Change of policy on GitLab account creation/login?
Erik Huelsmann
ehuels at gmail.com
Sun Oct 7 18:13:52 UTC 2018
On Sun, Oct 7, 2018 at 7:02 PM Raymond Toy <toy.raymond at gmail.com> wrote:
>
>
> On Sun, Oct 7, 2018 at 5:55 AM Erik Huelsmann <ehuels at gmail.com> wrote:
>
>> Hi all,
>>
>> Almost 4 years have passed since the initial installation of GitLab on
>> common-lisp.net.
>> During that period, GitLab (the open source project) has seen tremendous
>> growth both in user community and functionality. Our own GitLab instance
>> has grown quite a bit as well. With almost 700 projects and nearly 500
>> users, it's quite a bit bigger now than the initial CVS migration which
>> resulted in 379 projects and 395 users. (We did both the Git and Darcs
>> migrations after that, which added to the growth.)
>>
>> Originally, we decided we wanted to create our own accounts and not
>> support account-auto-creation (based on experience shared by GitLab.com).
>> Today, GitLab lets itself be configured to auto-create accounts from GitHub
>> using GitHub credentials.
>> We have long supported the possibility of allowing accounts to be tied to
>> Google and GitHub OAuth2 for the purpose of authentication. Additionally,
>> we support 2FA these days.
>> I'm wondering if we can be a bit more relaxed with account creation
>> (allowing auto-creation), but be a bit more strict on account login: i.e.
>> require 2FA.
>>
>
> Auto-creation seems nice since it lowers the barrier to entry for people
> wanting to create create projects or filing bugs, and there's also less
> work for the admins. But I thought one reason you stopped doing this was
> the number of spam accounts. Will this become a problem?
>
Well, it was (at the time) mostly GitLab.com who had the experience with
spam accounts. Given how much trouble our mail service gets with spam
(every quarter we have at least one spam (often multiple) attack which
drives the system load through the roof for days..)
Given that situation and GitLab.com's experience, I wasn't going to submit
myself to a maintenance burden like that. However, now that we have 2FA and
we can require accounts to be blocked until they set up 2FA, I'm thinking
that's an additional barrier on entry, which I hope is enough to keep
spammers out.
> Are you going to require 2FA for existing accounts as well? And what 2FA
> methods will you support? SMS? Google Authenticator app? Security (FIDO)
> keys? (I'm finally going to set up 2FA for my personal accounts using
> security keys, so this comes at a good time. I've had to add 2FA to my
> github account already, using the authenticator app.)
>
I've actually been using my FIDO key successfully to log into the admin
account for the last half year or so. While I can't force people to shell
out for a Yubi key v4 or v5, I'd love for people to get a U2F key at the
bare minimum. It used to be supported only by Chrome, but FireFox has U2F
support now too. (And my experience over the past 6 months has been with
FireFox exclusively.)
U2F keys exist at reasonable prices of less than 10$.
GitLab supports Google Authenticator, but also FreeOTP. I'm not aware of
SMS support. There's more on GitLab's 2FA here:
https://docs.gitlab.com/ee/user/profile/account/two_factor_authentication.html
Thanks for your response!
Regards,
--
Bye,
Erik.
http://efficito.com -- Hosted accounting and ERP.
Robust and Flexible. No vendor lock-in.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mailman.common-lisp.net/pipermail/clo-devel/attachments/20181007/170d05da/attachment-0001.html>
More information about the clo-devel
mailing list