# I am the Watcher. I am your guide through this vast new twtiverse.
# 
# Usage:
#     https://watcher.sour.is/api/plain/users              View list of users and latest twt date.
#     https://watcher.sour.is/api/plain/twt                View all twts.
#     https://watcher.sour.is/api/plain/mentions?uri=:uri  View all mentions for uri.
#     https://watcher.sour.is/api/plain/conv/:hash         View all twts for a conversation subject.
# 
# Options:
#     uri     Filter to show a specific users twts.
#     offset  Start index for quey.
#     limit   Count of items to return (going back in time).
# 
# twt range = 1 47
# self = https://watcher.sour.is/conv/npkkadq
@eaplmx CSS Battle has a passwordless login, I don't know the implementation but it basically send you and email where you click a link and you're in.
@justamoment yarnd implements this too 👌 Its basically called "Magic Link Auth". We've had this for a while, not sure if anyone uses it though 😅
@justamoment yarnd implements this too 👌 Its basically called "Magic Link Auth". We've had this for a while, not sure if anyone uses it though 😅
@prologic nice! I didn't know about it, I'd probably use it on desktop.

I haven't seen it though, from where is it accessible?
@justamoment From the Loign view:
@justamoment From the Loign view:
@prologic I tried just now but I'm not receiving any email. 🤔 Does it take some time?
@justamoment @prologic hey, didn't know that! , as a fan of magic links, I like that it's available, but "Login with you Email Address" doesn't make obvious you are going to receive a Dynamic token to your email, in my mind is like "Instead of your Username and Pwd, user your Email and Pwd"

I'd suggest something line "Send an access to your email", "Send a Magic link", etc.
@prologic @justamoment Same! It's not arriving to my Proton.me/Protonmail inbox, nor Spam.

twtxt_twtxt.1.cytd0qqnwbpw@dm4.mills.io    | time="2022-10-10T05:17:46Z" level=warning msg="sending emails disabled in configuration"



That would be why it's not working... Hmmm 🤔

twtxt_twtxt.1.cytd0qqnwbpw@dm4.mills.io    | time="2022-10-10T05:17:46Z" level=warning msg="sending emails disabled in configuration"



That would be why it's not working... Hmmm 🤔
@justamoment @prologic sorry for the typos, stupid phone keyboard (and myself not paying attention, ha)
@prologic likely the root cause 🙃
Try now. fixed my pod's email configuration 😅
Try now. fixed my pod's email configuration 😅
@prologic Nice!

@eaplmx Yup 😅
@eaplmx Yup 😅
I _think_ Email has been broken on my Pod since some time now since @lyse made this commit the default behaviour of the flags/env had changed **requiring** SMTP_PORT to be set (used to default toi 25) ooops 😅
I _think_ Email has been broken on my Pod since some time now since @lyse made this commit the default behaviour of the flags/env had changed **requiring** SMTP_PORT to be set (used to default toi 25) ooops 😅
@prologic I think the Warning is misleading then...
So it's not disabled, but not setup correctly and for that reason doesn't send mails?
@eaplmx Correct. I should probably improve the startup a bit to catch this earlier on. Maybe expose it in the UI as well in Poderator Settings 🤔
@eaplmx Correct. I should probably improve the startup a bit to catch this earlier on. Maybe expose it in the UI as well in Poderator Settings 🤔
@prologic Sorry, saw this now.

Yes, it's working for me too now.
@justamoment 👍
@justamoment 👍
@prologic @eaplmx @justamoment I think such things are convenient but dangerous. Email is not encrypted in general, which means by using this feature you are sending a cleartext login path to anyone who manages to snoop your email or your network traffic. That's making the system less secure than a password-based login.

One of the reasons I ended up on yarn.social was that I was looking for a good passwordless alternative and IndieAuth seemed like it might fit the bill!
@abucci You are 100% right. Relying on email security is an oxymoron. I'm not sure how many _actually_ use it to auth to their pod, so if there's enough reason to remove it, I'm happy to do so 👌
@abucci You are 100% right. Relying on email security is an oxymoron. I'm not sure how many _actually_ use it to auth to their pod, so if there's enough reason to remove it, I'm happy to do so 👌
@prologic well, not 100% right but it's a valid assumption.

If you are able to reset your password by email, it's a pretty similar level of security than receiving an access token by email. Anyone with access to your mail could get access to your accounts.
Adding a second factor of authentication could help, or using something with Public/Private cripto could help, like Client Certs, Fido2 or even hipster things.

And also giving alerts that someone else is connected in your behalf is great (like is done for some banks or Google) , but that's a UX compromise between convenience and security.
@prologic well, not 100% right but it's a valid assumption.

If you are able to reset your password by email, it's a pretty similar level of security than receiving an access token by email. Anyone with access to your mail could get access to your accounts.
Adding a second factor of authentication could help, or using something with Public/Private cripto would be better, like Client Certs, Fido2 or even hipster things.

And also giving alerts that someone else is connected in your behalf is great (like is done for some banks or Google) , but that's a UX compromise between convenience and security.
@abucci Nice!

I didn't know about https://indieauth.net which seems to be based on OAuth 2.0 (that I have used before), I'll take a look!
@eaplmx That's why we make the tokens short-lived. I'm just pointing out and agreeing with @abucci that Email security is basically non-existent 😅 -- Speaking of which... Is there any desire ot strong push to start thinking about introducing 2FA or MFA to yarnd? 🤔 Note however I have a **strong** preference for something that is "self-hostable".
@eaplmx That's why we make the tokens short-lived. I'm just pointing out and agreeing with @abucci that Email security is basically non-existent 😅 -- Speaking of which... Is there any desire ot strong push to start thinking about introducing 2FA or MFA to yarnd? 🤔 Note however I have a **strong** preference for something that is "self-hostable".
@prologic I'd like to have a 2FA alternative, at least TOTP (what Google Authenticator uses).
And if you have support for WebAuthn, even better.
Both are self-hostable.
@eaplmx Okay 🤔
@eaplmx Okay 🤔
@eaplmx me too!
This libary sec51/twofactor: Golang two factor authentication library _might_ do the trick... I'll do some more research, but I've looked into this before, doing TOTP is probably fairly easily doable. 👌
This libary sec51/twofactor: Golang two factor authentication library _might_ do the trick... I'll do some more research, but I've looked into this before, doing TOTP is probably fairly easily doable. 👌
@eaplmx with WebAuthn we could go even take it further and possibly have a userless login too.
@justamoment sure! I'm working on a proof of concept (in PHP) if you want to take a look on how it works
@justamoment that said, WebAuthn/FIDO 2/PassKeys are not that easy to implement but I think they have many improvements for the Authentication problem
FIDO 2 isn't too difficult. modern-ish browsers will support it natively now so the JS required is quite minimal.
FIDO 2 isn't too difficult. modern-ish browsers will support it natively now so the JS required is quite minimal.
You can take a look at the library I'm using, here:
https://eapl.mx/webauthn/_test/client.html

And the implementation there:
https://eapl.mx/twtxt/login.html

What's missing in the examples is having an identity tied to your Auth device (Hardware token or OS service like Microsoft Hello, Apple Keychain, Android Fingerprint). The explanation is long, but the abstraction is there. Your identity and private certificates are held for you by some 'magic' device.
@xuu Well, it took me like 4 hours to set up, implement and test the PHP library, with all the setup combinations, devices and such.


So I'll say that using a password with a simple function like https://www.php.net/manual/en/function.password-verify.php
is much easier than a whole library requiring communication between the server, the browser and the auth device... There is a security reason for that (mainly to avoid phishing, which is something I like compared to other solutions like SQRL)