Originally posted on Updated Two-Factor Authentication with RBLTracker
Your account security is extremely important to us here at RBLTracker. Since our initial inception, we’ve supported two-factor authentication using the Clef application, which provided an easy-to-use two-factor authentication, and single sign-on application.
With the recent news that Clef will be shutting down its services in early June (you can read all about it on the Clef blog), we’ve opted to remove support for it early, and implement an alternative two-factor authentication option using TOTP (Time-Based One-Time Passwords), a standard that won’t be going anywhere anytime soon.
TOTP uses an algorithm to compute a one-time password, based on a shared secret and the current time. One benefit of TOTP, is that the 6-digit authentication token that is generated automatically rolls over with time, which dramatically reduces the susceptibility to phishing schemes.
There are many freely available TOTP clients, but RBLTracker recommends the Google Authenticator application, available for free, for Android, iOS, and Blackberry devices. You can learn more about it here:
Two-factor authentication is available today, and can optionally be enabled on any account on the RBLTracker system. For a complete tutorial on setting up two-factor authentication, see the Setting up Two-Factor Authentication guide.
I’ve released version 1.4.3 of the PEAR Net_DNS2 library- this release is primarily just bug fixes.
You can install it now through the command line PEAR installer:
pear install Net_DNS2
Or, you can also add it to your project using composer:
composer require pear/net_dns2
- fixed an issue when looking up . or com., when using the strict_query_mode flag.
- fixed a bug in the caching logic where I was loading the content more than once per instance, when really I only need to do it once.
- changed the Net_DNS2::sock array to use the SOCK_DGRAM and SOCK_STREAM defines, rather than the strings ‘tcp’ or ‘udp’.
- fixed a bug in the Net_DNS2_Header and Net_DNS2_Question classes, where I was using the wrong bit-shift operators when parsing some of the values. This only became apparent when somebody was trying to use the CAA class (id 257); it was causing this to roll over to the next 8 bit value, and returning 1 (RR A) instead of the CAA class.
- fixed a bug that occurs when a DNS lookup request times out, and then the same class is reused for a subsequent request. Because I’m caching the sockets, the timed out data could eventually come in, and end up being seen as the result for a subsequent lookup.
- fixed a couple cases in NSAP.php where I was comparing a string to an integer.