Jump to content

Google Authenticator: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
historical update
Line 35: Line 35:
}}
}}


'''Google Authenticator''' is an application that implements [[Time-based One-time Password Algorithm|TOTP]] or [[HOTP]] [[Security token#Mobile device tokens|security tokens]] from RFC 6238 in mobile apps made by [[Google]], sometimes branded "[[two-step verification]]". Authenticator provides a six- to eight-digit [[one-time password]] which users must provide in addition to their username and password to log into Google services or other sites. The Authenticator can also generate codes for third-party applications, such as [[password manager]]s or [[file hosting service]]s. Previous versions of the software were [[open-source software|open source]] but subsequent releases are [[proprietary software|proprietary]].<ref name=lwn-otp>Willis, Nathan (22 January 2014)."''[https://lwn.net/Articles/581086 FreeOTP multi-factor authentication]''". ''LWN.net''. Retrieved 10 August 2015.</ref>
'''Google Authenticator''' is an obsolete<ref>Schneier, Bruce (15 March 2005)."''[https://www.schneier.com/blog/archives/2005/03/the_failure_of.html The Failure of Two-Factor Authentication]''". ''schneier.com''.</ref> application that implements [[Time-based One-time Password Algorithm|TOTP]] or [[HOTP]] [[Security token#Mobile device tokens|security tokens]] from RFC 6238 in mobile apps made by [[Google]], sometimes branded "[[two-step verification]]". Authenticator provides a six- to eight-digit [[one-time password]] which users must provide in addition to their username and password to log into Google services or other sites. The Authenticator can also generate codes for third-party applications, such as [[password manager]]s or [[file hosting service]]s. Previous versions of the software were [[open-source software|open source]] but subsequent releases are [[proprietary software|proprietary]].<ref name=lwn-otp>Willis, Nathan (22 January 2014)."''[https://lwn.net/Articles/581086 FreeOTP multi-factor authentication]''". ''LWN.net''. Retrieved 10 August 2015.</ref>. OTP security has been ineffective since at least 1995<ref>Schneier, Bruce (15 March 2005)."''[https://www.schneier.com/blog/archives/2005/03/the_failure_of.html The Failure of Two-Factor Authentication]''". ''schneier.com''.</ref>.


==Typical use case==
==Typical use case==

Revision as of 14:40, 17 April 2016

Developer(s)Google
Initial releaseSeptember 20, 2010; 13 years ago (2010-09-20)[1]
Stable release
Android7.0 / August 28, 2024; 3 days ago (2024-08-28)[2][3]
iOS4.2.1 / June 26, 2024; 2 months ago (2024-06-26)[4]
Operating systemAndroid, iOS, BlackBerry OS
PlatformMobile
LicenseProprietary (earlier versions were under Apache License 2.0)

Google Authenticator is an obsolete[5] application that implements TOTP or HOTP security tokens from RFC 6238 in mobile apps made by Google, sometimes branded "two-step verification". Authenticator provides a six- to eight-digit one-time password which users must provide in addition to their username and password to log into Google services or other sites. The Authenticator can also generate codes for third-party applications, such as password managers or file hosting services. Previous versions of the software were open source but subsequent releases are proprietary.[6]. OTP security has been ineffective since at least 1995[7].

Typical use case

Typically, users will install the Authenticator app on their smartphone. To log into a site or service that uses two-factor authentication, they provide user name and password to the site and run the Authenticator app which produces an additional six-digit one-time password. The user provides this to the site, the site checks it for correctness and authenticates the user.

For this to work, a set-up operation has to be performed ahead of time: the site provides a shared secret key to the user over a secure channel, to be stored in the Authenticator app. This secret key will be used for all future logins to the site.

With this kind of two-factor authentication, mere knowledge of username and password is not sufficient to break into a user's account. The attacker also needs knowledge of the shared secret key or physical access to the device running the Authenticator app. An alternative route of attack is a man-in-the-middle attack: if the computer used for the login process is compromised by a trojan, then username, password and one-time password can be captured by the trojan, which can then initiate its own login session to the site or monitor and modify the communication between user and site.

Vulnerabilities

Does not protect against phishing [8]

Phone-based recovery allows bypass [9]

Serverside breakin can reveal all secret keys, rendering all user authenticators compromised at once

Implementations

Google provides Android,[10] BlackBerry, and iOS[11] versions of Authenticator. Several third party implementations are available.

  • Windows Phone 7.5/8/8.1/10: Microsoft Authenticator[12] Virtual TokenFactor[13]
  • Windows Mobile: Google Authenticator for Windows Mobile[14]
  • Java CLI: Authenticator.jar[15]
  • Java GUI: JAuth[16] FXAuth[17]
  • J2ME: gauthj2me[18] lwuitgauthj2me[19] Mobile-OTP (Chinese only)[20] totp-me[21]
  • Palm OS: gauthj2me[22]
  • Python: onetimepass[23]
  • PHP: GoogleAuthenticator.php[24]
  • Ruby: rotp,[25] twofu[26]
  • Rails: active_model_otp[27] (third party implementation)
  • webOS: GAuth[28]
  • Windows: gauth4win[29] MOS Authenticator[30] WinAuth[31]
  • .NET: TwoStepsAuthenticator[32]
  • HTML5: html5-google-authenticator[33]
  • MeeGo/Harmattan (Nokia N9): GAuth[34]
  • Sailfish OS: SGAuth,[35] SailOTP[36]
  • Apache: Google Authenticator Apache Module[37]
  • PAM: Google Pluggable Authentication Module[38] oauth-pam[39]
  • Backend: LinOTP (Management Backend implemented in python)
  • Chrome/Chrome OS: Authenticator[40]
  • iOS: OTP Auth[41]

Technical description

The service provider generates an 80-bit secret key for each user (whereas RFC 4226 §4 requires 128 bits and recommends 160 bits[42]). This is provided as a 16, 24 or 32 character base32 string or as a QR code. The client creates an HMAC-SHA1 using this secret key. The message that is HMAC-ed can be:

  • the number of 30 second periods having elapsed since the Unix epoch (TOTP); or
  • the counter that is incremented with each new code (HOTP).

A portion of the HMAC is extracted and converted to a 6 digit code.

Pseudocode for One Time Password OTP

  function GoogleAuthenticatorCode(string secret)
      key := base32decode(secret)
      message := floor(current Unix time / 30)
      hash := HMAC-SHA1(key, message)
      offset := last nibble of hash
      truncatedHash := hash[offset..offset+3]  //4 bytes starting at the offset
      Set the first bit of truncatedHash to zero  //remove the most significant bit
      code := truncatedHash mod 1000000
      pad code with 0 until length of code is 6
      return code

Pseudocode for Event/Counter OTP

  function GoogleAuthenticatorCode(string secret)
      key := base32decode(secret)
      message := counter encoded on 8 bytes
      hash := HMAC-SHA1(key, message)
      offset := last nibble of hash
      truncatedHash := hash[offset..offset+3]  //4 bytes starting at the offset
      Set the first bit of truncatedHash to zero  //remove the most significant bit
      code := truncatedHash mod 1000000
      pad code with 0 until length of code is 6
      return code

Open Source status on Android

The Authenticator app as available on Google's Android app market is proprietary.[6] Although now Google has moved the source for their Authenticator app to its own GitHub repository, in the past this was explained on the project's development page:

"This open source project allows you to download the code that powered version 2.21 of the application. Subsequent versions contain Google-specific workflows that are not part of the project."[43]

An independent fork of the Android version of the software named OTP Authenticator[44] has been created, which was based on the last version of the open source code that had been provided by Google, prior to their move to github. Another Open Source fork named FreeOTP[45] is maintained by Red Hat.[6]

Usage

Google Authenticator can be used for the following websites and applications:

References

  1. ^ "Google Is Making Your Account Vastly More Secure With Two-Step Authentication - TechCrunch". TechCrunch. 2010-09-20. Retrieved 2016-03-12.
  2. ^ "Google Authenticator". Google Play. Retrieved 2024-08-30.
  3. ^ "Google Authenticator 7.0". APKMirror. 2024-08-28. Retrieved 2024-08-30.
  4. ^ "Google Authenticator". App Store. Retrieved 2024-08-30.
  5. ^ Schneier, Bruce (15 March 2005)."The Failure of Two-Factor Authentication". schneier.com.
  6. ^ a b c Willis, Nathan (22 January 2014)."FreeOTP multi-factor authentication". LWN.net. Retrieved 10 August 2015.
  7. ^ Schneier, Bruce (15 March 2005)."The Failure of Two-Factor Authentication". schneier.com.
  8. ^ Two-Factor Authentication Phishing From Iran
  9. ^ Attackers Hit Weak Spots in 2-Factor Authentication
  10. ^ https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2 A
  11. ^ "Google Authenticator". App Store.
  12. ^ "Authenticator". 4 April 2013.
  13. ^ "Virtual TokenFactor". 26 February 2012.
  14. ^ "[APP]Google Authenticator for Windows Mobile". XDA Developers.
  15. ^ "http://blog dot jamesdotcuff dot net".
  16. ^ "mclamp/JAuth". GitHub.
  17. ^ "kamenitxan/FXAuth". GitHub.
  18. ^ "gauthj2me - Google Authentification in Java Mobile, j2me - Google Project Hosting".
  19. ^ "lwuitgauthj2me - Google Authenticator for J2ME phones - Google Project Hosting".
  20. ^ "chunlinyao / mobile-otp — Bitbucket".
  21. ^ "totp-me - TOTP for Java ME - Google authenticator".
  22. ^ "gauth.prc - gauthj2me - Google Authenticator for Palm OS (converted from java) - Google Authentification in Java Mobile, j2me - Google Project Hosting".
  23. ^ "tadeck/onetimepass". GitHub.
  24. ^ "chregu/GoogleAuthenticator.php". GitHub.
  25. ^ "rotp - RubyGems.org - your community gem host".
  26. ^ "ukazap/twofu". GitHub.
  27. ^ "heapsource/active_model_otp". GitHub.
  28. ^ "GAuth".
  29. ^ "gauth4win - Google Authenticator for windows - Google Project Hosting".
  30. ^ "MOS Authenticator Home".
  31. ^ "winauth - Windows Authenticator for Battle.net / World of Warcraft / Guild Wars 2 / Glyph / WildStar / Google / Bitcoin - Google Project Hosting".
  32. ^ "glacasa/TwoStepsAuthenticator". GitHub.
  33. ^ "gbraad/html5-google-authenticator". GitHub.
  34. ^ Techtransit. "Nokia Store: Download GAuth and many other games, wallpaper, ringtones and mobile apps on your Nokia phone".
  35. ^ "SGAuth".
  36. ^ "SailOTP".
  37. ^ "google-authenticator-apache-module - Apache Module for Two-Factor Authentication via Google Authenticator - Google Project Hosting".
  38. ^ "google-authenticator - Two-step verification - Google Project Hosting".
  39. ^ "oauth-pam - PAM for use with OAuth Websites - Google Project Hosting".
  40. ^ "Authenticator".
  41. ^ "OTP Auth". App Store.
  42. ^ [1]
  43. ^ "google-authenticator - Two-step verification - Google Project Hosting".
  44. ^ "kaie/otp-authenticator-android". GitHub.
  45. ^ "FreeOTP".
  46. ^ "Amazon.com: Online Shopping".
  47. ^ "Amazon Web Services (AWS) - Cloud Computing Services". Amazon Web Services, Inc.
  48. ^ "Added security for your App.net account".
  49. ^ "BasicBrix supports two-factor authentication".
  50. ^ "Bitbucket Blog: Two-step verification is here".
  51. ^ "Update: Bitstamp adds support for two-factor authentication".
  52. ^ "Google Authenticator - My Wallet - blockchain.info".
  53. ^ "BTC-E - Bitcoin Exchange, Namecoin Exchange, Litecoin Exchange, BTC Exchange".
  54. ^ "2-Step Login".
  55. ^ "CipherGraph Networks adds 2-Factor Authentication to the CipherGraph Cloud Access Gateway Cloud Security Solution - CipherGraph Networks : VPN for Cloud and Datacenters".
  56. ^ "What is two-factor authentication (2FA)".
  57. ^ "Secure Bitcoin Storage - Coinbase".
  58. ^ "Cryptocurrency Exchange Comkort".
  59. ^ "Cryptsy - Security".
  60. ^ Alan Henry. "Dashlane Adds Two-Factor Authentication, a New Interface, and More". Lifehacker. Gawker Media.
  61. ^ "SSD Cloud Server, VPS Server, Simple Cloud Hosting - DigitalOcean".
  62. ^ "Doorbell.io - Gather in-app user feedback, simply, across multiple platforms, for free!".
  63. ^ "Enabling Multifactor Authentication".
  64. ^ "Dropbox - How do I enable two-step verification on my account?". Dropbox.
  65. ^ "Google Authenticator login".
  66. ^ "2FA Using A Mobile App".
  67. ^ "Signing In with Google Authenticator - EasyDataMaps". EasyDataMaps.
  68. ^ "Multifactor authentication—ArcGIS Online Help". Esri.
  69. ^ "Evernote". Evernote Blog.
  70. ^ "Two-Factor Authentication... finally! - EVE Community". CCP Games.
  71. ^ "Easy Bitcoin Investment - Bitcoin Exchange UK - Buy and Sell Bitcoins - Digital Currency Exchange - Debit Card".
  72. ^ "Secure your Fastmail account with 2-factor authentication".
  73. ^ "Activating two-factor authentication". 6 March 2014.
  74. ^ "Two-factor Authentication". GitHub.
  75. ^ Debbie Browning. "How to: Enable two-step signin on your Hover account". Hover Help Center.
  76. ^ "JoomlaCode > Projects > Joomla! > Tracker > Joomla! Feature Tracker > Edit Tracker Item".
  77. ^ "Keeper - Security Disclosure".
  78. ^ "Backer Questions » Frequently Asked Questions (FAQ) — Kickstarter".
  79. ^ "Google Authenticator".
  80. ^ "Linode Blog » Linode Manager Two-Step Authentication".
  81. ^ LinOTP LinOTP Management Backend
  82. ^ "login - Google Authenticator for Desktop (lightdm or gdm plugin) - Ask Ubuntu".
  83. ^ Jeff Miccolis. "Two step verification". Mapbox.
  84. ^ "Two-Step Verification".
  85. ^ "NearlyFreeSpeech.NET Blog » Price cuts, more security and recovery options".
  86. ^ "Pobox Help: Profile and Security Info".
  87. ^ "privacyIDEA Features".
  88. ^ "RealMe gets Google Authenticator - RealMe". Department of Internal Affairs [NZ].
  89. ^ https://www.ripe.net/participate/member-support/ripe-ncc-access/faq-two-step-verification/which-authenticator-apps-can-i-use. {{cite web}}: Missing or empty |title= (help)
  90. ^ Jagex. "RuneScape Authenticator". RuneScape.
  91. ^ http://www.bumped.org/psublog/otp-one-time-password-registration-guide-for-pso2/. {{cite web}}: Missing or empty |title= (help)
  92. ^ "ServiceNow Multifactor Authentication".
  93. ^ "Two-step authentication". Shopify Manual. Retrieved 21 December 2014.
  94. ^ https://support.snapchat.com/ca/login-verification. {{cite web}}: Missing or empty |title= (help)
  95. ^ https://soha.io/
  96. ^ http://brukerforum.supportpoint.net
  97. ^ "FREE TACACS+ Server for Windows".
  98. ^ "TeamViewer - Free Remote Control, Remote Access & Online Meetings".
  99. ^ "tibia".
  100. ^ "timetotrade".
  101. ^ https://www.thexyz.com/mobile/
  102. ^ https://trustedspace.agitos.de/webgui/
  103. ^ "Account Security".
  104. ^ "Cloud Hosting - UpCloud".
  105. ^ "Improve your account security by enabling Two-Step-Authorization".
  106. ^ "EnhancedAuthentication".
  107. ^ http://wildstar-online.com
  108. ^ "WordPress › OTP and Passwords for Google Authenticator, McAfee, DS3 ... « WordPress Plugins".
  109. ^ "WordPress › Google Authenticator « WordPress Plugins".
  110. ^ "[FreddysHouse] Two-factor Authentication". XenForo Community.
  111. ^ "Two Factor Authentication". Zoho Mail Control Panel Help. Retrieved 29 November 2015.