• Ephera
    link
    fedilink
    arrow-up
    10
    ·
    7 months ago

    I know that single sign-on can be integrated that way.

    For example, let’s say you work at Wheezecakes Inc. and want to log into your programming.dev account. Then you’d type your e-mail address, jadero@wheezecakes.com, into the username field and hit enter.

    The webpage sends that to the server, which realizes that you’re a Wheezecakes employee, so it redirects you to login.wheezecakes.com or whatever SSO provider is in use, you log in there (or ideally already have a login cookie), and then programming.dev just gets told that, yeah, you’re authenticated to login.

    So, while it’s obviously possible that webpages genuinely do this wrong, you’re probably seeing such SSO integration and they’re not actually validating the username ahead of time.

    • jadero@programming.dev
      link
      fedilink
      arrow-up
      8
      ·
      7 months ago

      I have seen some that seem to be doing that kind of thing, but many others that will reject a bad username before asking for a password.

      To double check, I just now tried putting a known bad email address into the username field for amazon.ca and was not then asked for a password, but told that no account could be found.

      My possibly flawed understanding of login security is that a failed login should reveal nothing about why the login failed in order to prevent information leakage that can be exploited.

      • Ephera
        link
        fedilink
        arrow-up
        4
        ·
        7 months ago

        Hmm, interesting.

        And yeah, that is my understanding, too. If an attacker knows that a certain e-mail address has an account associated, they might try to bruteforce the password or send a phishing mail to that e-mail address, which looks like an official mail from Amazon.

        I’m guessing, Amazon requires 2FA, which would protect from this to some degree, but still seems unnecessary to hand out information like that.