What is 2FA, MSA, OTP, TOTP, ECT...? - Why use them?
Select messages from # through # Forum FAQ
[/[Print]\]

HeadShot Extreme -> PC & Codeing Talk

#1: No icon What is 2FA, MSA, OTP, TOTP, ECT...? - Why use them? Author: [HSX]coRpSELocation: Back of your mind!!! PostPosted: Mon Aug 23, 2021 5:37 pm
    —
For the past year or so, I have been talking to a few guys from both in [HSX], and other clans that I am friends with, about the different two-factor authentication, (2FA), and should they use them, why should they use them, and can it be implemented. After having some discussions about it, and hearing peoples concerns about needing to download a separate app on their phone/tablet, and the consensus that they rather just use email verification 2FA instead, I figured I would write this post to explain what it is, and why email 2FA is possibly the one you don't want to really use especially on site/app that has personal data, purchased items, or sensitive data. So let's hop right into this and go over some different types you will find and a little about what they are.

Before I get into this, I know some areas I am going to make it like the system is bad, but think of this, any and all 2FA is better than none, so not using one is always going to be worse than using one.

Now, before we get into 2FA, I want to point out that if you are curious if your password that you use is out there, then you may want to check out this site:
Please login to see this link
Get registered or Log in

Just type in any password you have ever used, and it will check it against a database to see if that password is found in the database.


Email 2FA:

You guys are probably most familiar with this one. You go to a site, try logging in, then it says it "emailed you with a code", then you go to your email and either copy and paste/ type that code, or sometimes, it also provides you with a 1 time use link to click. This is good because it requires you to now go to your email, login, then get the code/click the link.  

Now, why in my first paragraph I said this it probably the one you don't want to use. The reason is, with this system, you really only need to compromise one factor. The problem with email as a 2FA delivery channel is that the most common first factor, a password, can usually be reset via an email. That means that an attacker only has to compromise one factor, your email, to take over your account. This can happen if they know your email account password or if they have access to a live session (e.g. if you leave your email logged into a shared computer).

This kind of threat leaves some people in already vulnerable situations, like those with distrusting roommates or partners with access to your device, at risk. They also attack using with brute force, guessed passwords, credential stuffing, (
Please login to see this link
Get registered or Log in
), and even types of malware like keyloggers. One most common that I know all of you have seen, and probably didn't realize it, is a phishing site, (I will go into more details on that at the end).

Overall, once they have access to your email, any system that you have set up using that email is now vulnerable.


OTP (Hard & Soft) 2FA:

One time passwords, (OTP), are a popular choice for organizations looking to step up their security with two-factor authentication (2FA). These randomly generated passwords are only valid for a single login session and overcome many of the vulnerabilities of traditional passwords.

OTP soft tokens are a single use password that is sent to you either by SMS or email, where OTP hard tokens are exactly what they sound like: hardware tokens, often in the form of a key fob that can be carried on a user’s keyring. The hard token generates a random number—which expires after one use and can only be used during a specific period of time—at fixed intervals. When a user needs to log in, they simply enter the number, along with their username and optionally, a PIN or password.

Behind the scenes, the server that is authenticating the user also has a copy of the hard token’s seed record, the algorithm used to generate the numbers, and the correct time. Once validated to match, the user is permitted to access the website, application, or operating system.

Now, the drawbacks of both these options.

OTP Soft Token:


Don't take this list and show why not to use it, because in reality, every security measure will have some extent of a vulnerability.

OTP Hard Token:


TOTP Soft Token
This is another common one, especially if you use Steam and use their Steamguard 2FA, is the Time based One Time Pass, (TOTP). Using such apps like Google Authenticator, Authy, Steamguard, ect... on your tablet/phone/computer allows the system to provide a time based code that will only stay active for about 30 seconds to 1 min, before it refreshes. Basically, a user must download and install a free 2FA app on their smartphone, tablet, or desktop. They can then use the app with any site that supports this type of authentication. At sign-in, the user first enters a username and password, and then, when prompted, they enter the code shown on the app use. Like hardware tokens, the soft-token is typically valid for less than a minute. And because the code is generated and displayed on the same device, soft-tokens remove the chance of hacker interception. That’s a big concern with SMS or voice delivery methods.

Best of all, since app-based 2FA solutions are available for mobile, wearables, or desktop platforms — and even work offline — user authentication is possible just about everywhere.

Cons:




Overall, my final take on this is, 2FA is something that should be used, since most people don't use a password manager while using different unique passwords on each site they register on. Using something like email 2FA is the worst, (besides no 2FA), since like mentioned above, all they really need to do is get into your email to gain access to all your accounts that aren't secure. I understand that some of you are reluctant to install apps, or quick to blame a piece of software because you don't quite have a full understanding of what it is, but, I hope in this post, I answered some of those questions or at least, gave you a better understanding of what it is.

Here are two videos. First one is basically going over what I said above. The second video is for those that want to activate Steamguard but don't know how to.




HeadShot Extreme -> PC & Codeing Talk


output generated using printer-friendly topic mod. All times are GMT - 7 Hours

Page 1 of 1