I have a Debian Bullseye desktop PC.
I am looking for a 2fa authenticator that works on my desktop, without
using a smartphone or tablet.
I have a Debian Bullseye desktop PC.
I am looking for a 2fa authenticator that works on my desktop, without
using a smartphone or tablet.
On Sun, Aug 04, 2024 at 19:57:22 +0200, tomas@tuxteam.de wrote:
I don't know what an "authenticator app" is.
I don't either, but I have to use one at work.
https://support.microsoft.com/en-us/account-billing/about-microsoft-authenticator-9783c865-0308-42fb-a519-8cf666fe0acc
I have no idea what it is, but it's installed on my work-issued phone,
and I have to use it occasionally when I sign in to certain web apps
on my work-issued laptop.
On the days where the web app decides it hasn't talked to Microsoft Authenticator recently enough, I have to go get my phone, type the
passcode once to unlock it, click the Authenticator icon and type my
passcode a second time to launch the app, then type my passcode a
third time inside the app to validate that yes, I am the person trying
to open the web page. I think there's a two-digit number that I have to
type as well.
I cannot imagine how installing one of these things on your Linux PC
is going to help you. Either you're dealing with a workplace-enforced authentication setup, in which case you need to use whatever authenticator *they* chose... or you're trying to establish some sort of "two factor authentication" of your own, in which case, having both factors be
"I'm logged into my Linux account" kinda defeats the purpose.
I don't know what an "authenticator app" is.
On Sun, Aug 04, 2024 at 05:44:07PM +0100, Mick Ab wrote:
I have a Debian Bullseye desktop PC.
I am looking for a 2fa authenticator that works on my desktop, without
using a smartphone or tablet.
I don't know what an "authenticator app" is. If what you need is TOTP, oathtool (in the same-named Debian package) might be your friend.
What I do is, in a terminal:
echo "MY-TOTP-SECRET-KEY" | oathtool -b --totp - | xclip -r -selection clipboard
Xclip (from the same-named package) puts the result in some X selection
(here I use the clipboard, because the result is going to the browser,
and those are too stupid to handle other X selections gracefully).
Le 04/08/2024 à 22:16, Mick Ab a écrit :
I realise that Authy is still available on smartphones and tablets,
but I do not want to use a smartphone or a tablet.
I simply need to run a simple 2FA TOTP authenticator on my Debian
desktop PC.
Hello,
I do not use such applications but a search on the totp word in Debian packages lists numerous answers. From what I understand, at least these Debian packages could perhaps suit your needs:
- numberstation (GUI)
- nitrokey-authenticator (GUI)
- otpclient (GUI)
- otpclient-cli (CLI)
OT question, can debian desktop run a simulator for phone app?
Thanks
On 2024-08-05 04:58, didier gaumet wrote:
Le 04/08/2024 à 22:16, Mick Ab a écrit :
I realise that Authy is still available on smartphones and tablets,
but I do not want to use a smartphone or a tablet.
I simply need to run a simple 2FA TOTP authenticator on my Debian
desktop PC.
Hello,
I do not use such applications but a search on the totp word in Debian packages lists numerous answers. From what I understand, at least these Debian packages could perhaps suit your needs:
- numberstation (GUI)
- nitrokey-authenticator (GUI)
- otpclient (GUI)
- otpclient-cli (CLI)
I realise that Authy is still available on smartphones and tablets,but I
do not want to use a smartphone or a tablet.desktop
I simply need to run a simple 2FA TOTP authenticator on my Debian
PC.
I realise that Authy is still available on smartphones and tablets, but I
do not want to use a smartphone or a tablet.
I simply need to run a simple 2FA TOTP authenticator on my Debian desktop
PC.
I also use oathtool, but with an encrypted key:
gpg --decrypt --quiet key.asc | oathtool -b --totp -
Xclip (from the same-named package) puts the result in some X selection (here I use the clipboard, because the result is going to the browser,
and those are too stupid to handle other X selections gracefully).
Copy via double-click and paste via single click works fine
here (for Firefox and Chromium) in X via SSH (the browsers
run inside an LXC container).
OT question, can debian desktop run a simulator for phone app?
On Sun, Aug 04, 2024 at 05:44:07PM +0100, Mick Ab wrote:
I have a Debian Bullseye desktop PC.
I am looking for a 2fa authenticator that works on my desktop, without
using a smartphone or tablet.
I don't know what an "authenticator app" is. If what you need is TOTP, oathtool (in the same-named Debian package) might be your friend.
oathtool (in the same-named Debian package) might be your friend.
I use this too, and it gives the same numbers as FreeOTP which I have
installed on my phone.
August 5, 2024 at 10:35 PM, "Tim Woodall" <debianuser@woodall.me.uk> wrote:
oathtool (in the same-named Debian package) might be your friend.
I use this too, and it gives the same numbers as FreeOTP which I have
installed on my phone.
Me second with oathtool which just works for me.
On 5 Aug 2024 05:31 +0800, from wesley@mxcloud.eu.org (Wesley):
OT question, can debian desktop run a simulator for phone app?
If OP thinks a password manager is "more complicated than needed",I suspect that some contributors to this thread might have gotten Micks original question wrong, which is about 2FA, to require a passphrase
then what isn't running a hardware emulator + whole operating system +
Who knows what?
Dear Mick, dear all:
If I understand you correctly, Mick, you're considering to move your
TOTP factor out of an independent device towards your local debian
machine for convenience, so you'd be giving away the second
authentication factor to anyone who's compromised your local account,
that you were defending against in the first place. Please tell me
you're not shooting yourself in the foot.
It's your choice, Mick. Debian includes several programs that do TOTP.
But for 2FA to have any meaningful effect, the factors need to be independent, or else you might as well ditch 2FA altogether.
On 06/08/2024 11:37, tomas@tuxteam.de wrote:
TOTP is a standard (rfc6238 [1]) so it actually/should/ give the same numbers regardless of the application.
(This is what miffs me most: those marketing departments always sell you some unspecified snake oil -- "authenticator app", "2FA" -- instead of telling you what's technically behind it.
It is mostly true, however authenticator applications may use
vendor-specific protocols that relies on network connection instead of displaying TimeOTP code to confirm login. The worst case is when TOTP is disabled for specific service and alternative applications can not be used.
While passwords are salted and hashed to make it harder to steal them from servers,
the same approach is not applicable for TimeOTP. The same secret
must be available on client and server to derive a code valid for the
current (half of) minute.
I am not recommending against TOTP. Just be aware that enabling and using it may require more efforts than for application specific to particular vendor.
Educating people is quite expensive.
https://lists.debian.org/msgid-search/ZrBUdBR0nUozNwW6@tuxteam.de
On 05/08/2024 11:26, tomas@tuxteam.de wrote:
On Sun, Aug 04, 2024 at 09:19:33PM +0200, Detlef Vollmann wrote:[...]
gpg --decrypt --quiet key.asc | oathtool -b --totp -
The xclip part just saves me the clickery.
Ideally clipboard should be avoided to avoid exposure codes to sniffers.
Some kind of input method might be better. X11 XTest extension allows to
send key events to applications (see xdotool and xvkbd), but it is
considered as an insecure feature per se and may be disabled.
On 07/08/2024 11:40, tomas@tuxteam.de wrote:
In my threat model, if I already have an application running under
my own user ID, I call XKCD 1200 [1] on it.
Browser JavaScript API allows to read and write clipboard. It is protected
to some extent by user prompts. On the other hand in ChromeOS most of applications are running in browser, so I will not be surprised if policy becomes more permissive some day despite developers are aware of related security issues.
Are you sure that you have never accidentally granted clipboard read permission to some frequently used web site?
So a threat may be outside of "traditional" local processes.
As to X11 protocol, it allows to grab focus, e.g. xterm supports it. Several years ago GNOME designers decided that their password prompt must be full screen modal dialogue that does not allow even mouse interaction with other applications (e.g. 3rd party password managers). On the other hand it does not protect against xinput debug tools running at lower level.
Sysop: | Keyop |
---|---|
Location: | Huddersfield, West Yorkshire, UK |
Users: | 546 |
Nodes: | 16 (1 / 15) |
Uptime: | 160:35:54 |
Calls: | 10,385 |
Calls today: | 2 |
Files: | 14,056 |
Messages: | 6,416,493 |