OTP serves as additional protection in case of password leaks.
onetimepass
allows you to manage OTP codes and generate a master key.
The master key allows the base to be decrypted and encrypted. Make sure to keep it in a safe place, otherwise it will
not be possible to recover the data.
onetimepass
supports as an optional dependency the integration with the system keychain (cross-platform) in which the
application saves the master key.
- Python 3.10+
- PDM 1.11+
$ pdm install
To include the optional keychain support:
$ pdm install -G keyring
At the very beginning, the database must be initialised, which additionally creates the master key. It will save it to the keychain if this has been installed.
By default, it will print the generated key to the STDOUT. You need this behavior if you don't use the optional keychain integration.
If you do, you can pass the -q, --quiet
option to silence the output.
The application will automatically detect if you have the keychain integration installed, however, if you want to force
enable/disable it, you can by using respectively the -k, --keyring
and -K, --no-keyring
options.
Although, if you don't have the keychain integration installed, enabling it won't work:
It is possible to print the current master key stored in the keychain (if you need this for e.g. migrating the app to the different device).
This of course won't work if you don't use the keychain integration.
onetimepass
identifies the added OTP codes via the user-specified aliases, which should be short, easy-to-remember
names.
onetimepass
allows you to add new alias in two ways, either by specifying all the parameters manually,
using add hotp
or add totp
commands (depending on which type of the OTP you want to add), or by providing
the de facto standard URI invented by the Google.
$ pdm run otp add uri AWS-root
Enter URI:
Repeat for confirmation:
Example URIs
- TOTP: otpauth://totp/ACME%20Co:[email protected]?secret=HXDMVJECJJWSRB3HWIZR4IFUGFTMXBOZ&issuer=ACME%20Co&algorithm=SHA1&digits=6&period=30
- HOTP: otpauth://totp/ACME%20Co:[email protected]?secret=HXDMVJECJJWSRB3HWIZR4IFUGFTMXBOZ&issuer=ACME%20Co&algorithm=SHA1&digits=6&period=30
$ pdm run otp add totp AWS-root
Enter secret:
Repeat for confirmation:
$ pdm run otp add hotp AWS-root
Enter secret:
Repeat for confirmation:
$ pdm run otp rm <alias>
Are you sure? [y/N]:
To omit the interactive confirmation (--yes
option.
$ pdm run otp show <alias>
You can force the app to wait until the new OTP code is valid, in case the current one will be invalid in a short period
of time (so you won't have to rush with copy-pasting the code, or wait manually), using -w, --wait-for-next
option.
$ pdm run otp show -w <seconds> <alias>
This will accept the seconds of tolerance (if the remaining time of the current code to be valid is less than seconds, the app will wait, otherwise it will show the current code).
You can easily automate it even more:
$ pdm run otp show -w 10 <alias> | cut -d' ' -f2 | pbcopy; alert
To extract the code when it's ready, then copy it to the system clipboard (pbcopy
for macOS, xclip
for Linux), and
send the system notification to yourself when it's all finished (assuming you have the alert
alias configured,
available by default e.g. on Ubuntu Linux).
In case you want to migrate the application to the different device, you can export the local database to the format of
choice (currently only the json
is supported) and then import it.
You can use this not only to transfer the application between the devices, but also to create backups:
because onetimepass
is a CLI-based tool, you can even implement the cronjob that will periodically run the export
in
the background (
onetimepass
can provide tab completion for commands, options, and choice values. Bash, Zsh, and Fish are supported
$ pdm run zsh
$ eval "$(_OTP_COMPLETE=zsh_source otp)"
$ pdm run bash
$ eval "$(_OTP_COMPLETE=bash_source otp)"
As the onetimepass
have multiple alternatives, you may ask why bother with reinventing the wheel instead of using any
existing solution.
This section addresses that.
The main issue with this app is that it does not offer any way to backup the secrets, and synchronize them between the devices.
If you don't have the backup of the original QR codes, and you'll lose your mobile phone, you're screwed. Yes, services that provide the 2FA often offer the backup codes, but not every one of them, and this is not the optimal solution.
In theory, if you root the device, you can access the local database, but not everyone wants or can root their mobile phone, as this can e.g. void a device's warranty.
Besides, if you root the device, you can see the local database is stored in the plain text, which is a big security risk.
It does allow synchronizing secrets between the devices, but this happens through the provider servers. The application neither sent nor store your backup password, but it can still be non-optimal for some people to trust the external provider to handle such sensitive data.
Also, Authy does not support export or import of the secrets.
pass
is an extensible CLI-based password manager, and there is a pass-otp
plugin to handle TOTP (although, HOTP is not supported).
One issue is that it uses GnuPG for encrypting the local database, which can be tedious to configure:
To be honest, a few first times I tried to configure it, I failed miserably. This should be much easier and faster. ~ Daniel Staśczak
The second issue is that, as mentioned above, pass
is primarily the password manager.
If one wants only the TOTP client, it's a little bit of an overkill to install the whole password manager for that.
This is more of a personal preference, but if you use the GUI-based OTP client, especially on your mobile phone, there are some extra steps everytime you need to use it:
- You have to get your phone.
- You have to open the app.
- You have to type the code manually, if you need to enter the code on another device (e.g. to authorize on the desktop).
This is not very inconvenient, but I bet there were at least few times when you didn't had your phone with you while you had to authorize into the AWS account while working on something urgent, or get your phone out of the pocket every few hours, because the Keeper logged out you out of a sudden once again in a day.
If you're CLI power-user, using the CLI-based tool is just much quicker and convenient. And you can create some crazy pipelines (see the examples in the Usage section).
While onetimepass
does reinvent a wheel in general, one of the main goals of the project is to still be a secure
solution, and do not reinvent the wheel in regard to the security. Because of this reason, for generating the master
key and encrypting the local database, the high-level cryptographic library is
used.
The main algorithm for the HOTP/TOTP is implemented based on the official RFC and the reference implementation.
There are some functionalities which can be a security hole if used in an irresponsible manner (e.g. export
, key
),
but the same can be said about the sudo rm -rf --np-preserve-root /
, right?
Nevertheless, if you see any security issue, please feel free to report it, we're more than happy to consider it.