Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
forked frommdp/rotp

Python One-Time Password Library

License

NotificationsYou must be signed in to change notification settings

pyauth/pyotp

 
 

Repository files navigation

PyOTP is a Python library for generating and verifying one-time passwords. It can be used to implement two-factor (2FA)or multi-factor (MFA) authentication methods in web applications and in other systems that require users to log in.

Open MFA standards are defined inRFC 4226 (HOTP: An HMAC-Based One-TimePassword Algorithm) and inRFC 6238 (TOTP: Time-Based One-Time PasswordAlgorithm). PyOTP implements server-side support for both of these standards. Client-side support can be enabled bysending authentication codes to users over SMS or email (HOTP) or, for TOTP, by instructing users to useGoogleAuthenticator,Authy, or anothercompatible app. Users can set up auth tokens in their apps easily by using their phone camera to scanotpauth:// QR codes provided by PyOTP.

Implementers should read and follow theHOTP security requirementsandTOTP security considerations sections of the relevant RFCs. Atminimum, application implementers should follow this checklist:

  • Ensure transport confidentiality by using HTTPS
  • Ensure HOTP/TOTP secret confidentiality by storing secrets in a controlled access database
  • Deny replay attacks by rejecting one-time passwords that have been used by the client (this requires storing the mostrecently authenticated timestamp, OTP, or hash of the OTP in your database, and rejecting the OTP when a match isseen)
  • Throttle (rate limit) brute-force attacks against your application's login functionality (see RFC 4226, section 7.3)
  • When implementing a "greenfield" application, consider supportingFIDO U2F/WebAuthn inaddition to or instead of HOTP/TOTP. U2F uses asymmetric cryptography to avoid using a shared secret design, whichstrengthens your MFA solution against server-side attacks. Hardware U2F also sequesters the client secret in adedicated single-purpose device, which strengthens your clients against client-side attacks. And by automating scopingof credentials to relying party IDs (application origin/domain names), U2F adds protection against phishing attacks.One implementation of FIDO U2F/WebAuthn is PyOTP's sister project,PyWARP.

We also recommend that implementers read theOWASP Authentication Cheat Sheet andNIST SP 800-63-3: Digital Authentication Guideline for a high level overview ofauthentication best practices.

Quick overview of using One Time Passwords on your phone

  • OTPs involve a shared secret, stored both on the phone and the server
  • OTPs can be generated on a phone without internet connectivity
  • OTPs should always be used as a second factor of authentication (if your phone is lost, you account is still securedwith a password)
  • Google Authenticator and other OTP client apps allow you to store multiple OTP secrets and provision those using a QRCode

Installation

pip install pyotp

Usage

Time-based OTPs

import pyotpimport timetotp = pyotp.TOTP('base32secret3232')totp.now() # => '492039'# OTP verified for current timetotp.verify('492039') # => Truetime.sleep(30)totp.verify('492039') # => False

Counter-based OTPs

import pyotphotp = pyotp.HOTP('base32secret3232')hotp.at(0) # => '260182'hotp.at(1) # => '055283'hotp.at(1401) # => '316439'# OTP verified with a counterhotp.verify('316439', 1401) # => Truehotp.verify('316439', 1402) # => False

Generating a Secret Key

A helper function is provided to generate a 32-character base32 secret, compatible with Google Authenticator and otherOTP apps:

pyotp.random_base32()

Some applications want the secret key to be formatted as a hex-encoded string:

pyotp.random_hex()  # returns a 40-character hex-encoded secret

Google Authenticator Compatible

PyOTP works with the Google Authenticator iPhone and Android app, as well as other OTP apps like Authy. PyOTP includesthe ability to generate provisioning URIs for use with the QR Code scanner built into these MFA client apps:

pyotp.totp.TOTP('JBSWY3DPEHPK3PXP').provisioning_uri(name='alice@google.com', issuer_name='Secure App')>>> 'otpauth://totp/Secure%20App:alice%40google.com?secret=JBSWY3DPEHPK3PXP&issuer=Secure%20App'pyotp.hotp.HOTP('JBSWY3DPEHPK3PXP').provisioning_uri(name="alice@google.com", issuer_name="Secure App", initial_count=0)>>> 'otpauth://hotp/Secure%20App:alice%40google.com?secret=JBSWY3DPEHPK3PXP&issuer=Secure%20App&counter=0'

This URL can then be rendered as a QR Code (for example, usinghttps://github.com/soldair/node-qrcode) which can then bescanned and added to the users list of OTP credentials.

Parsing these URLs is also supported:

pyotp.parse_uri('otpauth://totp/Secure%20App:alice%40google.com?secret=JBSWY3DPEHPK3PXP&issuer=Secure%20App')>>> <pyotp.totp.TOTP object at 0xFFFFFFFF>pyotp.parse_uri('otpauth://hotp/Secure%20App:alice%40google.com?secret=JBSWY3DPEHPK3PXP&issuer=Secure%20App&counter=0'>>> <pyotp.totp.HOTP object at 0xFFFFFFFF>

Working example

Scan the following barcode with your phone's OTP app (e.g. Google Authenticator):

https://quickchart.io/qr?size=250&text=otpauth%3A%2F%2Ftotp%2Falice%40google.com%3Fsecret%3DJBSWY3DPEHPK3PXP

Now run the following and compare the output:

import pyotptotp = pyotp.TOTP("JBSWY3DPEHPK3PXP")print("Current OTP:", totp.now())

Third-party contributions

The following third-party contributions are not described by a standard, not officially supported, and provided forreference only:

  • pyotp.contrib.Steam(): An implementation of Steam TOTP. Uses the same API as pyotp.TOTP().

Links

For new applications:

Versioning

This package follows theSemantic Versioning 2.0.0 standard. To control changes, it isrecommended that application developers pin the package version and manage it usingpip-tools or similar. For library developers, pinning the major version isrecommended.

https://readthedocs.org/projects/pyotp/badge/?version=latest

[8]ページ先頭

©2009-2025 Movatter.jp