Skip to content

Commit

Permalink
Add optional policy parameter to OTP generation
Browse files Browse the repository at this point in the history
  • Loading branch information
ss23 committed Oct 6, 2019
1 parent 2ede651 commit 0e264dd
Show file tree
Hide file tree
Showing 2 changed files with 23 additions and 2 deletions.
8 changes: 8 additions & 0 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -13,8 +13,16 @@ $ ./decode-qr-uri.py 'igmobileotp://?action=secactivate&enc=VRUq6IoLWQRCMRITZEHt
# generate-otp.py
Once you have the required information from a QR code, you can combine it with a "registration code" to derive the OTP secret. This registration code contains random bytes that were generated on the end-users device (their mobile phone), and are thus required to determine the OTP secret. An example way to obtain all of this information would be through email, if the user recieves a QR code in their email, then responds with their registration code.

The OTP secret optionally includes the policy specification, which is provided as part of the QR code. *If you are having problems generating a valid OTP secret, try with or without the policy parameter*.

Example:
```
$ ./generate-otp.py 48244-13456 1745-7712-6942-8698 12211-49352 --policy '{"allowUnsecured":"false","trustedExecution":"NOT_ALLOWED"}'
bb9b6d72ae99b006de5e106935ec96da
To generate a code immediately, run:
oathtool -v --totp=sha256 --digits=6 bb9b6d72ae99b006de5e106935ec96da
$ ./generate-otp.py 48244-13456 1745-7712-6942-8698 12211-49352
9a8eab5ecc9fc413758a92ac223dc6a0
Expand Down
17 changes: 15 additions & 2 deletions generate-otp.py
Original file line number Diff line number Diff line change
Expand Up @@ -5,10 +5,14 @@

logging.basicConfig(level=logging.WARNING)

parser = argparse.ArgumentParser(description='Generate an OTP secret for an Entrust IdentityGuard soft token')
parser = argparse.ArgumentParser(
description='Generate an OTP secret for an Entrust IdentityGuard soft token',
epilog='If your token does not work, try without the Policy argument, as in some cases, this is not used to generate the OTP secret'
)
parser.add_argument('Serial', type=str, nargs=1, help='Given to the user (such as through a QR code). Example: 48244-13456')
parser.add_argument('ActivationCode', type=str, nargs=1, help='Given to the user (such as through a QR code). Example: 1745-7712-6942-8698')
parser.add_argument('RegistrationCode', type=str, nargs=1, help='The user provides this to the activation service. Example: 12211-49352')
parser.add_argument('--policy', type=str, nargs=1, required=False, help='The policy associated with the identity. Example: {"allowUnsecured":"false","trustedExecution":"NOT_ALLOWED"}')
args = parser.parse_args()

# Remove dashes from input so we can work with the data
Expand All @@ -32,10 +36,19 @@

logging.info("RNG Bytes: 0x%s", rngbytes.hex())

password = activationbytes + rngbytes

# The secret may or may not include the policy
if args.policy is not None:
password += args.policy[0].encode('utf-8')
logging.info("Policy: %s", args.policy[0].encode('utf-8'))
else:
logging.debug("Policy not provided")

# Derive the secret key
key = pbkdf2_hmac(
hash_name='sha256',
password=activationbytes + rngbytes,
password=password,
salt=serial.encode("utf-8"),
iterations=8,
dklen=16
Expand Down

0 comments on commit 0e264dd

Please sign in to comment.