-
-
Notifications
You must be signed in to change notification settings - Fork 447
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Disallow last verified code #97
Comments
The specification is the following:
|
As with #98 I think that's a general enhancement django_otp should implement by rejecting a successfully proven token as invalid. |
Hi, There is a logic in This is based on storing Then when validating token, all What do You think about porting this logic to I would be interested to help with this ticket if You think this is good direction, or if You could point me how this can fixed some other way. |
Code once verified must not be accepted again as per RFC 6238. While not absolutely critical, this helps is cases where the code (and password) were observed by third party "over shoulder".
The text was updated successfully, but these errors were encountered: