[17:41:20] <sumanah> EWDurbin: di_codes woodruffw so it looks like in our help text for Warehouse we're going to refer to it as two factor authentication (2FA) rather than MFA
[17:41:55] <sumanah> am I right in understanding that in public communications we're fine with calling it 2FA rather than MFA because we are only going to be allowing 2 forms rather than 3+ forms of auth?
[17:42:09] <sumanah> (as in 2 rather than 3+ forms of auth necessary for a single login)
[17:56:50] <sumanah> woodruffw: actually I could use clarity on a few things - lemme know if you have time for a quick phone call in the next hour?
[18:00:40] <woodruffw> sumanah: sure, i could do a call any time during this hour (2-3PM)
[18:01:51] <woodruffw> (following up on the PSF slack right now)
[18:09:28] <sumanah> ok so to make sure I understand, in my own words
[18:09:42] <sumanah> well actually before I do that - could you speak to 2FA vs MFA?
[18:11:12] <woodruffw> sure: 2FA and MFA *mostly* mean the same thing in this context. in principle they refer to slightly different security models (having >2 distinct factors, like you said), but nobody agrees on what third factors are and it ends up being used interchangeably with "2FA" for the most part
[18:11:27] <woodruffw> for our use case, all that matters is that we're consistent IMO
[18:12:24] <woodruffw> for background: a first factor is something you know (password), a second factor is something you possess or something you are (a fingerprint/TOTP/security key)
[18:12:48] <sumanah> right, I remember that from Schneier
[18:12:59] <sumanah> (I figure you're speaking not just to me but The Audience here :) )
[18:15:30] <sumanah> woodruffw: ok I'm gonna say "2FA" in public communications then
[18:15:42] <woodruffw> so to stop myself from rambling: either is fine as long as we're consistent. i used "2FA" within the PR and parts of the codebase now refer to second factors, so "2FA" is a good choice
[18:16:09] <sumanah> woodruffw: and as for the FIDO/U2F stuff, in public communications I'm gonna say (as appropriate to the audience):
[18:17:05] <sumanah> if you think you want to use FIDO/U2F stuff, you probably actually want to use a WebAuthn device/tool/thing, and we will be working on supporting it next, but please do try out the TOTP functionality so we can shake out its bugs, you can change the device later
[18:17:34] <pancakes09> Is the PSF Slack open to everyone?
[18:19:02] <sumanah> I'm actually not sure about that
[18:19:22] <sumanah> there was a private question I needed to ask William so I asked it there but I then moved the conversation here
[18:20:14] <sumanah> I wonder whether other people have as strong an association between Yubikey https://www.yubico.com/ and U2F as I did up till 5 min ago
[18:20:21] <woodruffw> sumanah: that sounds pretty good to me. one small nit: just call it "U2F" because "FIDO" is so overloaded (name of the org + multiple differing standards, some of which are unrelated to U2F)
[18:22:33] <sumanah> di_codes: hey, in your opinion, if something glitches during this 2FA beta period, having a verified email address will make account recovery a little smoother for the users, right?
[18:23:24] <sumanah> woodruffw: I think that's it for the things I need to check right now with you! I'll share my announcement text on GitHub in https://github.com/pypa/warehouse/issues/5661 so you can correct stuff. hope to send it out tomorrow
[18:31:12] <woodruffw> sumanah: okay, did a quick poll: i think Paul is the only one going (Infiltrate is one of our big almost-all-hands events every year, so it's unfortunate that they line up like this...)
[18:33:14] <sumanah> woodruffw: ok - remind me of Paul's surname or handle? I'm having a bit of trouble