-
-
Notifications
You must be signed in to change notification settings - Fork 410
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add TOTP Authorization to moonraker auth. algo #844
Conversation
Sorry, git system is new for me... |
Thanks. At this time I don't think support for 2FA is a good candidate for this repo. Moonraker is not intended to run facing the wan directly. It may be something I consider in the future, but I think I would prefer adding support for OAuth and allowing the provider to handle 2FA. If you need to add additional security and cannot use a VPN I would recommend looking into authentication options provided by reverse proxies, etc. |
We can't use VPN in many countries, such as Russia (if you don't have licence), if we don't want to have problems with law (I had this problems by local WireGuard). |
P.S. Localhost is not secure enough too, as lots of people use phone number as wifi pass. Also, MGTS provider sets routers with default pass MGTS98765 and without possiblility to change this password. As I think, 2FA additional secure layer will be better and simpler way, than using LDAP. |
I understand. This is why I suggested using a reverse proxy to provide additional authentication if you want expose Moonraker to the wan.
At this time I don't think 2FA adds significant value to Moonraker. Moonraker is not intended to run directly facing the wan. The overwhelming majority of users will not want to enable 2FA on their local installation, in fact the majority do not even have user authentication enabled. I have not reviewed your submission in detail, however a cursory glance indicates that it would need significant refactoring before its eligible for merging. The contribution guidelines need to be followed before I provide a detailed review. In addition, I think it may be possible to add OpenID/OAuth support which would accomplish a similar goal, with the bonus of allowing users to log in with existing accounts.
Users who don't secure their local network and/or routers would be unlikely to enable user authentication, much less two factor authentication. They would have larger problems than an open instance of Moonraker.
LDAP is already integrated and well tested. |
Thanks for answer. |
#842