@hacks4pancakes I had a fun one a couple weeks ago where the network was complaining I needed a new password (we only do new passwords annually, also MFA).
Which was a great theory, except… the network wasn’t letting me on the network (because expired credentials), so it couldn’t pass my attempt to update password to a system that would then let me on the network.
(I eventually got it to work by hotspotting, logging onto my cloud account via web browser, and resetting password there, then I entered that into the network authentication and it let me in. But still frustrating to see the failure mode of ZT-ish architecture be something I could only fix by circumventing things)
I can sorta understand how they got there:
- every auth failure looks the same so there are no information leaks
- back-end auth method only returns success or failure
Annoying as hell if you're on the outside and can't see what's going on. :(
More internal methods with boolean results need a third possible return code to cover internal errors: `true | false | null` comes to mind.
Informative error messages are worth their weight in gold, as long the user can see them. It does no good to just log them if the user does not have access to the logs.
somehow everyone are skipping to teach & allow users to read & check auth logs