I'm Currently working in a new Project which aims to enable a machine using only the TCP/IPv6 stack to communicate with IPv4 machines seamlessly through TCP.
Technology stack:
Python: Implementation language
Scapy: for the capture, analysis, modification, creation and injection of IPv4 or IPv6 packets.
NetFilter: especially the 'mangle' table which allow us
to intercept incoming packets to TCP/IP stack, through the channel "PREROUTING".
NFQueue: The netfilter gateway ⇔ "User space" that will allow us to retrieve packages
IPv4 and IPv6 in a user program from a netfilter rule.
Radvd: A demon making the dissemination of "router advertisement" for the spread of IPv6 network prefix and the router supporting the traffic to/from outside the local network.
Socat: For making TCP connections either on IPv4 or IPv6.
The repository is currently private for Academic reasons, and will be shortly available for public
21 April 2013
19 April 2013
OTP (One Time Password) generator
I recently, worked on a project that was to develop a platform for electronic validation.
And I implemented an authentication system by OTP (using google algorithm)
OTP?:
OTP(one time password) is an authentication system, used to check a user identity without asking him his real password.The first step is to have a secret (password) shared between the client and the server, and then every 30 sec a new OTP can be generated on both side using this secret and the current time. a generated OTP is only valid for 30 sec.
Advantage:
- The real secret is never exchanged between the client and the server during authentication
- In case your password is stolen, by keylogger or network sniffer for example, it is impossible to reuse it 30s after his generation.
disadvantages:
- The main problem of this system is the time synchronization between the client and the server:
because if the server and the client is not synchronized in time (which is very likely), they can generated at the same time two different OTP, which leads to an authentication failure
![]() |
| OTP generator with color notification |
#!/usr/bin/python
import base64,time,hmac,sys, datetime
from hashlib import sha1
import struct
class otp_google:
def __init__(self,secret):
self._secret = secret
def compute(self, date):
key = base64.b32decode(self._secret,True)
temps = int(date / 30)
message = struct.pack('>q', temps)
hashed = hmac.new(key, message, sha1)
hexa = hashed.digest().encode('hex')
lastBit = hexa[-1]
offset = int(lastBit,16)
offsetStart = 0 if offset == 0 else 2*offset
offsetEnd = offsetStart + 8
truncated = hexa[offsetStart:offsetEnd]
token_base = int(truncated,16) & 0x7fffffff
token = token_base % 1000000
return str(token).zfill(6)
#!/usr/bin/python
# -*- coding: utf-8 -*-
from Tkinter import *
import time,os,datetime,Otp
coul = ["green", "yellow", "red" ]
i = 0
secret = "ggnpvfgvmedxeroz"
OTP = Otp.otp_google(b'%s'%secret)
def update():
global i
sec = int(datetime.datetime.now().strftime("%S"))%30
chrono.configure(text="OTP generated since: %2s sec"%sec)
otp.configure( fg = coul[i], text=OTP.compute(int(time.time())))
i= (sec)/10
fen.after(1000, update)
def setSecret():
global OTP,secret
newSecr = entree.get()
if not newSecr or len(newSecr)!=16:
entree.configure(bg = "red")
return
secret = entree.get()
OTP = Otp.otp_google(b'%s'%secret)
update()
return
fen = Tk()
fen.title("OTP generator")
L,l = 300,100
can = Canvas( width=L, height=l)
can.pack(side=TOP)
can.create_text(L/2,30,text="OTP GENERATOR",fill="Blue",font="Helvetica 20 ")
#can.bind('',start)
Label(text="Secret :").pack(side=TOP)
entree = Entry(show="*")
entree.pack(side=TOP)
Button(text=" O K ", bg = "#00f", fg= "#fff", width=10, command=setSecret).pack(side=TOP)
chrono = Label(fen, text= "OTP generated since: %2s sec"%0)
chrono.pack(side=BOTTOM)
otp=Label(fen,text="000000", font="Helvetica 50 ",fg="#ccc")
otp.pack(side=BOTTOM)
fen.mainloop()
Subscribe to:
Comments (Atom)
