Download the PHP package nocksapp/google2fa without Composer
On this page you can find all versions of the php package nocksapp/google2fa. It is possible to download/install these versions without Composer. Possible dependencies are resolved automatically.
Download nocksapp/google2fa
More information about nocksapp/google2fa
Files in nocksapp/google2fa
Package google2fa
Short Description A One Time Password Authentication package, compatible with Google Authenticator.
License BSD-3-Clause
Informations about the package google2fa
Google2FA
Google Two-Factor Authentication for PHP Package
Google2FA is a PHP implementation of the Google Two-Factor Authentication Module, supporting the HMAC-Based One-time Password (HOTP) algorithm specified in RFC 4226 and the Time-based One-time Password (TOTP) algorithm specified in RFC 6238.
This package is agnostic, but there's a Laravel bridge.
Demos, Example & Playground
Please check the Google2FA Package Playground.
Here's an demo app showing how to use Google2FA: google2fa-example.
You can scan the QR code on this (old) demo page with a Google Authenticator app and view the code changing (almost) in real time.
Requirements
- PHP 5.4+
Installing
Use Composer to install it:
composer require pragmarx/google2fa
If you prefer inline QRCodes instead of a Google generated url, you'll need to install BaconQrCode:
composer require "bacon/bacon-qr-code":"~1.0"
Using It
Instantiate it directly
How To Generate And Use Two Factor Authentication
Generate a secret key for your user and save it:
Show the QR Code to your user:
And they should see and scan the QR code to their applications:
And to verify, you just have to:
QR Code Packages
This package suggests the use of Bacon/QRCode because it is known as a good QR Code package, but you can use it with any other package, for instance Simple QrCode, which uses Bacon/QRCode to produce QR Codes.
Usually you'll need a 2FA URL, so you just have to use the URL generator:
Here's an example using Simple QrCode:
Server Time
It's really important that you keep your server time in sync with some NTP server, on Ubuntu you can add this to the crontab:
sudo service ntp stop
sudo ntpd -gq
sudo service ntp start
Validation Window
To avoid problems with clocks that are slightly out of sync, we do not check against the current key only but also consider $window
keys each from the past and future. You can pass $window
as optional third parameter to verifyKey
, it defaults to 4
. A new key is generated every 30 seconds, so this window includes keys from the previous two and next two minutes.
An attacker might be able to watch the user entering his credentials and one time key.
Without further precautions, the key remains valid until it is no longer within the window of the server time. In order to prevent usage of a one time key that has already been used, you can utilize the verifyKeyNewer
function.
Note that $timestamp
either false
(if the key is invalid or has been used before) or the provided key's unix timestamp divided by the key regeneration period of 30 seconds.
Using a Bigger and Prefixing the Secret Key
Although the probability of collision of a 16 bytes (128 bits) random string is very low, you can harden it by:
Use a bigger key
You cn prefix your secret keys
You may prefix your secret keys, but you have to understand that, as your secret key must have length in power of 2, your prefix will have to have a complementary size. So if your key is 16 bytes long, if you add a prefix it must be also 16 bytes long, but as your prefixes will be converted to base 32, the max length of your prefix is 10 bytes. So, those are the sizes you can use in your prefixes:
And it can be used like so:
Window
The Window property defines how long a OTP will work, or how many cycles it will last. A key has a 30 seconds cycle, setting the window to 0 will make the key lasts for those 30 seconds, setting it to 2 will make it last for 120 seconds. This is how you set the window:
But you can also set the window while checking the key. If you need to set a window of 4 during key verification, this is how you do:
Key Regeneration Interval
You can change key regeneration interval, which defaults to 30 seconds, but remember that this is a default value on most authentication apps, lile Google Authenticator, which will, basically, make your app out of sync with them.
Generating Inline QRCodes
First you have to install the BaconQrCode package, as stated above, then you just have to generate the inline string using:
And use it in your blade template this way:
Google Authenticator secret key compatibility
To be compatible with Google Authenticator, your (converted to base 32) secret key length must be at least 8 chars and be a power of 2: 8, 16, 32, 64...
So, to prevent errors, you can do something like this while generating it:
And it will generate
By default, this package will enforce compatibility, but, if Google Authenticator is not a target, you can disable it by doing
Google Authenticator Apps:
To use the two factor authentication, your user will have to install a Google Authenticator compatible app, those are some of the currently available:
- Authy for iOS, Android, Chrome, OS X
- FreeOTP for iOS, Android and Pebble
- Google Authenticator for iOS
- Google Authenticator for Android
- Google Authenticator (port) on Windows Store
- Microsoft Authenticator for Windows Phone
- LastPass Authenticator for iOS, Android, OS X, Windows
- 1Password for iOS, Android, OS X, Windows
Tests
The package tests were written with phpspec.
Author
License
Google2FA is licensed under the BSD 3-Clause License - see the LICENSE
file for details
Contributing
Pull requests and issues are more than welcome.
All versions of google2fa with dependencies
paragonie/constant_time_encoding Version ~1.0
paragonie/random_compat Version ~1.4|~2.0
symfony/polyfill-php56 Version ~1.2