From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from firstgate.proxmox.com (firstgate.proxmox.com [212.224.123.68]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by lists.proxmox.com (Postfix) with ESMTPS id 63C0A87647 for ; Sat, 1 Jan 2022 18:21:36 +0100 (CET) Received: from firstgate.proxmox.com (localhost [127.0.0.1]) by firstgate.proxmox.com (Proxmox) with ESMTP id 608C32C18D for ; Sat, 1 Jan 2022 18:21:36 +0100 (CET) Received: from server.softcat.org (server.softcat.org [IPv6:2a03:4000:3b:585::1]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by firstgate.proxmox.com (Proxmox) with ESMTPS id 06E962C185 for ; Sat, 1 Jan 2022 18:21:36 +0100 (CET) Received: from [127.0.0.1] (localhost [127.0.0.1]) by localhost (Mailerdaemon) with ESMTPSA id 03C6F9C0A4B; Sat, 1 Jan 2022 18:21:34 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=softcat.org; s=dkim; t=1641057695; h=from:subject:date:message-id:to:cc:mime-version: content-transfer-encoding; bh=wuA8ZJtr8jBCRC+HE0VVu27xqIf5tWlvA9yRAiowVRY=; b=UsBXIVLJIqSrv85Nlk7uwEOLMURAQaU3MlYuJqhMBtFpzf2FoGy6ZOGL8KEs7MuC30MpNN a6ep7a7sfaa3ltMd57Qb99ZOLnuDvlHVxutxrWbNiR1vjxlx6NCp/hw3vodKolyQNWA97Y tqzx4w7U+Yf+5YL0gFdAXBUvnfhZdHbObwODtmL2o721JaaSGjxpXfw33nZla09vtbvEWI 7zD0IJOw7OIfA9vrb2uHnGYBLmFZ9r+j42OfyBLUnMl2ETN6coKH1rxr4ujDmIBa4jnkNS eO1+VzXkxKEKvWLn6gINvBLWCpZWQHocEXpkQaeW9/Qw6iX/NUMUGcZ+CeGQgg== From: Nils Sandmann To: pve-devel@lists.proxmox.com Date: Sat, 1 Jan 2022 18:21:30 +0100 Message-Id: <20220101172130.1802-1-git@softcat.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Last-TLS-Session-Version: TLSv1.3 X-SPAM-LEVEL: Spam detection results: 0 AWL 0.350 Adjusted score from AWL reputation of From: address BAYES_00 -1.9 Bayes spam probability is 0 to 1% DKIM_SIGNED 0.1 Message has a DKIM or DK signature, not necessarily valid DKIM_VALID -0.1 Message has at least one valid DKIM or DK signature DKIM_VALID_AU -0.1 Message has a valid DKIM or DK signature from author's domain DKIM_VALID_EF -0.1 Message has a valid DKIM or DK signature from envelope-from domain SPF_HELO_NONE 0.001 SPF: HELO does not publish an SPF Record SPF_PASS -0.001 SPF: sender matches SPF record URIBL_BLOCKED 0.001 ADMINISTRATOR NOTICE: The query to URIBL was blocked. See http://wiki.apache.org/spamassassin/DnsBlocklists#dnsbl-block for more information. [acme.sh, softcat.org] Subject: [pve-devel] [PATCH 0/1] Add TOTP authentification for ACME DNS INWX X-BeenThere: pve-devel@lists.proxmox.com X-Mailman-Version: 2.1.29 Precedence: list List-Id: Proxmox VE development discussion List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 01 Jan 2022 17:21:36 -0000 The acme.sh DNS API Plugin for provider "INWX" already supports an optional shared secret for an 2FA TOTP login. This patch adds this option to the gui. Can be left blank if no 2FA is configured. Nils Sandmann (1): Add TOTP authentification for ACME DNS INWX src/dns-challenge-schema.json | 4 ++++ 1 file changed, 4 insertions(+) -- 2.34.1.windows.1