TE
科技回声
首页24小时热榜最新最佳问答展示工作
GitHubTwitter
首页

科技回声

基于 Next.js 构建的科技新闻平台,提供全球科技新闻和讨论内容。

GitHubTwitter

首页

首页最新最佳问答展示工作

资源链接

HackerNews API原版 HackerNewsNext.js

© 2025 科技回声. 版权所有。

Ask HN: Fastmail 2fa via Google Authenticator useless?

8 点作者 outerspace将近 8 年前
Fastmail supports 2fa via Google Authenticator (and alike). However, according to their documentation:<p>&quot;Before you can enable two-step verification, you must add a recovery phone to your account. This is to prevent you from being locked out of your account should you ever lose access to your main verification device. You get a code sent to your phone instead to complete your second step when you log in.&quot;<p>Doesn&#x27;t this defeat the purpose of having Google Authenticator (or any other 2fa app)? If I understand this correctly, they seem to be switching back to SMS 2fa if the authenticator fails.

6 条评论

nmjenkins将近 8 年前
(I designed the FastMail 2FA system)<p>Short answer to your question: no.<p>We are concerned with both keeping other people out of your account <i>and</i> making sure you still have access to your account.<p>For most users, the risk of losing their authenticator token or security device and so getting locked out of their own account is greater than the risk of someone hijacking their phone number. This is why we require you to add a recovery phone first.<p>It&#x27;s very important to note that if you have 2FA enabled at FastMail we always require two factors to access or recover your account. Hijacking your phone is not enough: the attacker would still need to have also stolen your password. And hijacking your phone number is a very visible move, which you will quickly notice. In the highly public cases we&#x27;ve seen of this kind of attack over the last few years, I believe in every one the attacker has <i>not</i> had the password, and has only succeeded because they could gain access to the account with SMS alone.<p>For advanced users you can <i>remove</i> the recovery phone at FastMail after setting up 2FA. If you do this, I strongly recommend you write down your recovery code and store this somewhere safe and set up at least two different authentication mechanisms.
troydavis将近 8 年前
It&#x27;s not just FastMail. Most other 2FA-enabled sites (including Google) offer and recommend providing a phone number as a delivery method for a onetime code.<p>The 2nd factor is only as secure as to the weakest delivery method, though, so defining a phone number does make that factor subject to porting and SS7 attacks. Most sites offered text message backup codes before those attacks had been seen in the wild, but they&#x27;re probably also stuck with a lot of users who didn&#x27;t write down their recovery codes.<p>There&#x27;s no good recovery option with a large userbase. The closest is Delegated Recovery (<a href="https:&#x2F;&#x2F;m.facebook.com&#x2F;notes&#x2F;protect-the-graph&#x2F;improving-account-security-with-delegated-recovery&#x2F;1833022090271267&#x2F;" rel="nofollow">https:&#x2F;&#x2F;m.facebook.com&#x2F;notes&#x2F;protect-the-graph&#x2F;improving-acc...</a>) but GitHub and Facebook are among the few, if not the only, implementors. Without that, eventually someone will lose or break their phone, realize Authenticator TOTP keys weren&#x27;t in backups, realize they ignored the instructions to save the backups, and go to support.<p>As long as you actually do print and securely store the backup codes, I think there&#x27;s a good argument for not giving your phone number as a backup method.
md_将近 8 年前
One point not mentioned by others here:<p>In the case where recovery entails a required password change and the site imposes some password history--the common case, though I don&#x27;t know if this is true of Fastmail--the real account holder is guaranteed to notice if a recovery event happens, whereas ordinary password+SMS-interception may not be noticed.<p>So, yes, for the most part this is as weak as SMS second-factor--but it&#x27;s less likely to go undiscovered by the real user.
alltakendamned将近 8 年前
Not really in my opinion, the threat model becomes different.<p>2 factor authentication is used to avoid attacks when your credentials&#x2F;password are lost&#x2F;leaked&#x2F;stolen. Many people reuse their password or have a weak password. Having 2FA enabled also improves protection against brute force attacks It does not take into account the threat of having your phone stolen or an SMS intercepted.<p>So as an attacker, you still need the login&#x2F;password&#x2F;phone combination to authenticate. The phone can be replaced by an intercepted SMS, while it has been shown it can be done, I wouldn&#x27;t call it easy. There is no way to update the phone number while not authenticated and Fastmail requires a second password confirmation before updating anything in password settings.<p>When you lose the password, now the attacker needs the phone or needs to intercept an SMS. When you lose the phone, the attacker still needs to bypass the lock screen and know the username&#x2F;password of the Fastmail account.<p>What would you suggest to improve this? Recovery via email is no good as email can be intercepted as easy as SMS and a phone call is no good as that can be social engineered.<p>It&#x27;s pretty much OK in my book, you simply shouldn&#x27;t think that 2FA means there&#x27;s zero risk.
guillaume8375将近 8 年前
It’s true you must give Fastmail a phone number to set up 2FA, but you can erase the phone number once 2FA is in place.
mtgx将近 8 年前
It does.