• criticon@lemmy.ca
    link
    fedilink
    arrow-up
    12
    ·
    1 hour ago

    Or worse:

    Use email link -> use password instead

    Enter password

    Now enter the code that we sent you your email…

    • ulterno@programming.dev
      link
      fedilink
      English
      arrow-up
      3
      ·
      edit-2
      48 minutes ago

      2 factor authentication, only when you feel like it.

      They might as well be piping the password to /dev/null

  • baller_w@lemmy.zip
    link
    fedilink
    arrow-up
    1
    ·
    2 minutes ago

    Passkeys or oauthn/fido. I just can’t believe we’re still talking about passwords in 2025 when these very robust, user friendly features have been widely available for years.

  • LiveLM@lemmy.zip
    link
    fedilink
    English
    arrow-up
    28
    ·
    edit-2
    2 hours ago

    The best I’ve seen was yesterday where a website had the log-in button greyed out after the password manager filled my creds in.
    So I had to manually click both the email and password field. Just click them. Then it enabled the log-in button.
    So someone took their time to write a piece of JS that said “If the user hasn’t focused both fields at least once, no login”. Literally why? Extra code that does nothing useful.


    I was hoping passkeys would be the solution to this madness, but it seems to me the entire spec gives too much power to the OS Makers and too little to the users because “mUh AtTtEsTatIoN” so now I don’t know anymore

    • Gumby@lemmy.world
      link
      fedilink
      English
      arrow-up
      9
      ·
      1 hour ago

      I’ve definitely run into that. Even more frustrating is when there was one particular site that forced me to actually delete the last character of my password and then retype it. Just focusing in the field wasn’t enough, I had to actually send it a keystroke. And Ctrl-V to paste the password in manually didn’t count. I suppose typing a random character at the end and then deleting it would have worked too.

    • spizzat2@lemmy.zip
      link
      fedilink
      arrow-up
      4
      ·
      1 hour ago

      My utitlies website doesn’t let you login if the password field is autofilled by the browser. Whatever Angular-based form validation they are using doesn’t play nice with Firefox’s saved password feature. You have to manually type something in the password field, so I always add and remove a space from the password.

      I sent an email to their support, hoping they would fix it, but they just responded saying that they can’t reproduce it.

      Well, I can reproduce it. I even told you how. That sounds like a skill issue.

  • maniclucky@lemmy.world
    link
    fedilink
    arrow-up
    2
    ·
    41 minutes ago

    Worst one I’ve seen: username and password plus a 2FA email, BUT if you hit enter instead of clicking the last button it refreshes the page.

  • paequ2@lemmy.today
    link
    fedilink
    arrow-up
    19
    ·
    2 hours ago

    God I hate those stupid magic links. They’re WAAAAYYY slower than just using my password manager.

    AND they kinda contribute to locking you into Big Tech. I sometimes have problems with those stupid links because I don’t have a Gmail account. Somewhere along the stupid chain there’s probably some stupid check that delays or blackholes emails to non-big-tech domains.

    • definitemaybe@lemmy.ca
      link
      fedilink
      arrow-up
      2
      ·
      2 hours ago

      Based.

      Email is terrible. It’s an unreliable communication system. You cannot depend on sent emails arriving in the recipient’s mailbox—even the spam folder.

      People indirectly assume that all emails at least get to their spam folder. They don’t. There are multiple levels of filters that prevent most emails from ever making it that far because most email traffic is bots blasting phishing links, scams, and spam. Nobody wants phishing and scam emails, but the blocks that prevent those are being used by big tech to justify discriminating against small mail servers.

      I can’t remember the site, now, but I literally couldn’t log into one this week because the email never arrived.

      • balsoft@lemmy.ml
        link
        fedilink
        arrow-up
        1
        ·
        35 minutes ago

        I can’t remember the site, now, but I literally couldn’t log into one this week because the email never arrived.

        Well, email allows you to solve that issue by self-hosting. But what you can’t solve is that if you do self-host, gmail will drop your emails to spam or just discard them completely, just because it feels like it, even if you do the whole dance with DMARC and have used the domain for a good few years. It’s frustrating as shit.

  • MaggiWuerze@feddit.org
    link
    fedilink
    arrow-up
    95
    arrow-down
    1
    ·
    4 hours ago

    Also This strange trend to split username and password on to two separate pages, or only showing the password field after confirming the username

    • bobo@lemmy.ml
      link
      fedilink
      arrow-up
      16
      ·
      3 hours ago
      1. Username
      2. Password
      3. MFA
      4. Do the whole process all over again because the remember this device is on step 2 and it’s impossible to go back

      Bonus stage 0: special login URL decided to crap out, and going back to any point in history automatically redirects to the error page that you can’t use to log in, so you need to keep going back and trying to copy the URL before it redirects becausw Firefox interprets pressing “stop” as “do whatever you want idk”

      Fucking aws…

    • neidu3@sh.itjust.works
      link
      fedilink
      English
      arrow-up
      30
      ·
      edit-2
      4 hours ago

      Not that strange. Different users may belong to different groups which may have different authentication backends. The associated authentication method is brought up once a username has been provided.

    • Iced Raktajino@startrek.website
      link
      fedilink
      arrow-up
      26
      ·
      edit-2
      4 hours ago

      And the auto-submitting TOTP entry form where you’re apparently not allowed to make a typo. And obscuring the TOTP number like it’s a password or state secret.

  • Lung@lemmy.world
    link
    fedilink
    arrow-up
    33
    ·
    4 hours ago

    HEY BUT DO YOU WANT TO USE A PASSCODE?? PASSCODE! PASSCODE! USE THE PASSCODE! -_-

      • panda_abyss@lemmy.ca
        link
        fedilink
        arrow-up
        9
        ·
        edit-2
        3 hours ago

        Passkeys are okay, but your browser and OS want you to use them because you can’t just take a passkey to another platform, you have to create a new one, and it’s a pain in the ass.

        It’s a lock-in gimmick latching on to a real useful solution.

        • 4am@lemmy.zip
          link
          fedilink
          arrow-up
          14
          ·
          2 hours ago

          Password managers can hold Passkeys now and they’re portable. Bitwarden stores all of mine, use them on any machine.

          • towerful@programming.dev
            link
            fedilink
            arrow-up
            1
            ·
            edit-2
            7 minutes ago

            Yeh, I have passkeys in bitwarden.
            I get it. Once they become ubiquitous, you click “login” your password manager prompts you to select account, and you are in.
            No password that can be leaked, incorrectly stored, brute forced.
            Corporations can pre-register company service passkeys for new users.
            It’s like mTLS, except staged.

      • voidsignal@lemmy.world
        link
        fedilink
        arrow-up
        4
        ·
        edit-2
        3 hours ago

        Passkeys are fine. It’s just MTLS but by marketers (if by passcode you mean passkeys. otherwise, what’s a passcode?)

  • HuntressHimbo@lemmy.zip
    link
    fedilink
    arrow-up
    16
    ·
    4 hours ago

    Ah but you see it’s one factor of authentication that also conveniently loops in whichever email provider is spying on you

    • LedgeDrop@lemmy.zip
      link
      fedilink
      arrow-up
      1
      ·
      54 minutes ago

      Ding! Ding!

      This is the real answer: mail providers get to track you, your service get constant confirmation that your email is live (so they can send more ads from themselves plus their 400 closest affiliates). It’s a win-win situation for everyone /s.

      “The beatings enshitification will continue, until moral is improved.”

    • voidsignal@lemmy.world
      link
      fedilink
      arrow-up
      3
      ·
      3 hours ago

      Of course. How would Microslop or Google LLMs snoop on your data then? You guys really make no effort… /s

  • Assassassin@lemmy.dbzer0.com
    link
    fedilink
    arrow-up
    12
    arrow-down
    1
    ·
    4 hours ago

    Just let me use passkeys at this point. The way that people typically use passwords is less secure anyway, why not just make it as simple as possible?

    • Anafabula@discuss.tchncs.de
      link
      fedilink
      arrow-up
      3
      ·
      2 hours ago

      I would love to use my physical Yubikey, but all the websites I’ve seen that allow passkey login always deny both Yubikeys.

    • bleistift2@sopuli.xyz
      link
      fedilink
      English
      arrow-up
      11
      arrow-down
      2
      ·
      3 hours ago

      I forget. Are passkeys the access method that prevents you from logging in ever again if you lose access to a device?

      • 4am@lemmy.zip
        link
        fedilink
        arrow-up
        3
        ·
        2 hours ago

        Only if you use the OS built-in saving.

        Most password managers support them at this point, making them portable and secure.

      • Assassassin@lemmy.dbzer0.com
        link
        fedilink
        arrow-up
        8
        ·
        3 hours ago

        Typically, no. You’re thinking of TOTP/Authenticator based 2FA. Those still come with backup codes in case you break the phone that has the TOTP codes warehoused. I always recommend keeping those backup codes saved in the notes of whatever password manager you’re hopefully using.

        Passkeys are essentially just one half of a cryptographic key pair (like what you’d use for authenticating SSH without passwords). These allow you to authenticate once using password + 2FA, then use the generated passkey for future sessions. Since these are much more complex than passwords and remove the need to actually remember anything, they are significantly more secure.

        There are also some other features that I’m forgetting, and that may not be a perfectly accurate description, but I think you can get the gist.

        • Jesus_666@lemmy.world
          link
          fedilink
          arrow-up
          3
          ·
          2 hours ago

          Passkeys are supposed to be bound to one device and protected by that device’s OS’s secure enclave. If you have a second device you’re supposed to create a second passkey.

          That’s why many sites will flat out refuse to let you create a passkey with a desktop browser since a PC-stored passkey doesn’t fit the security model.

          • Assassassin@lemmy.dbzer0.com
            link
            fedilink
            arrow-up
            2
            ·
            2 hours ago

            Yeah, that’s how I understood it to work, as well. I didn’t mention it because I’ve seen a bunch of different implementations that don’t seem to work that way. I didn’t want to speak too much on that specific point, since I don’t have a very thorough understanding of it.

  • manxu@piefed.social
    link
    fedilink
    English
    arrow-up
    3
    ·
    3 hours ago

    It feels like the factors of authentication discussion misses one important aspect: can the factor be replayed. Passwords can be replayed indefinitely, while the email links you get or the OTP token only work for a short period of time.

    I remember it from the bad days when I used LastPass. Suddenly I got a notification that the place had been compromised and I had to suddenly change hundreds of passwords. 90% of them were for sites that didn’t even exist any longer, but sifting through the long, long list to go change passwords was more work than I wanted to do.

    Don’t have to do that if I need to use a one-time token via Aegis or email! I do agree, though, that for low risk sites, username/password is totally fine.

  • Deebster@infosec.pub
    link
    fedilink
    arrow-up
    4
    ·
    4 hours ago

    My email uses greylisting which is where the first email received from a server gets a “busy” response - the idea being that spammers just fire and forget whereas real mailers will retry.

    Unfortunately, some senders take so long to resend that it’s timed out. The second time will work though. Unless they have multiple servers. Some have so many servers that you have to do this a multitude of times until you lose the will to login or forget what you were going to do anyway.

  • Switorik@lemmy.zip
    link
    fedilink
    arrow-up
    1
    arrow-down
    2
    ·
    4 hours ago

    I weirdly don’t mind the email method. I don’t like copy pasting my passwords because I feel it’s less secure than typing it out.

    Now I wouldn’t mind if it was an option.