2FA in lemmy doesn’t work reliably yet. Please don’t enable it or you will almost certainly get locked out.
Note: it makes me sad to post this.
ouch, you know its bad when a infosec Admin asks you to switch off 2fa…
Ahaha I had this exact same experience. Locked out because bitwarden didn’t get the code correctly. “Luckily” the jwt token never expires so I was able to log back in without the 2FA.
The 2FA process itself - both initial setup and use with an OTP provider - has worked consistently for me so far. The instruction in the interface is misleading and I’m not the only one who locked himself out as a result. The Mastodon devs merged my pull request to clarify the instruction (including my mistake of saying “oauth” instead of “otpauth”) astonishingly quickly.
If I may be constructively critical, we should expect to provide provide at least some minimal evidence to justify claims such as one that something doesn’t work, even if only as a link to discussion or evidence. This expectation increases when it’s accompanied by advice or instruction, especially when such advice is counter to advice which is generally accepted as “good”.
As @qwet@lemm.ee mentions, a more serious problem of password reset via email disabling 2FA offers a workaround for now in at least some cases.
I wonder if a different implementation of 2FA will come about from this…
They should look towards Mastodon, their TOTP implementation is flawless.
Once it does work, will it allow apps like authy or will I have to wait till I get a phone number?
You really don’t have a phone number? If so maybe you can try this https://voice.google.com/u/0/calls
Some of us care about privacy and don’t want to give out our numbers willy nilly
That isn’t why for me. I’m broke and unless you actively work to remove your number from databases and whatever… that kind of privacy is an illusion.
“…Also, we’re having some issues with your passwords so please everyone just post those here along with social security numbers if you’re American, thanks!”
I have never in my life seen a more concise demonstration of the adage, “without a threat model there can be no security, only paranoia”