mirror of
https://github.com/go-gitea/gitea
synced 2024-12-23 04:47:54 +01:00
d1353e1f7c
* update code.gitea.io/sdk/gitea v0.13.1 -> v0.13.2 * update github.com/go-swagger/go-swagger v0.25.0 -> v0.26.0 * update github.com/google/uuid v1.1.2 -> v1.2.0 * update github.com/klauspost/compress v1.11.3 -> v1.11.7 * update github.com/lib/pq 083382b7e6fc -> v1.9.0 * update github.com/markbates/goth v1.65.0 -> v1.66.1 * update github.com/mattn/go-sqlite3 v1.14.4 -> v1.14.6 * update github.com/mgechev/revive 246eac737dc7 -> v1.0.3 * update github.com/minio/minio-go/v7 v7.0.6 -> v7.0.7 * update github.com/niklasfasching/go-org v1.3.2 -> v1.4.0 * update github.com/olivere/elastic/v7 v7.0.21 -> v7.0.22 * update github.com/pquerna/otp v1.2.0 -> v1.3.0 * update github.com/xanzy/go-gitlab v0.39.0 -> v0.42.0 * update github.com/yuin/goldmark v1.2.1 -> v1.3.1
61 lines
3.5 KiB
Markdown
Vendored
61 lines
3.5 KiB
Markdown
Vendored
# otp: One Time Password utilities Go / Golang
|
|
|
|
[![PkgGoDev](https://pkg.go.dev/badge/github.com/pquerna/otp)](https://pkg.go.dev/github.com/pquerna/otp) [![Build Status](https://travis-ci.org/pquerna/otp.svg?branch=master)](https://travis-ci.org/pquerna/otp)
|
|
|
|
# Why One Time Passwords?
|
|
|
|
One Time Passwords (OTPs) are an mechanism to improve security over passwords alone. When a Time-based OTP (TOTP) is stored on a user's phone, and combined with something the user knows (Password), you have an easy on-ramp to [Multi-factor authentication](http://en.wikipedia.org/wiki/Multi-factor_authentication) without adding a dependency on a SMS provider. This Password and TOTP combination is used by many popular websites including Google, Github, Facebook, Salesforce and many others.
|
|
|
|
The `otp` library enables you to easily add TOTPs to your own application, increasing your user's security against mass-password breaches and malware.
|
|
|
|
Because TOTP is standardized and widely deployed, there are many [mobile clients and software implementations](http://en.wikipedia.org/wiki/Time-based_One-time_Password_Algorithm#Client_implementations).
|
|
|
|
## `otp` Supports:
|
|
|
|
* Generating QR Code images for easy user enrollment.
|
|
* Time-based One-time Password Algorithm (TOTP) (RFC 6238): Time based OTP, the most commonly used method.
|
|
* HMAC-based One-time Password Algorithm (HOTP) (RFC 4226): Counter based OTP, which TOTP is based upon.
|
|
* Generation and Validation of codes for either algorithm.
|
|
|
|
## Implementing TOTP in your application:
|
|
|
|
### User Enrollment
|
|
|
|
For an example of a working enrollment work flow, [Github has documented theirs](https://help.github.com/articles/configuring-two-factor-authentication-via-a-totp-mobile-app/
|
|
), but the basics are:
|
|
|
|
1. Generate new TOTP Key for a User. `key,_ := totp.Generate(...)`.
|
|
1. Display the Key's Secret and QR-Code for the User. `key.Secret()` and `key.Image(...)`.
|
|
1. Test that the user can successfully use their TOTP. `totp.Validate(...)`.
|
|
1. Store TOTP Secret for the User in your backend. `key.Secret()`
|
|
1. Provide the user with "recovery codes". (See Recovery Codes bellow)
|
|
|
|
### Code Generation
|
|
|
|
* In either TOTP or HOTP cases, use the `GenerateCode` function and a counter or
|
|
`time.Time` struct to generate a valid code compatible with most implementations.
|
|
* For uncommon or custom settings, or to catch unlikely errors, use `GenerateCodeCustom`
|
|
in either module.
|
|
|
|
### Validation
|
|
|
|
1. Prompt and validate User's password as normal.
|
|
1. If the user has TOTP enabled, prompt for TOTP passcode.
|
|
1. Retrieve the User's TOTP Secret from your backend.
|
|
1. Validate the user's passcode. `totp.Validate(...)`
|
|
|
|
|
|
### Recovery Codes
|
|
|
|
When a user loses access to their TOTP device, they would no longer have access to their account. Because TOTPs are often configured on mobile devices that can be lost, stolen or damaged, this is a common problem. For this reason many providers give their users "backup codes" or "recovery codes". These are a set of one time use codes that can be used instead of the TOTP. These can simply be randomly generated strings that you store in your backend. [Github's documentation provides an overview of the user experience](
|
|
https://help.github.com/articles/downloading-your-two-factor-authentication-recovery-codes/).
|
|
|
|
|
|
## Improvements, bugs, adding feature, etc:
|
|
|
|
Please [open issues in Github](https://github.com/pquerna/otp/issues) for ideas, bugs, and general thoughts. Pull requests are of course preferred :)
|
|
|
|
## License
|
|
|
|
`otp` is licensed under the [Apache License, Version 2.0](./LICENSE)
|