<metaname="description"content="Security Unlike in the golden era of BBSing, modern Internet-connected systems are prone to hacking attempts, eavesdropping, etc. While plain-text passwords, insecure data over Plain Old Telephone Service (POTS), and so on was good enough then, modern systems must employ protections against attacks. ENiGMA½ comes with many security features that help keep the system and your users secure — not limited to: Passwords are never stored in plain-text, but instead are stored using Password-Based Key Derivation Function 2 (PBKDF2). Even the system operator can never know your password! Alternatives to insecure Telnet logins are built in: SSH and secure WebSockets for example. A built in web server with TLS support (aka HTTPS). Optional Two-Factor Authentication (2FA) via One-Time-Password (OTP) for users, supporting Google Authenticator, Time-Based One-Time Password Algorithm (TOTP, RFC-6238), and HMAC-Based One-Time Password Algorithm (HOTP, RFC-4266)."/>
<metaproperty="og:description"content="Security Unlike in the golden era of BBSing, modern Internet-connected systems are prone to hacking attempts, eavesdropping, etc. While plain-text passwords, insecure data over Plain Old Telephone Service (POTS), and so on was good enough then, modern systems must employ protections against attacks. ENiGMA½ comes with many security features that help keep the system and your users secure — not limited to: Passwords are never stored in plain-text, but instead are stored using Password-Based Key Derivation Function 2 (PBKDF2). Even the system operator can never know your password! Alternatives to insecure Telnet logins are built in: SSH and secure WebSockets for example. A built in web server with TLS support (aka HTTPS). Optional Two-Factor Authentication (2FA) via One-Time-Password (OTP) for users, supporting Google Authenticator, Time-Based One-Time Password Algorithm (TOTP, RFC-6238), and HMAC-Based One-Time Password Algorithm (HOTP, RFC-4266)."/>
{"datePublished":"2022-09-15T18:38:12+00:00","description":"Security Unlike in the golden era of BBSing, modern Internet-connected systems are prone to hacking attempts, eavesdropping, etc. While plain-text passwords, insecure data over Plain Old Telephone Service (POTS), and so on was good enough then, modern systems must employ protections against attacks. ENiGMA½ comes with many security features that help keep the system and your users secure — not limited to: Passwords are never stored in plain-text, but instead are stored using Password-Based Key Derivation Function 2 (PBKDF2). Even the system operator can never know your password! Alternatives to insecure Telnet logins are built in: SSH and secure WebSockets for example. A built in web server with TLS support (aka HTTPS). Optional Two-Factor Authentication (2FA) via One-Time-Password (OTP) for users, supporting Google Authenticator, Time-Based One-Time Password Algorithm (TOTP, RFC-6238), and HMAC-Based One-Time Password Algorithm (HOTP, RFC-4266).","mainEntityOfPage":{"@type":"WebPage","@id":"/enigma-bbs/configuration/security.html"},"url":"/enigma-bbs/configuration/security.html","@type":"BlogPosting","publisher":{"@type":"Organization","logo":{"@type":"ImageObject","url":"/enigma-bbs/assets/images/enigma-logo.png"}},"headline":"Security","dateModified":"2022-09-15T18:38:12+00:00","@context":"https://schema.org"}</script>
<p>Unlike in the golden era of BBSing, modern Internet-connected systems are prone to hacking attempts, eavesdropping, etc. While plain-text passwords, insecure data over <ahref="https://en.wikipedia.org/wiki/Plain_old_telephone_service">Plain Old Telephone Service (POTS)</a>, and so on was good enough then, modern systems must employ protections against attacks. ENiGMA½ comes with many security features that help keep the system and your users secure — not limited to:</p>
<ul>
<li>Passwords are <strong>never</strong> stored in plain-text, but instead are stored using <ahref="https://en.wikipedia.org/wiki/PBKDF2">Password-Based Key Derivation Function 2 (PBKDF2)</a>. Even the system operator can <em>never</em> know your password!</li>
<li>Alternatives to insecure Telnet logins are built in: <ahref="https://en.wikipedia.org/wiki/Secure_Shell">SSH</a> and secure <ahref="https://en.wikipedia.org/wiki/WebSocket">WebSockets</a> for example.</li>
<li>A built in web server with <ahref="https://en.wikipedia.org/wiki/Transport_Layer_Security">TLS</a> support (aka HTTPS).</li>
<li>Optional <ahref="https://en.wikipedia.org/wiki/Multi-factor_authentication">Two-Factor Authentication (2FA)</a> via <ahref="https://en.wikipedia.org/wiki/One-time_password">One-Time-Password (OTP)</a> for users, supporting <ahref="http://google-authenticator.com/">Google Authenticator</a>, <ahref="https://tools.ietf.org/html/rfc6238">Time-Based One-Time Password Algorithm (TOTP, RFC-6238)</a>, and <ahref="https://tools.ietf.org/html/rfc4226">HMAC-Based One-Time Password Algorithm (HOTP, RFC-4266)</a>.</li>
</ul>
<h2id="two-factor-authentication-via-one-time-password">Two-Factor Authentication via One-Time Password</h2>
<p>Enabling Two-Factor Authentication via One-Time-Password (2FA/OTP) on an account adds an extra layer of security (“<em>something a user has</em>”) in addition to their password (“<em>something a user knows</em>”). Providing 2FA/OTP to your users has some prerequisites:</p>
<ul>
<li>
<ahref="/enigma-bbs/configuration/email.html">A configured email gateway</a> such that the system can send out emails.</li>
<li>One or more secure servers enabled such as <ahref="../servers/ssh.md">SSH</a> or secure <ahref="../servers/websocket.md">WebSockets</a> (that is, WebSockets over a secure connection such as TLS).</li>
<li>The <ahref="../servers/web-server.md">web server</a> enabled and exposed over TLS (HTTPS).</li>
<p><imgclass="emoji"title=":information_source:"alt=":information_source:"src="https://github.githubassets.com/images/icons/emoji/unicode/2139.png"height="20"width="20"> For WebSockets and the web server, ENiGMA½ <em>may</em> listen on insecure channels if behind a secure web proxy.</p>
<p>Due to the nature of 2FA/OTP, even if enabled on your system, users must opt-in and enable this feature on their account. Users must also have a valid email address such that a registration link can be sent to them. To opt-in, users must enable the option, which will cause the system to email them a registration link. Following the link provides the following:</p>
<ol>
<li>A secret for manual entry into a OTP device.</li>
<li>If applicable, a scannable QR code for easy device entry (e.g. Google Authenticator)</li>
<li>A confirmation prompt in which the user must enter a OTP code. If entered correctly, this validates everything is set up properly and 2FA/OTP will be enabled for the account. Backup codes will also be provided at this time. Future logins will now prompt the user for their OTP after they enter their standard password.</li>
<p><imgclass="emoji"title=":warning:"alt=":warning:"src="https://github.githubassets.com/images/icons/emoji/unicode/26a0.png"height="20"width="20"> Serving 2FA/OTP registration links over insecure (HTTP) can expose secrets intended for the user and is <strong>highly</strong> discouraged!</p>
<p><imgclass="emoji"title=":memo:"alt=":memo:"src="https://github.githubassets.com/images/icons/emoji/unicode/1f4dd.png"height="20"width="20"> +ops can also manually enable or disable 2FA/OTP for a user using <ahref="/enigma-bbs/admin/oputil.html">oputil</a>, but this is generally discouraged.</p>
<p>In the situation that a user loses their 2FA/OTP device (such as a lost phone with Google Auth), there are some options:</p>
<ul>
<li>Utilize one of their backup codes.</li>
<li>Contact the SysOp.</li>
</ul>
<p><imgclass="emoji"title=":warning:"alt=":warning:"src="https://github.githubassets.com/images/icons/emoji/unicode/26a0.png"height="20"width="20"> There is no way for a user to disable 2FA/OTP without first fully logging in! This is by design as a security measure.</p>
<h3id="acs-checks">ACS Checks</h3>
<p>Various places throughout the system that implement <ahref="/enigma-bbs/configuration/acs.html">ACS</a> can make 2FA specific checks:</p>
<ul>
<li>
<codeclass="language-plaintext highlighter-rouge">AR#</code>: Current users <strong>required</strong> authentication factor. <codeclass="language-plaintext highlighter-rouge">AR2</code> for example means 2FA/OTP is required for this user.</li>
<li>
<codeclass="language-plaintext highlighter-rouge">AF#</code>: Current users <strong>active</strong> authentication factor. <codeclass="language-plaintext highlighter-rouge">AF2</code> means the user is authenticated with some sort of 2FA (such as One-Time-Password).</li>
</ul>
<p>See <ahref="/enigma-bbs/configuration/acs.html">ACS</a> for more information.</p>
<h4id="example">Example</h4>
<p>The following example illustrates using an <codeclass="language-plaintext highlighter-rouge">AR</code> ACS check to require applicable users to go through an additional 2FA/OTP process during login:</p>
<pre><codeclass="language-hjson">login: {
art: USERLOG
next: [
{
// users with AR2+ must first pass 2FA/OTP
acs: AR2
next: loginTwoFactorAuthOTP
}
{
// everyone else skips ahead
next: fullLoginSequenceLoginArt
}
]
// ...
}
</code></pre>
</div>
<divclass="PageNavigation">
<aclass="btn"style="float:left;margin-right: 20px;"href="/enigma-bbs/configuration/acs.html">« Access Condition System (ACS)</a>