pam_oath
The OATH Toolkit provides a two-step authentication procedure using one-time passcodes (OTP). It complies to two OTP method RFC standards (HOTP, TOTP). The OTP generator applications are available for iOS, Android, Blackberry and other devices. Similar to Google Authenticator the authentication mechanism integrates into the Linux PAM system. This guide shows the installation and configuration of this mechanism.
Contents
Installation
Install the oath-toolkit package.
Setting up the oath
The oath seed is an hexadecimal number that should be unique per user. To generate a new seed for a user, you could use the following command line:
$ head -10 /dev/urandom | sha512sum | cut -b 1-30 1ab4321412aebcw
Note the above output seed is used as example seed in this article and must not be used. There needs to be one oath per user and link to it in a configuration file /etc/users.oath
. While being root create the file and insert the user seed:
/etc/users.oath
# Option User Prefix Seed HOTP/T30/6 user - 1ab4321412aebcw
Make sure that the file can only be accessed by root:
# chmod 600 /etc/users.oath # chown root /etc/users.oath
Setting up the PAM
To enable oath for a specific service only, like ssh, you can edit the file /etc/pam.d/sshd and add at the beginning of the file the following line :
auth sufficient pam_oath.so usersfile=/etc/users.oath window=30 digits=6
This will allow authentification if you just enter the right oath code. You can make it a requirement and let the rest of the pam stack be processed if you use the following line instead :
auth required pam_oath.so usersfile=/etc/users.oath window=30 digits=6
Logging with an oath pass
Run the following command if you loggin and need the current oath pass :
oathtool -v -d6 1ab4321412aebcw
Of course replace 1ab4321412aebcw by the seed corresponding to your user. It will display something like that :
Hex secret: 1ab4321412aebc Base32 secret: DK2DEFASV26A==== Digits: 6 Window size: 0 Start counter: 0x0 (0)
820170
The last number is actually the code you can use to log in right now, but more interestingly the Base32 secret, is actually what we need to generate a qr code for this user. To do so install the package qrencode to run the following command :
qrencode -o user.png 'otpauth://totp/user@machine?secret=DK2DEFASV26A===='
Of course change user, machine and DK2DEFASV26A==== accordingly. Once done, you can visualize your qrcode with your prefered image visualizer application and use that to configure your phone. It is pretty straigh forward to use FreeOTP to then take a screenshot of that png and get it to display OTP pass when needed.