What would be the most complete procedure to get a simple login system working securely?

I don’t have formal CS education but i’ve written one or 2 little websites. I have troubles communicating even in my native language but i hope this is understandable.
With simple i mean something like we have a single server to authentica… Continue reading What would be the most complete procedure to get a simple login system working securely?

Is an HMAC of an email address with a permanent secret key a good way to generate security tokens for unsubscribing from an email list?

I’m writing a mailing list manager program. For subscribing and unsubscribing, I’m considering using HMACs of email addresses with secret keys to generate unsubscribe links. This key would be generated one time on the server and then used … Continue reading Is an HMAC of an email address with a permanent secret key a good way to generate security tokens for unsubscribing from an email list?

What exactly happens when you use 2FA with "Password" + "Yubikey HMAC" Login in KeepassXC?

Usecase: KeepassXC is configured with a Passward + Yubikey HMAC.

I am trying to understand the exact steps that happen.
I think the first five Steps are clear:

Open KeepassXC
Enter Password
Select Hardware Key
Click unlock
Yubikey is bli… Continue reading What exactly happens when you use 2FA with "Password" + "Yubikey HMAC" Login in KeepassXC?

How exactly does OpenVPN’s tls-auth option apply HMAC to packet messages?

Update: I’ve been able to work out everything I was asking about packet structure when I was finally able to get Wireshark to work, but there is one last thing I’m confused on which I detail at the end of the question.
Original question:
I… Continue reading How exactly does OpenVPN’s tls-auth option apply HMAC to packet messages?