1
Actus SFR Altice / SFR Connect TV V3
« Dernier message par rooot le Aujourd'hui à 16:18:31 »ils ont hésité entre GREEN en ROUGE et RED en VERT
Chez SFRC'est la même que chez Red avec des étiquettes rouges à la place du vert.
Je me demande s'ils ont des astreintes chez XPfibre... Sinon c’est parti pour 2 jours minimum de panne.Savez vous si les clients de Orange / Bouygues / Free / SFR (Offre Passive) et/ou d'autres opérateurs - Offre active (kiwi, ozone) ?
À la souscription, le nouveau client a le choix entre une Freebox Pop Player ou son propre équipement, avec une réduction à la clé.
À la souscription, le nouveau client a le choix entre une Freebox Pop Player ou son propre équipement, avec un abonnement payant à la clé.
Merci pour les détails. je crois que j'aurais jamais trouvé les docs correspondants.
Donc, c'est bien que je soupçonnais : l'inversion est faite car il est plus facile d'avoir un filtrage strict sur le DL, que sur les UE qui ont des composants forcément moins bons et sont susceptibles de "baver" un peu, j'ai bon ?
J'ai pris ça parce que Bouygues me prenait pour un jambon, après 15 ans 20Go pour 20€ je disais rien, c'est quand il m'a quasi forcé à basculer en 5G pour quelques € de plus que j'ai crisé; de la 5G sur un iPhone 7..
Many security enhancements, including support for optional Two Factor Authenticationhttps://www.simplemachines.org/community/index.php?topic=580585.0
Hello all!https://blogs.simplemachines.org/dev/530816/Two+Factor+Authentication+in+SMF+2.1
It's been a steady two weeks since we released the first beta of SMF 2.1 and since then we've had mostly positive feedback I think, we have fixed a few bugs and did a few improvements marching towards Beta 2 and a part of that was Two-Factor Authentication which I implemented over last week.
Two Factor Authentication adds an additional layer of security over your usual username and password, it works by pairing a device using a compatible app to your account which would then be required whenever you wish to log-in again into the forums. This allows security against those who even managed to steal your username/password, blocking them off as long as they don't have the paired device. For more technical details of the implementation, have a look at the original pull request. SMF 2.1 is compatible with apps listed on the Wikipedia entry here, allowing you to pair with any one app of your preference.
Admins get the option to disable, enable (default) and force 2FA for all users. Although I personally would not recommend forcing 2FA for all since it does require a separate dedicated device but if you wish for that, the option is available. If you're impatient you can checkout GitHub master right now and see it in action (Not recommended for production) or wait for Beta 2 and further releases. With SMF 2.1 we have juiced up the security by a good margin, hopefully you'll like that.
I've attached a few screenshots of it in action, subject to change. These are from the latest build as of this post and I was using Authy for Android as a client but I couldn't take it's screenshots since it wouldn't allow me.
Thank you!
This PR adds support for 2FA for SMF using TOTP protocol, allowing users to register a secondary layer of authentication via a device with app such as Google Authenticator, Authy, Duo Mobile etc.https://github.com/SimpleMachines/SMF/pull/2547
This implementation is based on RFC 6238 Time-Based One Time Password protocol, The user can register a secondary 2FA device via their Account Settings profile area allowing them to add a layer of security upon logging in. This setup provides them a backup code as well, should they lose the device they can use this (it is recommended to store this backup code in a secure place and use only in emergency).
Internally the authentication is stored in a cookie generated with the data sha512(tfa_backup + password_salt), this is checked in loadUserSettings and the user is logged out if it fails and is forwarded to 2FA login screen.
To-do:
Allow Admins to enable, disable and force 2FA
Allow Admins to disable 2FA on other members
Add credits for \TOTP\Auth class to contributors/credits etc