Should you enable TOTP *only* authentication?
https://shkspr.mobi/blog/2024/10/should-you-enable-totp-only-authentication/
Here's a "fun" thought experiment. Imagine a website which let you sign in using only your username and TOTP code.
No passwords. No magic links emailed to you. No FIDO tokens. No codes via SMS. Just a TOTP generated and displayed on your device.
Is that useful? Sensible? Practical?
It's certainly technically possible. Store the username, store the TOTP seed, done. Your users can now log in.
Is it useful? Well, it would force users to not reuse passwords they've used elsewhere. That prevents one class of security issue. If another service gets hacked, attackers can't use those credentials with your service. If you get hacked, there are no passwords stored.
As for practical? I already have 60 TOTP codes! (That's up from 30 a few years ago). Scrolling through those codes is no harder than scrolling through my password manager.
So, sensible? This all depends on your risk tolerance.
Should you build an authentication mechanism like this?
Ehhhh… I'm going to go with "mostly no, except in limited circumstances". It might make life slightly easier for some users. But I feel inherently icky about having such a short password, even if it does regularly rotate. If this is a low-value service without sensitive information, it might be useful. But for everything else, I think it is a silly ideas.
Further discussion on Mastodon.
https://shkspr.mobi/blog/2024/10/should-you-enable-totp-only-authentication/
@blog you mention scrolling through a password manager, but Firefox's manager auto-fills, (and only on the correct website, mitigating against mitm attacks).
I'd want my totp authenticator to be at least as integrated, which would tie logging in to the machine the totp authenticator...