{-| Module : Botan.Low.TOTP Description : Time-based one time passwords Copyright : (c) Leo D, 2023 License : BSD-3-Clause Maintainer : leo@apotheca.io Stability : experimental Portability : POSIX One time password schemes are a user authentication method that relies on a fixed secret key which is used to derive a sequence of short passwords, each of which is accepted only once. Commonly this is used to implement two-factor authentication (2FA), where the user authenticates using both a conventional password (or a public key signature) and an OTP generated by a small device such as a mobile phone. -} module Botan.Low.TOTP ( -- * Time-based one time passwords -- $introduction -- * Usage -- $usage -- * TOTP TOTP(..) , TOTPHashName(..) , TOTPTimestep(..) , TOTPTimestamp(..) , TOTPCode(..) , withTOTP , totpInit , totpDestroy , totpGenerate , totpCheck -- * TOTP Hashes , pattern TOTP_SHA1 , pattern TOTP_SHA256 , pattern TOTP_SHA512 -- * Convenience , totpHashes ) where import qualified Data.ByteString as ByteString import Botan.Bindings.TOTP import Botan.Low.Error import Botan.Low.Hash import Botan.Low.Make import Botan.Low.Prelude import Botan.Low.Remake -- NOTE: RFC 6238 {- $introduction Botan implements the HOTP and TOTP schemes from RFC 4226 and 6238. Since the range of possible OTPs is quite small, applications must rate limit OTP authentication attempts to some small number per second. Otherwise an attacker could quickly try all 1000000 6-digit OTPs in a brief amount of time. TOTP generates OTPs that are a short numeric sequence, between 6 and 8 digits (most applications use 6 digits), created using a 64-bit timestamp counter value. If the counter ever repeats the OTP will also repeat, thus both parties must assure the counter only increments and is never repeated or decremented. Thus both client and server must keep their clocks synchronized. Anyone with access to the client-specific secret key can authenticate as that client, so it should be treated with the same security consideration as would be given to any other symmetric key or plaintext password. TOTP is based on the same algorithm as HOTP, but instead of a counter a timestamp is used. -} {- $usage To use TOTP for MFA / 2FA, the client authenticator must generate a client-specific shared secret, and securely communicate it to the server authenticator. The secret key may be any bytestring value with more than 160 bits, such as a Bcrypt digest or SRP6 shared key. > import Botan.Low.TOTP > import Botan.Low.RNG > import Data.Time.Clock.POSIX > timestep = 30 > drift = 3 > sharedSecret <- systemRNGGet 16 The client and server authenticators are now in a shared state, and any login attempts from a new device may be authenticated using TOTP as MFA. A client has requested a new connection, and TOTP is being used as MFA/2FA to authenticate their request. The server authenticator receives the client connection request and initializes a TOTP session using the stored client-specific shared secret, and then sends an authentication request to the client authenticator: > -- serverSharedSecret <- lookupServerSharedSecret > serverSession <- totpInit serverSharedSecret TOTP_SHA512 8 timestep > -- sendMFAAuthenticationRequest > NOTE: We are using a timestep value of 30 seconds, which means that the > code will refresh every 30 seconds The client authenticator receives the authentication request, generates a client-side code using their timestamp, and displays the TOTP code to the user: > -- clientSharedSecret <- lookupClientSharedSecret > clientSession <- totpInit clientSharedSecret TOTP_SHA512 8 timestep > (clientTimestamp :: TOTPTimestamp) <- round <$> getPOSIXTime > clientCode <- totpGenerate clientSession clientTimestamp > -- displayClientCode clientCode The client then sends the client code to the server authenticator using the unauthenticated / requested connection: > -- clientCode <- readClientCode > -- sendMFAAuthenticationResponse clientCode The server authenticator receives the authentication response, and performs a check of the key, with an acceptable clock drift in steps, in case the client and server are slightly desynchronized. > -- serverClientCode <- didreceiveMFAAuthenticationResponse > (serverTimestamp :: TOTPTimestamp) <- round <$> getPOSIXTime > isValid <- totpCheck serverSession serverClientCode serverTimestamp drift > NOTE: We are using a acceptable clock drift value of 3, which means that the > codes for the previous 3 time steps are still valid. If the code is valid, then the signin may be completed on the new connection as normal. The server should discontinue the session and refuse any new connections to the account after multiple unsuccessful authentication attempts. The user should then be notified. -} newtype TOTP = MkTOTP { getTOTPForeignPtr :: ForeignPtr BotanTOTPStruct } newTOTP :: BotanTOTP -> IO TOTP withTOTP :: TOTP -> (BotanTOTP -> IO a) -> IO a totpDestroy :: TOTP -> IO () createTOTP :: (Ptr BotanTOTP -> IO CInt) -> IO TOTP (newTOTP, withTOTP, totpDestroy, createTOTP, _) = mkBindings MkBotanTOTP runBotanTOTP MkTOTP getTOTPForeignPtr botan_totp_destroy type TOTPHashName = HashName pattern TOTP_SHA1 , TOTP_SHA256 , TOTP_SHA512 :: TOTPHashName pattern TOTP_SHA1 = SHA1 pattern TOTP_SHA256 = SHA256 pattern TOTP_SHA512 = SHA512 -- TODO: Do any other hashes work? totpHashes = [ TOTP_SHA1 , TOTP_SHA256 , TOTP_SHA512 ] type TOTPTimestep = Word64 type TOTPTimestamp = Word64 type TOTPCode = Word32 -- | Initialize a TOTP instance -- -- NOTE: Digits should be 6-8 totpInit :: ByteString -- ^ __key[]__ -> TOTPHashName -- ^ __hash_algo__ -> Int -- ^ __digits__ -> TOTPTimestep -- ^ __time_step__ -> IO TOTP -- ^ __totp__ totpInit key algo digits timestep = asBytesLen key $ \ keyPtr keyLen -> do asCString algo $ \ algoPtr -> do createTOTP $ \ out -> botan_totp_init out (ConstPtr keyPtr) keyLen (ConstPtr algoPtr) (fromIntegral digits) (fromIntegral timestep) -- WARNING: withFooInit-style limited lifetime functions moved to high-level botan withTOTPInit :: ByteString -> ByteString -> Int -> TOTPTimestep -> (TOTP -> IO a) -> IO a withTOTPInit = mkWithTemp4 totpInit totpDestroy -- | Generate a TOTP code for the provided timestamp totpGenerate :: TOTP -- ^ __totp__: the TOTP object -> TOTPTimestamp -- ^ __totp_code__: the OTP code will be written here -> IO TOTPCode -- ^ __timestamp__: the current local timestamp totpGenerate totp timestamp = withTOTP totp $ \ totpPtr -> do alloca $ \ outPtr -> do throwBotanIfNegative $ botan_totp_generate totpPtr outPtr timestamp peek outPtr -- | Verify a TOTP code totpCheck :: TOTP -- ^ __totp__: the TOTP object -> TOTPCode -- ^ __totp_code__: the presented OTP -> TOTPTimestamp -- ^ __timestamp__: the current local timestamp -> Int -- ^ __acceptable_clock_drift__: specifies the acceptable amount -- of clock drift (in terms of time steps) between the two hosts. -> IO Bool totpCheck totp code timestamp drift = withTOTP totp $ \ totpPtr -> do throwBotanCatchingSuccess $ botan_totp_check totpPtr code timestamp (fromIntegral drift)