revoker.

Jan 23 2018, 11:43 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18916: Rename "PhabricatorPasswordHashInterface" to "PhabricatorAuthPasswordHashInterface".
Jan 23 2018, 4:12 PM · Phacility, Auth, Security
epriestley closed T4842: Log when a user's SSH keys are used and what IP accessed them as Resolved.

I believe this has been supported since D11543, in 2015. Specifically, log.ssh.format supports %k, and it appears to work as expected.

Jan 23 2018, 12:17 AM · Security, Diffusion, Auth

Jan 22 2018

epriestley added a revision to T13043: Improve authentication revocation behaviors: D18911: Document the "bin/auth revoke" tool.
Jan 22 2018, 6:15 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18910: Add "bin/auth revoke --list" to explain what can be revoked.
Jan 22 2018, 5:50 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18908: Mark all existing password hashes as "legacy" and start upgrading digest formats.
Jan 22 2018, 2:16 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18907: When administrators revoke SSH keys, don't include a "security warning" in the mail.
Jan 22 2018, 2:00 AM · Phacility, Auth, Security
epriestley updated the task description for T13043: Improve authentication revocation behaviors.
Jan 22 2018, 1:59 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18906: Add a rate limit for guessing old passwords when changing passwords.
Jan 22 2018, 1:52 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: Restricted Differential Revision.
Jan 22 2018, 1:34 AM · Phacility, Auth, Security
epriestley updated the task description for T13043: Improve authentication revocation behaviors.
Jan 22 2018, 1:20 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18904: Remove "passwordHash" and "passwordSalt" from User objects.
Jan 22 2018, 1:20 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18903: Move account passwords to shared infrastructure.
Jan 22 2018, 1:12 AM · Phacility, Auth, Security
epriestley updated the task description for T13043: Improve authentication revocation behaviors.
Jan 22 2018, 12:53 AM · Phacility, Auth, Security
epriestley updated the task description for T13043: Improve authentication revocation behaviors.
Jan 22 2018, 12:50 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18902: Bring new password validation into AuthPasswordEngine.
Jan 22 2018, 12:35 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18901: Remove "set password" from `bin/accountadmin` and let `bin/auth recover` recover anyone.
Jan 22 2018, 12:08 AM · Phacility, Auth, Security

Jan 21 2018

epriestley updated the task description for T13043: Improve authentication revocation behaviors.
Jan 21 2018, 11:16 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18900: Prepare the new AuthPassword infrastructure for storing account passwords.
Jan 21 2018, 11:15 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18899: Remove the "PhabricatorRepositoryVCSPassword" class and table.
Jan 21 2018, 4:12 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18898: Migrate VCS passwords to new shared password infrastructure.
Jan 21 2018, 4:02 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18897: Add test coverage to the PasswordEngine upgrade workflow and fix a few bugs.
Jan 21 2018, 3:44 PM · Phacility, Auth, Security
epriestley updated the task description for T13044: SAML Support.
Jan 21 2018, 3:05 PM · Auth
epriestley added a project to T13044: SAML Support: Auth.
Jan 21 2018, 2:37 PM · Auth
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18896: Consolidate password verification/revocation logic in a new PhabricatorAuthPasswordEngine.
Jan 21 2018, 3:27 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18895: Add a "--force" flag to `bin/auth revoke`.
Jan 21 2018, 1:45 AM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18894: Add a more modern object for storing password hashes.
Jan 21 2018, 1:23 AM · Phacility, Auth, Security

Jan 20 2018

epriestley added a revision to T13043: Improve authentication revocation behaviors: D18893: Add a `bin/auth revoke` revoker for SSH keys.
Jan 20 2018, 5:19 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18892: Add a `bin/auth revoke` revoker for sessions.
Jan 20 2018, 5:01 PM · Phacility, Auth, Security
epriestley added a revision to T13043: Improve authentication revocation behaviors: D18891: Add a `bin/auth revoke` revoker for temporary tokens.
Jan 20 2018, 4:57 PM · Phacility, Auth, Security
epriestley updated the task description for T13043: Improve authentication revocation behaviors.
Jan 20 2018, 4:52 PM · Phacility, Auth, Security
epriestley added a comment to T13043: Improve authentication revocation behaviors.

See D17458 for the previous, narrower case of token revocation in response to Heartbleed (T12313).

Jan 20 2018, 4:45 PM · Phacility, Auth, Security