oath-toolkit-help
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[OATH-Toolkit-help] [sr #108937] Improve security by disallowing TOTP co


From: anonymous
Subject: [OATH-Toolkit-help] [sr #108937] Improve security by disallowing TOTP code reuse
Date: Thu, 10 Dec 2015 18:39:39 +0000
User-agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:43.0) Gecko/20100101 Firefox/43.0

URL:
  <http://savannah.nongnu.org/support/?108937>

                 Summary: Improve security by disallowing TOTP code reuse
                 Project: OATH Toolkit
            Submitted by: None
            Submitted on: jeu. 10 déc. 2015 18:39:38 UTC
                Category: None
                Priority: 5 - Normal
                Severity: 3 - Normal
                  Status: None
                 Privacy: Public
             Assigned to: None
        Originator Email: address@hidden
             Open/Closed: Open
         Discussion Lock: Any
        Operating System: None

    _______________________________________________________

Details:

There is nothing in the HOTP standard that prevents TOTP codes to be reused.
This allows attackers to perform synchronous attack when able to read the code
(think MitM, keylogger...) and, simply, to log in the same time as the user
do. This is blocked by counter-based HOTP but these have other issues.

An interesting security feature of the google-authenticator PAM module is to
prevent a code from being used more than once. See
https://github.com/google/google-authenticator/blob/master/libpam/pam_google_authenticator.c#L1008
for implementation. This significantly increase security in the specific
attack scenario described above.




    _______________________________________________________

Reply to this item at:

  <http://savannah.nongnu.org/support/?108937>

_______________________________________________
  Message posté via/par Savannah
  http://savannah.nongnu.org/




reply via email to

[Prev in Thread] Current Thread [Next in Thread]