hessen.social ist einer von vielen unabhängigen Mastodon-Servern, mit dem du dich im Fediverse beteiligen kannst.
hessen.social ist die Mastodongemeinschaft für alle Hessen:innen und alle, die sich Hessen verbunden fühlen

Serverstatistik:

1,6 Tsd.
aktive Profile

#CyberSecurity and #InfoSec people, what speaks against using #TOTP (aka. Google Authenticator & co.) for everything?

It annoys me that every financial institution wants me to install their proprietary app while we already have standards for #2FA. Why can't I approve a transaction with my existing authenticator?

@fell I asked my bank and they told me they cannot do TOTP because it was not a legal 2FA in banking?

@kaia Is that the reason? If they deem TOTP not secure enough (I do), then they should draft a better standard.

Or at the very least let me use a hardware authenticator. My main bank does that, but another (much younger) does not.

@fell @kaia

In EU with PSD2, two factor auth from the bank needs to also show you what action you are approving.

@didek @fell
That's right, it's because of the requirements imposed by European regulation . There doesn't exist any standard for allowing for displaying transaction information in a secure way on the authenticator. No, not even solves this! (It used to, with 1, but that part of the spec was never implemented by browsers, so abandoned in Webauthn 2.) @kaia

Caroline

@didek @fell
Securely displaying transaction information on the authenticator protects against malware: When you are about to transfer money, a man-in-the-browser malware could change the recipient account and amount, but manipulate what you see in your online banking session, so you won't see it. If you approve this transaction with a standard authenticator, you have no chance to detect the attack.
@kaia

@Caroline @didek @kaia That's actually a valid point. I hope a good standard for this will emerge eventually.

@fell
I am not overly familiar with #PSD2 but there is an open standard for verifying arbitrary data in a challenge-response procedure based on a shared secret (like TOTP) called OCRA: rfc-editor.org/rfc/rfc6287
@Caroline @didek @kaia

www.rfc-editor.orgRFC 6287: OCRA: OATH Challenge-Response Algorithm