-
Notifications
You must be signed in to change notification settings - Fork 166
Proof-of-concept Delay Between OTP Sending (LG-7899) #10360
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -229,6 +229,9 @@ participate_in_dap: false | |
| password_max_attempts: 3 | ||
| personal_key_retired: true | ||
| phone_carrier_registration_blocklist_array: '[]' | ||
| short_term_phone_otp_max_attempt_window_in_seconds: 10 | ||
| short_term_phone_otp_max_attempts: 2 | ||
| short_term_phone_otp_rate_limiter_enabled: true | ||
| phone_confirmation_max_attempts: 20 | ||
| phone_confirmation_max_attempt_window_in_minutes: 1_440 | ||
| phone_service_check: true | ||
|
|
@@ -483,6 +486,7 @@ production: | |
| phone_recaptcha_mock_validator: false | ||
| piv_cac_verify_token_secret: | ||
| session_encryptor_alert_enabled: true | ||
| short_term_phone_otp_rate_limiter_enabled: false | ||
|
Contributor
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Curious the rationale for this?
Contributor
Author
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. I'd rather default to off for deployed environments and opt-in manually for now. We can/should remove it if we're happy with it though. |
||
| redis_throttle_url: redis://redis.login.gov.internal:6379/1 | ||
| redis_url: redis://redis.login.gov.internal:6379 | ||
| report_timeout: 1_000_000 | ||
|
|
@@ -579,6 +583,7 @@ test: | |
| scrypt_cost: 800$8$1$ | ||
| secret_key_base: test_secret_key_base | ||
| session_encryption_key: 27bad3c25711099429c1afdfd1890910f3b59f5a4faec1c85e945cb8b02b02f261ba501d99cfbb4fab394e0102de6fecf8ffe260f322f610db3e96b2a775c120 | ||
| short_term_phone_otp_rate_limiter_enabled: false | ||
| skip_encryption_allowed_list: '[]' | ||
| state_tracking_enabled: true | ||
| team_ada_email: 'ada@example.com' | ||
|
|
||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
My initial impression was that this would allow someone to request 2 codes within 10 seconds, but I can only request 1 code within 10 seconds. I think either would be fine, but the configuration value felt a little misleading to me (or at least unexpected), i.e. I would expect this value to be
1if I can only request 1 code every 10 seconds.There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Yeah, the way the RateLimiter class is kind of weird in that way unfortunately :/
We could switch
identity-idp/app/services/rate_limiter.rb
Line 67 in 4d41f77
>rather than>=and reduce everything by one 😬