Google Authenticator: Difference between revisions
<ref></ref> |
|||
Line 9: | Line 9: | ||
==Implementations== |
==Implementations== |
||
Google provides [[Android (operating system)|Android]],<ref> |
Google provides [[Android (operating system)|Android]],<ref>https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2 </ref> [[BlackBerry]] and [[iOS]],<ref>http://itunes.apple.com/app/google-authenticator/id388497605?mt=8</ref> versions of Authenticator. Several third party implementations are available. |
||
{{div col}} |
{{div col}} |
||
*Windows Phone 7.5/8: |
*Windows Phone 7.5/8: http://www.windowsphone.com/s?appid=e7994dbc-2336-4950-91ba-ca22d653759b http://www.windowsphone.com/s?appid=8a30b055-500a-4d37-af06-a5121b386ac4 |
||
*Windows Mobile: |
*Windows Mobile: http://forum.xda-developers.com/showthread.php?t=956184 |
||
*Java CLI: |
*Java CLI: http://blog.jcuff.net/2011/02/cli-java-based-google-authenticator.html |
||
*Java GUI: |
*Java GUI: https://github.com/mclamp/jauth#readme |
||
*J2ME: |
*J2ME: http://code.google.com/p/gauthj2me/ http://code.google.com/p/lwuitgauthj2me/ https://bitbucket.org/chunlinyao/mobile-otp/overview http://totpme.sourceforge.net/ |
||
*Palm OS: |
*Palm OS: http://code.google.com/p/gauthj2me/downloads/detail?name=gauth.prc&can=2&q= |
||
*Python: |
*Python: https://github.com/tadeck/onetimepass |
||
*PHP: |
*PHP: https://github.com/chregu/GoogleAuthenticator.php |
||
*Ruby: |
*Ruby: http://rubygems.org/gems/rotp (third party implementation) |
||
*Rails: |
*Rails: https://github.com/heapsource/active_model_otp (third party implementation) |
||
*webOS: |
*webOS: http://gregstoll.dyndns.org/gauth/ |
||
*Windows: |
*Windows: http://code.google.com/p/gauth4win/ http://www.maxoutput.com/authenticator/ https://code.google.com/p/winauth/ |
||
*.NET: |
*.NET: https://github.com/glacasa/TwoStepsAuthenticator |
||
*HTML5: |
*HTML5: https://github.com/gbraad/html5-google-authenticator |
||
*MeeGo/Harmattan (Nokia N9): |
*MeeGo/Harmattan (Nokia N9): http://store.ovi.com/content/273598 |
||
*Sailfish OS: |
*Sailfish OS: https://openrepos.net/content/stozze/sgauth |
||
*Apache: |
*Apache: http://code.google.com/p/google-authenticator-apache-module/ |
||
*PAM: |
*PAM: https://code.google.com/p/google-authenticator/ https://code.google.com/p/oauth-pam/ |
||
*Backend: [[LinOTP]] (Management Backend implemented in python) |
*Backend: [[LinOTP]] (Management Backend implemented in python) |
||
*Chrome/Chrome OS: |
*Chrome/Chrome OS: https://chrome.google.com/webstore/detail/bhghoamapcdpbohphigoooaddinpkbai |
||
*iOS: |
*iOS: https://itunes.apple.com/us/app/otp-auth/id659877384?mt=8 |
||
{{div col end}} |
{{div col end}} |
||
Line 72: | Line 72: | ||
The Authenticator app as available on Google's Android app market is proprietary, as explained on the project's development page: |
The Authenticator app as available on Google's Android app market is proprietary, as explained on the project's development page: |
||
<blockquote>"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."<ref>[http://code.google.com/p/google-authenticator/ Open Source status of Google Authenticator on Android]</ref></blockquote> |
<blockquote>"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."<ref>[http://code.google.com/p/google-authenticator/ Open Source status of Google Authenticator on Android]</ref></blockquote> |
||
An independent fork of the Android version of the software named OTP Authenticator<ref> |
An independent fork of the Android version of the software named OTP Authenticator<ref>https://github.com/kaie/otp-authenticator-android</ref> has been created, which is based on the last version of the open source code that had been provided by Google. Another Open Source fork named FreeOTP<ref>https://fedorahosted.org/freeotp/</ref> has been published by [[Red Hat]]. |
||
==Usage== |
==Usage== |
||
Line 89: | Line 89: | ||
* [[Buffer_(application)|Buffer]]<ref>https://bufferapp.com/2step</ref> |
* [[Buffer_(application)|Buffer]]<ref>https://bufferapp.com/2step</ref> |
||
* CaVirtEx.com |
* CaVirtEx.com |
||
* [[Cex.io]]<ref>https://cex.io/r/1/johs633new/0/ |
* [[Cex.io]]<ref>https://cex.io/r/1/johs633new/0/</ref> |
||
* [[CipherGraph Networks]]<ref> |
* [[CipherGraph Networks]]<ref>http://www.ciphergraph.com/press-release-2/ciphergraph-networks-adds-two-factor-authentication-to-the-ciphergraph-cloud-access-gateway-cloud-security-solution/</ref> |
||
* [[Coinbase]]<ref>https://coinbase.com/security</ref> |
* [[Coinbase]]<ref>https://coinbase.com/security</ref> |
||
* [[Comkort]]<ref>https://comkort.com/user/edit#securities</ref> |
* [[Comkort]]<ref>https://comkort.com/user/edit#securities</ref> |
||
* [[Cryptsy]]<ref>https://www.cryptsy.com/pages/security</ref> |
* [[Cryptsy]]<ref>https://www.cryptsy.com/pages/security</ref> |
||
* [[Dashlane]]<ref> |
* [[Dashlane]]<ref>http://lifehacker.com/dashlane-adds-two-factor-authentication-a-new-interfac-509805711</ref> |
||
* [[DigitalOcean]]<ref> |
* [[DigitalOcean]]<ref>https://www.digitalocean.com/features</ref> |
||
* |
* https://doorbell.io |
||
* [[Dreamhost]] control panel<ref> |
* [[Dreamhost]] control panel<ref>http://wiki.dreamhost.com/Enabling_Multifactor_Authentication</ref> |
||
* [[Dropbox (service)|Dropbox]]<ref> |
* [[Dropbox (service)|Dropbox]]<ref>https://www.dropbox.com/help/363/en</ref> |
||
* [[Drupal]] ( |
* [[Drupal]] (http://drupal.org/project/ga_login is needed) |
||
* [[Evernote]]<ref>http://blog.evernote.com/blog/2013/05/30/evernote-talks-2-step-verification/</ref> |
* [[Evernote]]<ref>http://blog.evernote.com/blog/2013/05/30/evernote-talks-2-step-verification/</ref> |
||
* [[E-coin.io]]<ref>https://www.e-coin.io/</ref> |
* [[E-coin.io]]<ref>https://www.e-coin.io/</ref> |
||
* [[Facebook]]<ref> |
* [[Facebook]]<ref>http://mbmccormick.com/2013/01/use-facebooks-2-factor-authentication-with-third-party-totp-generators/</ref> |
||
* [[Gaia Online]] |
* [[Gaia Online]] |
||
* [[Gandi.net]]<ref>https://wiki.gandi.net/en/contacts/login/2-factor-activation</ref> |
* [[Gandi.net]]<ref>https://wiki.gandi.net/en/contacts/login/2-factor-activation</ref> |
||
Line 114: | Line 114: | ||
* [[Kickstarter]]<ref>https://www.kickstarter.com/help/faq/backer+questions?ref=faq_livesearch#faq_63004</ref> |
* [[Kickstarter]]<ref>https://www.kickstarter.com/help/faq/backer+questions?ref=faq_livesearch#faq_63004</ref> |
||
* [[LakeBTC]] |
* [[LakeBTC]] |
||
* [[LastPass]]<ref> |
* [[LastPass]]<ref>https://helpdesk.lastpass.com/security-options/google-authenticator/</ref> |
||
* [[Linode]]<ref>[https://blog.linode.com/2013/05/02/linode-manager-two-step-auth/ Linode Manager Two-Step Authentication]</ref> |
* [[Linode]]<ref>[https://blog.linode.com/2013/05/02/linode-manager-two-step-auth/ Linode Manager Two-Step Authentication]</ref> |
||
* [[LinOTP]]<ref> |
* [[LinOTP]]<ref>LinOTP LinOTP Management Backend</ref> |
||
* [[LocalBitcoins]] |
* [[LocalBitcoins]] |
||
* Linux (through libpam-google-authenticator)<ref> |
* Linux (through libpam-google-authenticator)<ref>http://askubuntu.com/questions/193248/google-authenticator-for-desktop-lightdm-or-gdm-plugin</ref> |
||
* [[Microsoft account]] |
* [[Microsoft account]] |
||
* [[Mt. Gox]]<ref>[https://mtgox.com/press_release_20120605.html Boost your account security thanks to Mt.Gox's new Security Center]</ref> |
* [[Mt. Gox]]<ref>[https://mtgox.com/press_release_20120605.html Boost your account security thanks to Mt.Gox's new Security Center]</ref> |
||
* [[Nearlyfreespeech.net]] <ref> |
* [[Nearlyfreespeech.net]] <ref>https://blog.nearlyfreespeech.net/2014/02/28/price-cuts-more-security-and-recovery-options/</ref> |
||
* [[Net4Game]] |
* [[Net4Game]] |
||
* [[Okcoin]] |
* [[Okcoin]] |
||
Line 130: | Line 130: | ||
* [[Siteground.com]] |
* [[Siteground.com]] |
||
* [[Synology]] |
* [[Synology]] |
||
* |
* http://brukerforum.supportpoint.net (Version 3). |
||
* |
* http://www.tacacs.net |
||
* |
* http://www.teamviewer.com (Version 9). |
||
* |
* http://www.timetotrade.eu |
||
* [[TrustedSpace.de]]<ref>https://trustedspace.agitos.de/webgui/</ref> |
* [[TrustedSpace.de]]<ref>https://trustedspace.agitos.de/webgui/</ref> |
||
* [[Tumblr]]<ref>http://www.tumblr.com/docs/en/two_factor_auth</ref> |
* [[Tumblr]]<ref>http://www.tumblr.com/docs/en/two_factor_auth</ref> |
||
Line 139: | Line 139: | ||
* [[Webmin]] (Version 1.660 and above)<ref>http://doxfer.webmin.com/Webmin/EnhancedAuthentication</ref> |
* [[Webmin]] (Version 1.660 and above)<ref>http://doxfer.webmin.com/Webmin/EnhancedAuthentication</ref> |
||
* [[WildStar (video game)]]<ref>http://wildstar-online.com</ref> |
* [[WildStar (video game)]]<ref>http://wildstar-online.com</ref> |
||
* [[WordPress]] ( |
* [[WordPress]] (http://wordpress.org/extend/plugins/s-crib-otp-authentication/ or http://wordpress.org/extend/plugins/google-authenticator/ plugins needed) |
||
* [[Xat]] |
* [[Xat]] |
||
* [[XenForo]] ( |
* [[XenForo]] (http://xenforo.com/community/resources/freddyshouse-two-factor-authentication.1663/ is needed) |
||
{{div col end}} |
{{div col end}} |
||
Revision as of 22:27, 16 December 2014
Google Authenticator is an application that implements TOTP security tokens from RFC 6238 in mobile apps made by Google, sometimes branded "two-step authentication". Authenticator provides a six to eight digit one-time password users must provide in addition to their username and password to log into Google services or other sites. The Authenticator can also generate codes for third party applications, such as password managers or file hosting services. Previous versions of the software were open source.
Typical use case
Typically, users will install the Authenticator app on their smartphone. To log into a site or service that uses two-factor authentication, they provide user name and password to the site and run the Authenticator app which produces an additional six-digit one-time password. The user provides this to the site, the site checks it for correctness and authenticates the user.
For this to work, a set-up operation has to be performed ahead of time: the site provides a shared secret key to the user over a secure channel, to be stored in the Authenticator app. This secret key will be used for all future logins to the site.
With this kind of two-factor authentication, mere knowledge of username and password is not sufficient to break into a user's account. The attacker also needs knowledge of the shared secret or physical access to the device running the Authenticator app. An alternative route of attack is a man-in-the-middle attack: if the computer used for the login process is compromised by a trojan, then username, password and one-time password can be captured by the trojan, which can then initiate its own login session to the site or monitor and modify the communication between user and site.
Implementations
Google provides Android,[1] BlackBerry and iOS,[2] versions of Authenticator. Several third party implementations are available.
- Windows Phone 7.5/8: Authenticator[3] Virtual TokenFactor[4]
- Windows Mobile: Google Authenticator for Windows Mobile[5]
- Java CLI: Authenticator.jar[6]
- Java GUI: JAuth[7]
- J2ME: gauthj2me[8] lwuitgauthj2me[9] Mobile-OTP (chinese only)[10] totp-me[11]
- Palm OS: gauthj2me[12]
- Python: onetimepass[13]
- PHP: GoogleAuthenticator.php[14]
- Ruby: gem[15] (third party implementation)
- Rails: active_model_otp[16] (third party implementation)
- webOS: GAuth[17]
- Windows: gauth4win[18] MOS Authenticator[19] WinAuth[20]
- .NET: TwoStepsAuthenticator[21]
- HTML5: html5-google-authenticator[22]
- MeeGo/Harmattan (Nokia N9): GAuth[23]
- Sailfish OS: SGAuth[24]
- Apache: Google Authenticator Apache Module[25]
- PAM: Google Pluggable Authentication Module[26] oauth-pam[27]
- Backend: LinOTP (Management Backend implemented in python)
- Chrome/Chrome OS: Authenticator[28]
- iOS: OTP Auth[29]
Technical description
The service provider generates an 80-bit secret key for each user. This is provided as a 16, 24 or 32 character base32 string or as a QR code. The client creates an HMAC-SHA1 using this secret key. The message that is HMAC-ed can be:
- the number of 30 second periods having elapsed since the Unix epoch; or
- the counter that is incremented with each new code.
A portion of the HMAC is extracted and converted to a 6 digit code.
Pseudocode for Time OTP
function GoogleAuthenticatorCode(string secret)
key := base32decode(secret)
message := floor(current Unix time / 30)
hash := HMAC-SHA1(key, message)
offset := value of last nibble of hash
truncatedHash := hash[offset..offset+3] //4 bytes starting at the offset
Set the first bit of truncatedHash to zero //remove the most significant bit
code := truncatedHash mod 1000000
pad code with 0 until length of code is 6
return code
Pseudocode for Event/Counter OTP
function GoogleAuthenticatorCode(string secret)
key := base32decode(secret)
message := counter encoded on 8 bytes
hash := HMAC-SHA1(key, message)
offset := last nibble of hash
truncatedHash := hash[offset..offset+3] //4 bytes starting at the offset
Set the first bit of truncatedHash to zero //remove the most significant bit
code := truncatedHash mod 1000000
pad code with 0 until length of code is 6
return code
Open Source status on Android
The Authenticator app as available on Google's Android app market is proprietary, as explained on the project's development page:
"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."[30]
An independent fork of the Android version of the software named OTP Authenticator[31] has been created, which is based on the last version of the open source code that had been provided by Google. Another Open Source fork named FreeOTP[32] has been published by Red Hat.
Usage
Google Authenticator can be used for the following websites and applications:
- Amazon Web Services[33]
- ANXBTC
- ANXPRO
- Atomic-Trade.com
- App.net[34]
- ArenaNet for access to Guild Wars 2
- Bitstamp[35]
- Bitcoin.de
- Blockchain.info[36]
- BTC-e.com[37]
- Buffer[38]
- CaVirtEx.com
- Cex.io[39]
- CipherGraph Networks[40]
- Coinbase[41]
- Comkort[42]
- Cryptsy[43]
- Dashlane[44]
- DigitalOcean[45]
- Doorbell.io[46]
- Dreamhost control panel[47]
- Dropbox[48]
- Drupal (Plugin[49] is needed)
- Evernote[50]
- E-coin.io[51]
- Facebook[52]
- Gaia Online
- Gandi.net[53]
- GitHub[54]
- Guild Wars 2
- Google Apps
- Google Mail
- HootSuite
- Hover[55]
- Joomla (since 3.2 it is built-in)[56]
- Kickstarter[57]
- LakeBTC
- LastPass[58]
- Linode[59]
- LinOTP[60]
- LocalBitcoins
- Linux (through libpam-google-authenticator)[61]
- Microsoft account
- Mt. Gox[62]
- Nearlyfreespeech.net [63]
- Net4Game
- Okcoin
- OpenVPN
- Pobox[64]
- RuneScape [65]
- Salesforce.com
- Siteground.com
- Synology
- SupportPoint[66] (Version 3).
- TACACS.net[67]
- Teamviewer[68] (Version 9).
- timetotrade[69]
- TrustedSpace.de[70]
- Tumblr[71]
- VK
- Webmin (Version 1.660 and above)[72]
- WildStar (video game)[73]
- WordPress (S-CRIB OTP Authenticator[74] or Google Authentication[75] plugins needed)
- Xat
- XenForo (Add-on[76] is needed)
References
- ^ https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2 A
- ^ http://itunes.apple.com/app/google-authenticator/id388497605?mt=8
- ^ http://www.windowsphone.com/s?appid=e7994dbc-2336-4950-91ba-ca22d653759b
- ^ http://www.windowsphone.com/s?appid=8a30b055-500a-4d37-af06-a5121b386ac4
- ^ http://forum.xda-developers.com/showthread.php?t=956184
- ^ http://blog.jcuff.net/2011/02/cli-java-based-google-authenticator.html
- ^ https://github.com/mclamp/jauth#readme
- ^ http://code.google.com/p/gauthj2me/
- ^ http://code.google.com/p/lwuitgauthj2me/
- ^ https://bitbucket.org/chunlinyao/mobile-otp/overview
- ^ http://totpme.sourceforge.net/
- ^ http://code.google.com/p/gauthj2me/downloads/detail?name=gauth.prc&can=2&q=
- ^ https://github.com/tadeck/onetimepass
- ^ https://github.com/chregu/GoogleAuthenticator.php
- ^ http://rubygems.org/gems/rotp
- ^ https://github.com/heapsource/active_model_otp
- ^ http://gregstoll.dyndns.org/gauth/
- ^ http://code.google.com/p/gauth4win/
- ^ http://www.maxoutput.com/authenticator/
- ^ https://code.google.com/p/winauth/
- ^ https://github.com/glacasa/TwoStepsAuthenticator
- ^ https://github.com/gbraad/html5-google-authenticator
- ^ http://store.ovi.com/content/273598
- ^ https://openrepos.net/content/stozze/sgauth
- ^ http://code.google.com/p/google-authenticator-apache-module/
- ^ https://code.google.com/p/google-authenticator/
- ^ https://code.google.com/p/oauth-pam/
- ^ https://chrome.google.com/webstore/detail/bhghoamapcdpbohphigoooaddinpkbai
- ^ https://itunes.apple.com/us/app/otp-auth/id659877384?mt=8
- ^ Open Source status of Google Authenticator on Android
- ^ https://github.com/kaie/otp-authenticator-android
- ^ https://fedorahosted.org/freeotp/
- ^ http://aws.amazon.com/
- ^ Added security for your App.net account
- ^ Update: Bitstamp adds support for two-factor authentication
- ^ https://blockchain.info/nl/wallet/google-authenticator
- ^ https://btc-e.com/
- ^ https://bufferapp.com/2step
- ^ https://cex.io/r/1/johs633new/0/
- ^ http://www.ciphergraph.com/press-release-2/ciphergraph-networks-adds-two-factor-authentication-to-the-ciphergraph-cloud-access-gateway-cloud-security-solution/
- ^ https://coinbase.com/security
- ^ https://comkort.com/user/edit#securities
- ^ https://www.cryptsy.com/pages/security
- ^ http://lifehacker.com/dashlane-adds-two-factor-authentication-a-new-interfac-509805711
- ^ https://www.digitalocean.com/features
- ^ https://doorbell.io
- ^ http://wiki.dreamhost.com/Enabling_Multifactor_Authentication
- ^ https://www.dropbox.com/help/363/en
- ^ http://drupal.org/project/ga_login
- ^ http://blog.evernote.com/blog/2013/05/30/evernote-talks-2-step-verification/
- ^ https://www.e-coin.io/
- ^ http://mbmccormick.com/2013/01/use-facebooks-2-factor-authentication-with-third-party-totp-generators/
- ^ https://wiki.gandi.net/en/contacts/login/2-factor-activation
- ^ https://github.com/blog/1614-two-factor-authentication
- ^ https://help.hover.com/entries/26677644-How-to-Enable-two-step-signin-on-your-Hover-account
- ^ http://joomlacode.org/gf/project/joomla/tracker/?action=TrackerItemEdit&tracker_item_id=31704
- ^ https://www.kickstarter.com/help/faq/backer+questions?ref=faq_livesearch#faq_63004
- ^ https://helpdesk.lastpass.com/security-options/google-authenticator/
- ^ Linode Manager Two-Step Authentication
- ^ LinOTP LinOTP Management Backend
- ^ http://askubuntu.com/questions/193248/google-authenticator-for-desktop-lightdm-or-gdm-plugin
- ^ Boost your account security thanks to Mt.Gox's new Security Center
- ^ https://blog.nearlyfreespeech.net/2014/02/28/price-cuts-more-security-and-recovery-options/
- ^ http://www.pobox.com/helpspot/index.php?pg=kb.printer.friendly&id=21#p363
- ^ http://services.runescape.com/m=news/a=13/runescape-authenticator?jptg=ia&jptv=community_news
- ^ http://brukerforum.supportpoint.net
- ^ http://www.tacacs.net
- ^ http://www.teamviewer.com
- ^ http://www.timetotrade.eu
- ^ https://trustedspace.agitos.de/webgui/
- ^ http://www.tumblr.com/docs/en/two_factor_auth
- ^ http://doxfer.webmin.com/Webmin/EnhancedAuthentication
- ^ http://wildstar-online.com
- ^ http://wordpress.org/extend/plugins/s-crib-otp-authentication/
- ^ http://wordpress.org/extend/plugins/google-authenticator/
- ^ http://xenforo.com/community/resources/freddyshouse-two-factor-authentication.1663/
External links
- Google Authenticator on Google Help
- Google Authenticator open source project on Google Code
- Google Authenticator implementation in Python on Stack Overflow
- Google Authenticator Android package at the F-Droid repository