Implementing a one-time password system on the web

Not a Token

The RFC 2289 specification for a one-time password solution can offer true two-factor authentication; however, it will never be as secure as a token-based alternative. For one thing, many of the token-based solutions require that you concatenate a private PIN to the OTP to create the second factor, which greatly enhances security. Also, the hardware token solutions are designed to be tamper proof, in case someone tries to reverse engineer the generating algorithm. Finally, the token-based tools are time based and change every minute or so, which means it is very difficult for an attacker to obtain an OTP a user has not yet used. With solutions that require an OTP list, an attacker who gets a snapshot of the list (or picks up a lost list on the subway) has access to future OTP responses.

The OTP system defined by RFC 2289 offers an open and scalable solution for web-based authentication. It is even possible to integrate an OTP system into a user's cell phone. Web-based OTP has its own attack vectors and risks, and a web-based OTP system will probably never be quite as secure as hardware-based solutions such as the RSA SecurID. Despite this, OTP combined with a conventional web authentication scheme is an excellent candidate for poor man's two-factor authentication.

Bitwise

Implementation of the RFC 2289 specification used in OTPauth was written for PHP4 and also works with PHP5. To implement the spec correctly, a variety of bitwise operations are necessary. However, at the time of implementation (and I don't think it has changed), specific bitwise operations do not work in PHP4. Things like bit shifting for unsigned 32-bit integers don't work. PHP4 provides the operator, but it simply fails with no error. Therefore, OTPauth provides a math library to work around these types of undocumented language "features."

The Author

James A. Barkley is a Senior Software Systems Engineer at the MITRE Corporation in Bedford, MA. Mr. Barkley is working in a variety of technology areas including Modeling and Simulation, PHP and Ruby on Rails web development, biometric informatics, server virtualization, and robotics. MITRE is a not-for-profit company that manages three federally funded research and development centers (FFRDCs) and a dedicated homeland security center, partnering with government sponsors to support their crucial operational missions. Mr. Barkley began working with open source software in 1998. He is the creator of the OTPauth PHP library.

Buy this article as PDF

Express-Checkout as PDF
Price $2.95
(incl. VAT)

Buy Linux Magazine

SINGLE ISSUES
 
SUBSCRIPTIONS
 
TABLET & SMARTPHONE APPS
Get it on Google Play

US / Canada

Get it on Google Play

UK / Australia

Related content

  • Security Lessons: OpenID

    Outsourcing authentication services gives you access to more services – at a price. Kurt examines the pros and cons of distributed authentication.

  • One-Time Passwords

    A one-time password won't compromise security if it falls in the wrong hands. OPIE and OTPW bring the safety of one-time password security to Linux.

  • Security Strategies

    Is your data safe? Are your borders protected? This month we examine some expert techniques for building more secure networks.

  • Root Password Window

    We’ll show you some tricks for configuring the root password popup window on Red Hat-based systems.

  • Web Authentication

    Apache offers several options for adding a password-protected area to a website.

comments powered by Disqus

Direct Download

Read full article as PDF:

032-036_otp.pdf  (267.61 kB)

News