
I realized whilst turning 2FA for Dropbox that they use a secret length that's not a multiplier of 8, which breaks Go's base32 decoder.
99 lines
2.2 KiB
Go
99 lines
2.2 KiB
Go
package main
|
|
|
|
import (
|
|
"crypto/hmac"
|
|
"crypto/sha1"
|
|
"encoding/base32"
|
|
"encoding/json"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"log"
|
|
"math/big"
|
|
"os/user"
|
|
"path"
|
|
"strings"
|
|
"time"
|
|
)
|
|
|
|
func TimeStamp() (int64, int) {
|
|
time := time.Now().Unix()
|
|
return time / 30, int(time % 30)
|
|
}
|
|
|
|
func normalizeSecret(sec string) string {
|
|
noPadding := strings.ToUpper(strings.Replace(sec, " ", "", -1))
|
|
padLength := 8 - (len(noPadding) % 8)
|
|
if padLength < 8 {
|
|
return noPadding + strings.Repeat("=", padLength)
|
|
} else {
|
|
return noPadding
|
|
}
|
|
}
|
|
|
|
func AuthCode(sec string, ts int64) (string, error) {
|
|
key, err := base32.StdEncoding.DecodeString(sec)
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
enc := hmac.New(sha1.New, key)
|
|
msg := make([]byte, 8, 8)
|
|
msg[0] = (byte)(ts >> (7 * 8) & 0xff)
|
|
msg[1] = (byte)(ts >> (6 * 8) & 0xff)
|
|
msg[2] = (byte)(ts >> (5 * 8) & 0xff)
|
|
msg[3] = (byte)(ts >> (4 * 8) & 0xff)
|
|
msg[4] = (byte)(ts >> (3 * 8) & 0xff)
|
|
msg[5] = (byte)(ts >> (2 * 8) & 0xff)
|
|
msg[6] = (byte)(ts >> (1 * 8) & 0xff)
|
|
msg[7] = (byte)(ts >> (0 * 8) & 0xff)
|
|
if _, err := enc.Write(msg); err != nil {
|
|
return "", err
|
|
}
|
|
hash := enc.Sum(nil)
|
|
offset := hash[19] & 0x0f
|
|
trunc := hash[offset : offset+4]
|
|
trunc[0] &= 0x7F
|
|
res := new(big.Int).Mod(new(big.Int).SetBytes(trunc), big.NewInt(1000000))
|
|
return fmt.Sprintf("%06d", res), nil
|
|
}
|
|
|
|
func authCodeOrDie(sec string, ts int64) string {
|
|
str, e := AuthCode(sec, ts)
|
|
if e != nil {
|
|
log.Fatal(e)
|
|
}
|
|
return str
|
|
}
|
|
|
|
func main() {
|
|
user, e := user.Current()
|
|
if e != nil {
|
|
log.Fatal(e)
|
|
}
|
|
cfg_path := path.Join(user.HomeDir, ".config/gauth.json")
|
|
|
|
conf_content, e := ioutil.ReadFile(cfg_path)
|
|
if e != nil {
|
|
log.Fatal(e)
|
|
}
|
|
|
|
var cfg map[string]string
|
|
e = json.Unmarshal(conf_content, &cfg)
|
|
if e != nil {
|
|
log.Fatal(e)
|
|
}
|
|
|
|
currentTS, progress := TimeStamp()
|
|
prevTS := currentTS - 1
|
|
nextTS := currentTS + 1
|
|
|
|
fmt.Println(" prev curr next")
|
|
for name, rawSecret := range cfg {
|
|
secret := normalizeSecret(rawSecret)
|
|
prevToken := authCodeOrDie(secret, prevTS)
|
|
currentToken := authCodeOrDie(secret, currentTS)
|
|
nextToken := authCodeOrDie(secret, nextTS)
|
|
fmt.Printf("%-10s %s %s %s\n", name, prevToken, currentToken, nextToken)
|
|
}
|
|
fmt.Printf("[%-29s]\n", strings.Repeat("=", progress))
|
|
}
|