Password hash not recognized when using 2fa #490
Labels
No labels
approved, awaiting change
bug
configuration
documentation
duplicate
enhancement
extremely low priority
feature request
Fix it yourself
help wanted
invalid
mastodon_api
needs docs
needs tests
not a bug
planned
pleroma_api
privacy
question
static_fe
triage
wontfix
No milestone
No project
No assignees
3 participants
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference: AkkomaGang/akkoma#490
Loading…
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Your setup
From source
Extra details
Debian stable
Version
3.5.0-0-g07ccfafd9-develop
PostgreSQL version
13
What were you trying to do?
I'm trying to set up 2fa, so I go to: https://myinstance.org/settings/mfa
I create recovery codes. Then, I can set up 2fa.
When done, I'm being asked to verify everything, so I have to enter code and password. I press Confirm.
For information, I'm using LDAP.
What did you expect to happen?
When I click on Confirm, it all should be set.
What actually happened?
I get a message
Incorrect code or password. Try again.
even though my password is right, as I'm able to log in myinstance.org without any problem.Logs
In firefox console I see this:
I've added:
in
akkoma/config.exs
as shown here https://akkoma.dev/AkkomaGang/akkoma/src/branch/develop/config/config.exsBut it doesn't change anything.
In
journalct
I see that:though my password is right, as I'm able to log in myinstance.org without any problem.
Severity
I cannot use it as easily as I'd like
Have you searched for this issue?
I'm having this same issue and it's one of the key reasons I'm not encouraging people to join my instance.
@tjw are you also using LDAP and if not which authentication method do you use?
I'm just using the default (
PleromaAuthenticator
)Works for me on current develop. There were no direct changes since 3.12.2, though we did bump various deps since.
In either event, without more details it’s impossible to do anything. First make sure both backend and frontend are updated to latests stable or develop. The try again an collect info; please include
Open the network request tab (e.g. in Firefox
Ctrl+Shift+E
) before trying to set up 2FA and search/filter formfa
.Save the request and response content of all hits (in case we need it later). For now only include the request and response for the failing
api/pleroma/accounts/mfa/confirm/totp
API but make sure to filter out your password in the request data. Since it’s time bound keeping the TOTP code should be fine, but if you want, feel free to censor it as long as you retain the same length and only replace digits with other digits.secret
parameter (pls preserve the length)