6-digit Code Generated By Your Authentication App

0 views
Skip to first unread message

Lu Rounsaville

unread,
Aug 5, 2024, 5:52:13 AM8/5/24
to scheeprichselo
Ilost 5 grand this morning because I couldn't log In to get to my bank app because it asked for 6 digits not 8. Now everything is asking for 6. And authenticator. Is only showing 8. How the hell can I abolish this stupid thing so nothing needs more authenticating then password? Remember the good ole days when that wad more than enough. All this dows is prevent you from being able to secure your own property.

I lost 8 grand this morning because I couldn't log In to get to my bank app because it asked for 6 digits not 8. Now everything is asking for 6. And authenticator. Is only showing 8. How the hell can I abolish this stupid thing so nothing needs more authenticating then password? All this dows is to prevent you from being able to secure your own property.


Dearest Chris Armstrong, THANK YOU so much!!! Had been lost for hours on this one, tried several apparent solutions offered online but no-one worked. Then, right before reaching the top total frustration level, I was so lucky to find your solution: the ONLY ONE which worked. God bless you!! Very best regards


This is how it worked for me. I use the MFA for logging in to AWS console. After my phone reset, the code that Authenticator showed were always 8 digits instead of the 6 digits the AWS console was requesting. I followed the steps mentioned by Chris Armstrong (Oct 28, 2022, 3:56 PM), but only it helped to create a new account that did provide 6 digit token, but never was in sync with AWS. Even after I tried resync in AWS with 2 tokens, it did not help.


Finally, I logged into to AWS through alternate options like email code + phone call verification, and once inside, I removed the existing MFA option and created a new one. Open the MFA app and scanned the new QR code. Now this new option is setup, and works.


Summary: Once you reset your phone or get a new phone, the authenticator is not in sync with AWS. So you have to get inside AWS through other alternate options and remove the existing MFA option and create a brand new one, and use your newly installed Authenticator app to scan and setup the new account.


The security and strength of this algorithm depend on the properties

of the underlying building block HOTP, which is a construction based

on HMAC [RFC2104] using SHA-1 as the hash function.


The conclusion of the security analysis detailed in [RFC4226] is

that, for all practical purposes, the outputs of the dynamic

truncation on distinct inputs are uniformly and independently

distributed strings.


We RECOMMEND following the recommendations in [RFC4086] for all

pseudorandom and random number generations. The pseudorandom numbers

used for generating the keys SHOULD successfully pass the randomness

test specified in [CN], or a similar well-recognized test.


We also RECOMMEND storing the keys securely in the validation system,

and, more specifically, encrypting them using tamper-resistant

hardware encryption and exposing them only when required: for

example, the key is decrypted when needed to verify an OTP value, and

re-encrypted immediately to limit exposure in the RAM to a short

period of time.


The key store MUST be in a secure area, to avoid, as much as

possible, direct attack on the validation system and secrets

database. Particularly, access to the key material should be limited

to programs and processes required by the validation system only.


An OTP generated within the same time step will be the same. When an

OTP is received at a validation system, it doesn't know a client's

exact timestamp when an OTP was generated. The validation system may

typically use the timestamp when an OTP is received for OTP

comparison. Due to network latency, the gap (as measured by T, that

is, the number of time steps since T0) between the time that the OTP

was generated and the time that the OTP arrives at the receiving

system may be large. The receiving time at the validation system and

the actual OTP generation may not fall within the same time-step

window that produced the same OTP. When an OTP is generated at the

end of a time-step window, the receiving time most likely falls into

the next time-step window. A validation system SHOULD typically set

a policy for an acceptable OTP transmission delay window for

validation. The validation system should compare OTPs not only with

the receiving timestamp but also the past timestamps that are within

the transmission delay. A larger acceptable delay window would

expose a larger window for attacks. We RECOMMEND that at most one

time step is allowed as the network delay.


The time-step size has an impact on both security and usability. A

larger time-step size means a larger validity window for an OTP to be

accepted by a validation system. There are implications for using a

larger time-step size, as follows:


First, a larger time-step size exposes a larger window to attack.

When an OTP is generated and exposed to a third party before it is

consumed, the third party can consume the OTP within the time-step

window.


I need to know what to do. Like how do take off passwordless authenticator. I finally through my phone into a brick wall becuase of how much money im losing is making me sick. Figured a new phone it will go away and start fresh vn such luck. I tried getting fourvother authenticator apps and they do give gve only 6 digits but it says they arent the correct codes. Im having a fucking melt down becuasr its its been months now i cant access my damn bank. I just need step by step intsructions for dummys. I have an android. A galaxy A53


Multi-factor authentication (also known as MFA, two-step verification, two factor authentication, or 2FA) is a highly recommended security feature that adds an extra layer of protection to your Dropbox account. Enabling multi-factor authentication means that Dropbox will require a six-digit security code (in addition to your password) when you log in to your account or link a new computer, phone, or tablet.


If you choose to receive your security codes by text message, you need a phone capable of receiving text messages (carrier rates may apply). A text message containing a security code will be sent to your phone each time you log in to Dropbox.


After enabling multi-factor authentication, consider adding a backup phone that can receive text messages as well. If you ever lose your primary phone, or can't use your authenticator app, you can send a security code to your backup phone number instead.


You can use a security key for multi-factor authentication, rather than a six-digit security code. A security key is a small USB, Bluetooth, or Near Field Communication (NFC) device that follows one of the open standards:


Currently, security keys are only supported on select devices and browsers, so you must first set up multi-factor authentication for your Dropbox account and select to receive codes via SMS messages or a mobile app. This step ensures that you have a backup method, in case a device doesn't support your security key.


Note: There are different ways to activate security keys. Your key may require a tap or button press to activate registration. If you're having difficulty completing security key registration, verify that your security key is U2F or WebAuthn capable. You can also refer to the manufacturer instructions specific to your device.


When 2-factor authentication is enabled, login you will need to enter a 6-digit verification code from your authenticator app in order to log in. This extra layer of security is set up by the user, not Wellfound. You can find more information about setting up 2-factor authentication here.


You will need to use open the authenticator app (such as Google Authenticator, Authy, or Duo) that you used when setting up the 2-factor authentication. Open the authenticator app and look for the code associated with your Wellfound login. These codes are only valid for a short time before the new code is generated.


Please search your phone for "authenticator" to see whether any authenticator apps exist in your phone. The app you used to enable 2-factor authentication for Wellfound should list Wellfound along with a time-sensitive code.


If you can't find the app on your phone, look for the backup codes that were generated when you enabled 2-factor authentication. These are typically text files with clear names such as "angellist_two_factor_recovery_codes." They will typically be on the device you used in order to enable 2-factor authentication.


If the app is not working, or you are unable to find the code, look for the backup codes that were generated when you enabled 2-step authentication. These are typically text files with clear names such as "angellist_two_factor_recovery_codes." They will typically be on the device you used in order to enable 2-step authentication.


Note: If you add a security key for additional two-factor authentication protection, we no longer require using another backup method for more protection. Security keys can be used as your sole authentication method, without any other methods turned on.


When you log in to your account on twitter.com or on another device using X for iOS, X for Android, or mobile.twitter.com, a push notification may be sent to your phone. Open the push notification to approve the login request. Once you approve, you will be immediately logged in to your account on twitter.com.


You may also receive a login code via SMS text message. You can opt into this by clicking request a code sent to your phone via text message when you log in to your account on twitter.com.




Note: You can also approve or deny your login requests from within the app by tapping Security, then tapping Login Requests. Pull down on the list to refresh for new requests. Requests will appear on this screen even if you did not receive a push notification.

3a8082e126
Reply all
Reply to author
Forward
0 new messages