Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Harden 2FA/TOTP implementation according to rfc6238 #640

Closed
andreasbrett opened this issue Oct 10, 2021 · 4 comments
Closed

Harden 2FA/TOTP implementation according to rfc6238 #640

andreasbrett opened this issue Oct 10, 2021 · 4 comments
Labels
feature-request Request for new features to be added

Comments

@andreasbrett
Copy link
Contributor

andreasbrett commented Oct 10, 2021

Is your feature request related to a problem? Please describe.
No, this is about following the RFC's recommendations

Describe the solution you'd like
Harden security for the TOTP solution by:

  1. creating TOTP secrets using a cryptographically strong pseudorandom generator
  2. making tokens actually one-time only (currently: token can be used multiple times within time windows)
  3. avoiding the TOTP library's default values for window and time in totp.verify (notp)

Additional context
The TOTP standard as described in rfc6238 defines some important recommendations for secure implementation of TOTP.

1. TOTP secret generation (see rfc6238 section 5.1)

As indicated in the algorithm requirement section, keys SHOULD be chosen at random or using a cryptographically strong pseudorandom generator properly seeded with a random value.

The secret is currently generated using the standard math.random function (see code). This is explicitely not a cryptographically strong random number generator (see note here). Using Web Crypto API instead should respect the standard and produce less predictable secrets.

2. Invalidating used tokens (see rfc6238 section 5.2)

Note that a prover may send the same OTP inside a given time-step window multiple times to a verifier. The verifier MUST NOT accept the second attempt of the OTP after the successful validation has been issued for the first OTP, which ensures one-time only use of an OTP.

Currently tokens can be used multiple times. The last used token should be stored (incl. timestamp) to check for re-use within the same window. Note that in this case the rfc standard phrases this as a MUST not just as a recommendation. With the current implementation a MitM could login without being noticed (as an intercepted token can be re-used).

3. Avoiding notp default values for token verification (see rfc6238 section 5.2)

The validation system should compare OTPs not only with the receiving timestamp but also the past timestamps that are within the transmission delay. A larger acceptable delay window would expose a larger window for attacks. We RECOMMEND that at most one time step is allowed as the network delay.

We RECOMMEND a default time-step size of 30 seconds. This default value of 30 seconds is selected as a balance between security and usability.

Currently totp.verifyToken is called with 2 parameters only (token + key) leading notp to use default values for the number of lookahead windows and the window size (see code). Provide those options in the 3rd parameter to explicitely define settings recommended in the rfc. While the windows size is by default 30 seconds (and thus the recommended rfc value), the allowable margin is 6 resulting in tokens being valid for +/- 6*30 seconds = 3 minutes.

Google Authenticator uses an allowable margin of 1 so I'd suggest using this as it's IMHO the most used TOTP implementation globally. For reference see their libpam module's code. It states the number 3 but they interpret this differently than notp does. notp checks allowable_margin windows in the past and allowable_margin windows in the future while Google checks allowable_margin windows total (so for 3 it is: the current window + 1 window in the past + 1 window in the future). Hence Google's 3 is a 1 in notp's interpretation.

@andreasbrett andreasbrett added the feature-request Request for new features to be added label Oct 10, 2021
andreasbrett added a commit to andreasbrett/uptime-kuma that referenced this issue Oct 10, 2021
generate TOTP secret using WebCrypto API (see louislam#640)
andreasbrett added a commit to andreasbrett/uptime-kuma that referenced this issue Oct 10, 2021
override default values: window=1, window size=30 (see louislam#640)
@louislam
Copy link
Owner

Learnt so much after reading this post!

@RisedSky
Copy link
Contributor

Can this be a problem that Pterodactyl in GHSA-5vfx-8w6m-h3v4 had too ?

@andreasbrett
Copy link
Contributor Author

Can this be a problem that Pterodactyl in GHSA-5vfx-8w6m-h3v4 had too ?

Looks like a different issue to me.

@louislam
Copy link
Owner

3 parts have been merged, thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feature-request Request for new features to be added
Projects
None yet
Development

No branches or pull requests

3 participants