Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Define an account recovery policy #16

Open
KellerFuchs opened this issue Feb 19, 2016 · 8 comments
Open

Define an account recovery policy #16

KellerFuchs opened this issue Feb 19, 2016 · 8 comments

Comments

@KellerFuchs
Copy link
Member

We don't have any agreed-upon policy about how we handle users wanting to recover their account.

@RyanSquared
Copy link
Member

From IRC, there was a solution discussed about managing this via GitHub; should we stick with that or provide a different solution? Also, if we do stick with GitHub, how can we prove a user is who they say they are.

@KellerFuchs
Copy link
Member Author

AFAIK, there is no concrete proposal (using Github or otherwise).

@RyanSquared
Copy link
Member

Just to boop this, so far I think the best way to do this is to provide a GitHub or Twitter username that can be used when registering a user. Thoughts?

@KellerFuchs
Copy link
Member Author

@RyanSquared Github only, as we can easily pull SSH keys from a Github account.
(Though in principle, we could find GPG keys associated with a Twitter account using keybase or somesuch, and get authentication subkeys, but that might be hard to use for most people)

@RyanSquared
Copy link
Member

(Though in principle, we could find GPG keys associated with a Twitter account using keybase or somesuch, and get authentication subkeys, but that might be hard to use for most people)

That implies that Twitter would be insecure for transferring the data. Is there any reason to trust GitHub and not trust Twitter?

@KellerFuchs
Copy link
Member Author

  1. Github is currently “trusted”, in the sense that they could serve bad content during the build of the LDAP container and use that vector to compromise our infra, though there is an issue about enforcing signatures
  2. This wasn't at all about trustworthyness or security, but about the usability of the scheme: we can easily fetch keys associated to a Github account.

@RyanSquared
Copy link
Member

Oh, alright, my bad. I don't suppose there's anyone who doesn't have a GitHub anyways, so at this point I'm probably all for going GitHub for verification. However, a new question comes up: how do we store it?

@KellerFuchs
Copy link
Member Author

We have users who don't have a Github account, yes.

The easiest would be to make it an LDAP attribute (or in the data object, for userdb).

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants