-
-
Notifications
You must be signed in to change notification settings - Fork 13
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update idp error detection #156
Conversation
Should not only fix error detection on login, but prevent people from killing their 2FA account. Can't test changes, as I don't have an ZIH account anymore.
Thanks for the very quick workaround. Will release now. @A-K-O-R-A @t0mbrn can you confirm that this works with your ZIH account? |
Sure, could you give me any specific scenarios / configuration combinations that should be tested? I don't use the feature so I'm not familiar with the problem this PR solves 😅 |
A friend of mine just today faced the issue that when he changed his 2FA Token TUFast still used the old one and spammend the system with retries causing it to block the account login. I think it's trying to address this but it's just a guess. I'm currently only using safari so I'm not using the tufast login either 😅 |
Thanks for responding so quickly. Yes, that is the issue that was reported by ZIH (that's why it is quite urgent.) Apparently student accounts got locked. I think it's hard to test this then. @C0ntroller can it be an issue that the token is not properly set it TUfast? |
My friend encountered it when he setup a new 2FA token in iCloud Keychain invalidating the one present in TUFast. |
Could be. Can't access self service anymore to see, if the scraping fails.
But that is exactly how to break it. Manually provide wrong key in the TUfast settings or reset the 2FA token (so revisit self service) on a different device, so the TUfast one is revoked.
Thats what the PR shoudl have fixed: if an error is shown (so you inserted a wrong key), TUfast will not try it again. The prior check was probably broken by redesign.
@A-K-O-R-A Scenario would be trying to login with an invalid but set 2FA token. |
I have not yet been able to test the change yet, but I seems like this could happen again if the IDP website changes. Could a persistent retry counter (using the chrome storage for example) in the |
Not trivially. I guess there is a browser api function for timers to reset it after eg. 10 minutes. But that would not be a minor change anymore, and I don't really have the time. |
My suggestion would be something similar to the following: This way an infinite retry loop would be prevented, I feel like there is no real world use case where a user would attempt 3 consequent successful logins in under 30s, so this should not hinder the normal user interactions If you think this could be a viable solution then I could implement this myself and open a PR |
Just tested it and it works for me, the extension stops after the "Verification failed" banner is shown 👍 |
I got a mail from ZIH saying thanks that we deployed the fix so quickly and they were pretty happy. |
Should not only fix error detection on login, but prevent people from killing their 2FA account.
Can't test changes, as I don't have an ZIH account anymore.