Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support multiple tokens #2

Open
nerdyness opened this issue Sep 30, 2015 · 0 comments
Open

Support multiple tokens #2

nerdyness opened this issue Sep 30, 2015 · 0 comments

Comments

@nerdyness
Copy link
Owner

Imagine your password expires and you're not allowed to set the password to one that was previously set.

A good work around would be to store the secret in token1.txt. Then, once you need a new password you can create a new password which will create token2.txt and store the state in a lookup table. I.e. "facebook.com" is now hashed with token2.txt. If let's say twitter.com also needs a new password, it will also use token2.txt. Once facebook.com needs a new password token3.txt will be created as a shared token.

Obviuosly the lookup table needs to be backed up. Maybe a clean-up process can delete all unused tokens? The idea is to have every password to default to token1.txt, however if there are only token3.txt references in the lookup table then token2.txt could be removed and token3.txt renamed to token2.txt although there is very little benefit for doing that. It's more a case of expiring an existing token when it's compromised or similar.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant