Jump to content

Google Authenticator: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
No edit summary
needed mention of the problems!
Line 43: Line 43:


With this kind of two-factor authentication, mere knowledge of username and password is not sufficient to break into a user's account. The attacker also needs knowledge of the shared secret key or physical access to the device running the Authenticator app. An alternative route of attack is a [[man-in-the-middle attack]]: if the computer used for the login process is compromised by a [[trojan horse (computing)|trojan]], then username, password and one-time password can be captured by the trojan, which can then initiate its own login session to the site or monitor and modify the communication between user and site.
With this kind of two-factor authentication, mere knowledge of username and password is not sufficient to break into a user's account. The attacker also needs knowledge of the shared secret key or physical access to the device running the Authenticator app. An alternative route of attack is a [[man-in-the-middle attack]]: if the computer used for the login process is compromised by a [[trojan horse (computing)|trojan]], then username, password and one-time password can be captured by the trojan, which can then initiate its own login session to the site or monitor and modify the communication between user and site.

==Vulnerabilities==
Does not protect against phishing <ref>[https://citizenlab.org/2015/08/iran_two_factor_phishing/ Two-Factor Authentication Phishing From Iran]</ref>

Phone-based recovery allows bypass <ref>[http://krebsonsecurity.com/2012/06/attackers-target-weak-spots-in-2-factor-authentication/ Attackers Hit Weak Spots in 2-Factor Authentication]</ref>

Serverside breakin can reveal all secret keys, rendering all user authenticators compromised at once


==Implementations==
==Implementations==

Revision as of 01:39, 3 April 2016

Developer(s)Google
Initial releaseSeptember 20, 2010; 13 years ago (2010-09-20)[1]
Operating systemAndroid, iOS, BlackBerry OS
PlatformMobile
LicenseProprietary (earlier versions were under Apache License 2.0)

Google Authenticator is an application that implements TOTP or HOTP security tokens from RFC 6238 in mobile apps made by Google, sometimes branded "two-step verification". Authenticator provides a six- to eight-digit one-time password which users must provide in addition to their username and password to log into Google services or other sites. The Authenticator can also generate codes for third-party applications, such as password managers or file hosting services. Previous versions of the software were open source but subsequent releases are proprietary.[2]

Typical use case

Typically, users will install the Authenticator app on their smartphone. To log into a site or service that uses two-factor authentication, they provide user name and password to the site and run the Authenticator app which produces an additional six-digit one-time password. The user provides this to the site, the site checks it for correctness and authenticates the user.

For this to work, a set-up operation has to be performed ahead of time: the site provides a shared secret key to the user over a secure channel, to be stored in the Authenticator app. This secret key will be used for all future logins to the site.

With this kind of two-factor authentication, mere knowledge of username and password is not sufficient to break into a user's account. The attacker also needs knowledge of the shared secret key or physical access to the device running the Authenticator app. An alternative route of attack is a man-in-the-middle attack: if the computer used for the login process is compromised by a trojan, then username, password and one-time password can be captured by the trojan, which can then initiate its own login session to the site or monitor and modify the communication between user and site.

Vulnerabilities

Does not protect against phishing [3]

Phone-based recovery allows bypass [4]

Serverside breakin can reveal all secret keys, rendering all user authenticators compromised at once

Implementations

Google provides Android,[5] BlackBerry, and iOS[6] versions of Authenticator. Several third party implementations are available.

  • Windows Phone 7.5/8: Authenticator[7] Virtual TokenFactor[8]
  • Windows Mobile: Google Authenticator for Windows Mobile[9]
  • Java CLI: Authenticator.jar[10]
  • Java GUI: JAuth[11] FXAuth[12]
  • J2ME: gauthj2me[13] lwuitgauthj2me[14] Mobile-OTP (Chinese only)[15] totp-me[16]
  • Palm OS: gauthj2me[17]
  • Python: onetimepass[18]
  • PHP: GoogleAuthenticator.php[19]
  • Ruby: rotp,[20] twofu[21]
  • Rails: active_model_otp[22] (third party implementation)
  • webOS: GAuth[23]
  • Windows: gauth4win[24] MOS Authenticator[25] WinAuth[26]
  • .NET: TwoStepsAuthenticator[27]
  • HTML5: html5-google-authenticator[28]
  • MeeGo/Harmattan (Nokia N9): GAuth[29]
  • Sailfish OS: SGAuth,[30] SailOTP[31]
  • Apache: Google Authenticator Apache Module[32]
  • PAM: Google Pluggable Authentication Module[33] oauth-pam[34]
  • Backend: LinOTP (Management Backend implemented in python)
  • Chrome/Chrome OS: Authenticator[35]
  • iOS: OTP Auth[36]

Technical description

The service provider generates an 80-bit secret key for each user (whereas RFC 4226 §4 requires 128 bits and recommends 160 bits[37]). This is provided as a 16, 24 or 32 character base32 string or as a QR code. The client creates an HMAC-SHA1 using this secret key. The message that is HMAC-ed can be:

  • the number of 30 second periods having elapsed since the Unix epoch (TOTP); or
  • the counter that is incremented with each new code (HOTP).

A portion of the HMAC is extracted and converted to a 6 digit code.

Pseudocode for One Time Password OTP

  function GoogleAuthenticatorCode(string secret)
      key := base32decode(secret)
      message := floor(current Unix time / 30)
      hash := HMAC-SHA1(key, message)
      offset := last nibble of hash
      truncatedHash := hash[offset..offset+3]  //4 bytes starting at the offset
      Set the first bit of truncatedHash to zero  //remove the most significant bit
      code := truncatedHash mod 1000000
      pad code with 0 until length of code is 6
      return code

Pseudocode for Event/Counter OTP

  function GoogleAuthenticatorCode(string secret)
      key := base32decode(secret)
      message := counter encoded on 8 bytes
      hash := HMAC-SHA1(key, message)
      offset := last nibble of hash
      truncatedHash := hash[offset..offset+3]  //4 bytes starting at the offset
      Set the first bit of truncatedHash to zero  //remove the most significant bit
      code := truncatedHash mod 1000000
      pad code with 0 until length of code is 6
      return code

Open Source status on Android

The Authenticator app as available on Google's Android app market is proprietary.[2] Although now Google has moved the source for their Authenticator app to its own GitHub repository, in the past this was explained on the project's development page:

"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."[38]

An independent fork of the Android version of the software named OTP Authenticator[39] has been created, which was based on the last version of the open source code that had been provided by Google, prior to their move to github. Another Open Source fork named FreeOTP[40] is maintained by Red Hat.[2]

Usage

Google Authenticator can be used for the following websites and applications:

References

  1. ^ "Google Is Making Your Account Vastly More Secure With Two-Step Authentication - TechCrunch". TechCrunch. 2010-09-20. Retrieved 2016-03-12.
  2. ^ a b c Willis, Nathan (22 January 2014)."FreeOTP multi-factor authentication". LWN.net. Retrieved 10 August 2015.
  3. ^ Two-Factor Authentication Phishing From Iran
  4. ^ Attackers Hit Weak Spots in 2-Factor Authentication
  5. ^ https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2 A
  6. ^ "Google Authenticator". App Store.
  7. ^ "Authenticator". 4 April 2013.
  8. ^ "Virtual TokenFactor". 26 February 2012.
  9. ^ "[APP]Google Authenticator for Windows Mobile". XDA Developers.
  10. ^ "http://blog dot jamesdotcuff dot net".
  11. ^ "mclamp/JAuth". GitHub.
  12. ^ "kamenitxan/FXAuth". GitHub.
  13. ^ "gauthj2me - Google Authentification in Java Mobile, j2me - Google Project Hosting".
  14. ^ "lwuitgauthj2me - Google Authenticator for J2ME phones - Google Project Hosting".
  15. ^ "chunlinyao / mobile-otp — Bitbucket".
  16. ^ "totp-me - TOTP for Java ME - Google authenticator".
  17. ^ "gauth.prc - gauthj2me - Google Authenticator for Palm OS (converted from java) - Google Authentification in Java Mobile, j2me - Google Project Hosting".
  18. ^ "tadeck/onetimepass". GitHub.
  19. ^ "chregu/GoogleAuthenticator.php". GitHub.
  20. ^ "rotp - RubyGems.org - your community gem host".
  21. ^ "ukazap/twofu". GitHub.
  22. ^ "heapsource/active_model_otp". GitHub.
  23. ^ "GAuth".
  24. ^ "gauth4win - Google Authenticator for windows - Google Project Hosting".
  25. ^ "MOS Authenticator Home".
  26. ^ "winauth - Windows Authenticator for Battle.net / World of Warcraft / Guild Wars 2 / Glyph / WildStar / Google / Bitcoin - Google Project Hosting".
  27. ^ "glacasa/TwoStepsAuthenticator". GitHub.
  28. ^ "gbraad/html5-google-authenticator". GitHub.
  29. ^ Techtransit. "Nokia Store: Download GAuth and many other games, wallpaper, ringtones and mobile apps on your Nokia phone".
  30. ^ "SGAuth".
  31. ^ "SailOTP".
  32. ^ "google-authenticator-apache-module - Apache Module for Two-Factor Authentication via Google Authenticator - Google Project Hosting".
  33. ^ "google-authenticator - Two-step verification - Google Project Hosting".
  34. ^ "oauth-pam - PAM for use with OAuth Websites - Google Project Hosting".
  35. ^ "Authenticator".
  36. ^ "OTP Auth". App Store.
  37. ^ [1]
  38. ^ "google-authenticator - Two-step verification - Google Project Hosting".
  39. ^ "kaie/otp-authenticator-android". GitHub.
  40. ^ "FreeOTP".
  41. ^ "Amazon.com: Online Shopping".
  42. ^ "Amazon Web Services (AWS) - Cloud Computing Services". Amazon Web Services, Inc.
  43. ^ "Added security for your App.net account".
  44. ^ "BasicBrix supports two-factor authentication".
  45. ^ "Bitbucket Blog: Two-step verification is here".
  46. ^ "Update: Bitstamp adds support for two-factor authentication".
  47. ^ "Google Authenticator - My Wallet - blockchain.info".
  48. ^ "BTC-E - Bitcoin Exchange, Namecoin Exchange, Litecoin Exchange, BTC Exchange".
  49. ^ "2-Step Login".
  50. ^ "CipherGraph Networks adds 2-Factor Authentication to the CipherGraph Cloud Access Gateway Cloud Security Solution - CipherGraph Networks : VPN for Cloud and Datacenters".
  51. ^ "What is two-factor authentication (2FA)".
  52. ^ "Secure Bitcoin Storage - Coinbase".
  53. ^ "Cryptocurrency Exchange Comkort".
  54. ^ "Cryptsy - Security".
  55. ^ Alan Henry. "Dashlane Adds Two-Factor Authentication, a New Interface, and More". Lifehacker. Gawker Media.
  56. ^ "SSD Cloud Server, VPS Server, Simple Cloud Hosting - DigitalOcean".
  57. ^ "Doorbell.io - Gather in-app user feedback, simply, across multiple platforms, for free!".
  58. ^ "Enabling Multifactor Authentication".
  59. ^ "Dropbox - How do I enable two-step verification on my account?". Dropbox.
  60. ^ "Google Authenticator login".
  61. ^ "2FA Using A Mobile App".
  62. ^ "Signing In with Google Authenticator - EasyDataMaps". EasyDataMaps.
  63. ^ "Multifactor authentication—ArcGIS Online Help". Esri.
  64. ^ "Evernote". Evernote Blog.
  65. ^ "Two-Factor Authentication... finally! - EVE Community". CCP Games.
  66. ^ "Easy Bitcoin Investment - Bitcoin Exchange UK - Buy and Sell Bitcoins - Digital Currency Exchange - Debit Card".
  67. ^ "Secure your Fastmail account with 2-factor authentication".
  68. ^ "Activating two-factor authentication". 6 March 2014.
  69. ^ "Two-factor Authentication". GitHub.
  70. ^ Debbie Browning. "How to: Enable two-step signin on your Hover account". Hover Help Center.
  71. ^ "JoomlaCode > Projects > Joomla! > Tracker > Joomla! Feature Tracker > Edit Tracker Item".
  72. ^ "Keeper - Security Disclosure".
  73. ^ "Backer Questions » Frequently Asked Questions (FAQ) — Kickstarter".
  74. ^ "Google Authenticator".
  75. ^ "Linode Blog » Linode Manager Two-Step Authentication".
  76. ^ LinOTP LinOTP Management Backend
  77. ^ "login - Google Authenticator for Desktop (lightdm or gdm plugin) - Ask Ubuntu".
  78. ^ Jeff Miccolis. "Two step verification". Mapbox.
  79. ^ "Two-Step Verification".
  80. ^ "NearlyFreeSpeech.NET Blog » Price cuts, more security and recovery options".
  81. ^ "Pobox Help: Profile and Security Info".
  82. ^ "privacyIDEA Features".
  83. ^ "RealMe gets Google Authenticator - RealMe". Department of Internal Affairs [NZ].
  84. ^ https://www.ripe.net/participate/member-support/ripe-ncc-access/faq-two-step-verification/which-authenticator-apps-can-i-use. {{cite web}}: Missing or empty |title= (help)
  85. ^ Jagex. "RuneScape Authenticator". RuneScape.
  86. ^ http://www.bumped.org/psublog/otp-one-time-password-registration-guide-for-pso2/. {{cite web}}: Missing or empty |title= (help)
  87. ^ "ServiceNow Multifactor Authentication".
  88. ^ "Two-step authentication". Shopify Manual. Retrieved 21 December 2014.
  89. ^ https://support.snapchat.com/ca/login-verification. {{cite web}}: Missing or empty |title= (help)
  90. ^ https://soha.io/
  91. ^ http://brukerforum.supportpoint.net
  92. ^ "FREE TACACS+ Server for Windows".
  93. ^ "TeamViewer - Free Remote Control, Remote Access & Online Meetings".
  94. ^ "tibia".
  95. ^ "timetotrade".
  96. ^ https://www.thexyz.com/mobile/
  97. ^ https://trustedspace.agitos.de/webgui/
  98. ^ "Account Security".
  99. ^ "Cloud Hosting - UpCloud".
  100. ^ "Improve your account security by enabling Two-Step-Authorization".
  101. ^ "EnhancedAuthentication".
  102. ^ http://wildstar-online.com
  103. ^ "WordPress › OTP and Passwords for Google Authenticator, McAfee, DS3 ... « WordPress Plugins".
  104. ^ "WordPress › Google Authenticator « WordPress Plugins".
  105. ^ "[FreddysHouse] Two-factor Authentication". XenForo Community.
  106. ^ "Two Factor Authentication". Zoho Mail Control Panel Help. Retrieved 29 November 2015.

External links