-
Notifications
You must be signed in to change notification settings - Fork 308
add facebook authentication #30
Comments
What's the status of this? Something we could be looking to do or something to hold off on until #429 is resolved? |
Facebook and Google are the two auth providers I'm interested in. Once we have those two + Twitter and GitHub, I think we're good on auth providers for a while. Given that that's just two more integrations, my hunch is that we could move forward as easily implementing them ourselves as waiting for Singly. Is this something you're interested in taking on, @joonas? Note that we want an infinite number of integrations under |
👍 I'm ready to promote Gittip on Facebook. Lots of people who would register in order to tip me (namely family members) are on Facebook, but not Twitter, Github, etc. |
+1 from CoreyClarkPhD on Twitter. |
+1 from me, for what it's worth. I agree with @ceboudreaux that Facebook is likely to have more givers. |
+1 from Emir Hayric on Twitter. |
I'll be working on this during the weekend. |
Disregard. |
+1 from yours truly. Many of my supporters are non-technical folk, and Google/Facebook are their most accessible means of using gittip. |
Here's a word of caution from @homakov about supporting Facebook Connect:
http://homakov.blogspot.ro/2014/01/two-severe-wontfix-vulnerabilities-in.html |
Conclusion:
Sound familiar, @zwn? ;-) Password auth: #1052. |
P.S. Twitter/@Doulittle tipped me off to @homakov's article. |
Oauth haters gonna hate. Passwords alone are certainly flawed as well. Does gittip have brute force detection? Multi factor auth? Is gittip more or less likely to build that than the Oauth providers? When I do Oauth to Facebook/Twitter/Github/Google it involves multi-factor auth and they protect against brute force attacks on accounts. Those are a security level beyond what most sites are going to offer. Reading the homakov article it seems to require a few things:
Be wary of the headlines in security articles. It's common to state the worst case scenario, but the details often make it virtually impossible to exploit and/or easy to mitigate. |
@Changaco Does #1369 address the mitigation mentioned at #30 (comment)? |
@whit537 Yes, I think so. The links to sign in or connect with an elsewhere account have been replaced by POST forms with CSRF tokens. |
If I review my own mitigations in reverse order:
This could also be a good time to make a policy decision about subdomains for things. e.g. should building.gittip.com really be buildinggittip.com to reduce the attack surface? |
I will have to read it several times, I have a hard time understanding it. |
No, redirect is required for issue 2.
this is protection i was talking about
Not for my articles |
@Changaco But could a
I can't confidently answer this right now. Audit required. Reticketed as #2138.
Maybe. Reticketed as #2139. |
This is labeled as |
just adding +1 from me. I think getting facebook connect and/or any other authentication options that are more mainstream and less dev-centric are a huge factor for wider appeal of gittip. |
+1 from @CCsolidarity on Twitter. |
+1 from @VeganNook on Twitter. |
Should be able to authenticate with a Facebook account. If already authenticated, should associated Facebook profile with existing Gittip participant account.
The text was updated successfully, but these errors were encountered: