It's like Google Authenticator, but on a command line using your Linux box.
$ ga-cmd
123456
$ ga-cmd my-fave-site
654321
If you're using this repository for the compiled releases to generate TOTP codes you should instead be using my TOTP utility written in Go. It offers too many improvements to be overlooked and is the utility I personally use. Among these are:
- Executables for Linux, Windows, and Macintosh (more on request)
- Support for multiple secrets
- Command line options to add, delete, update, rename, and list secrets
- No more manual editing of a configuration file
- Ad-hoc secret support
- Bash completion
- Specify the time used to generate the seed, and/or adjust the current time forward and backward
- Continuous code output every 30 seconds
- Streaming of a shared secret collection using stdio
Ever try to sign onto Google only to be asked for a verification code? You sigh as calculate how many calories it'll take you to grab the phone from the other side of the table, or worse, the need to walk to the other side of the room. This application solves that, giving you access to that verification code from your Linux command line.
The extremely small application is built by leveraging the Google Authenticator PAM Module source itself. The build script takes your authenticator key, slightly obfuscates it, then creates an executable that can be used to output your 6 digit verification code every time it is executed.
This application outputs TOTP codes. These are compatible with a number of services include Google, GitHub, Dropbox, AWS, and probably any other service that implements TOTP codes. If you use this application for a service not listed here, please let me know or file an Issue or Pull Request to add it.
- Download the current release of
ga-cmd
- Make it executable:
chmod 755 ga-cmd
- Create and populate a
$HOME/.ga-cmd
file:echo myfavesite=thisismyexamplekey > $HOME/.ga-cmd
- Set the configuration file permissions:
chmod 600 $HOME/.ga-cmd
- ...and execute:
./ga-cmd myfavesite
These authentication codes are standardized message authentication codes derived from the Time-based One-Time Password algorithm (TOTP). Read more about them starting at the Wikipedia page for TOTP. You can find more source code for generating TOTPs by searching here on GitHub for TOTP. This project initially started for the fun of bending Google's PAM code to generate a TOTP code.
Multiple keys can be managed through a configuration file that resides at $HOME/.ga-cmd
. The format is one key per line, each line containing the key name followed by =
followed by the key. No spaces around the =
. The general format is:
name=key
An example file would be
google=ATLSZSA2YGLVDDBI
github=6DTUL4FV2FARV6DC
dropbox=PCBCFH5IG5RPLA7O
This configuration file contains your keys which must be kept private. Do not share this file or its contents. Because this file contains sensitive information, the application will not use it if the permissions are not restrictive enough and give an error reflecting this. The file should be owner read/write only. Group and Other/World should not have access. A file with proper permissions will look like
ls -l ~/.ga-cmd
-rw------- 1 username username 114 Apr 20 13:37 /home/username/.ga-cmd
Issuing the command chmod 600 ~/.ga-cmd
apply the proper permissions.
If the application was built with an internal key, running the executable will emit a 6 digit verification code for the key:
$ bin/ga-cmd
123456
Running the application with a single argument will cause it to ignore the internal key (if built with one), lookup the key in the key configuration file, then generate a verification code based on the key. If the applicaton was not built with an internal key, the first key in the configuration file will be used. For example, using the above configuration file to generate a verification code for the entry named github
would be
$ bin/ga-cmd github
654321
Note these lookups are case sensitive.
$ bin/ga-cmd GITHUB
Could not find key for GITHUB in /home/username/.ga-cmd.
Check the verification code against whichever application you normally used to generate TOTP codes, such as Google Authenticator or Authy. If it's wrong, check the time on your computer (it's used to calculate the verification code). If the time on the computer doesn't match the time on your phone, sync them and try again. If it still doesn't work, odds are you entered an incorrect key when you ran build.sh
.
Even better, pipe the output to a clipboard utility such as xclip
and paste the result into the verification code entry box.
$ bin/ga-cmd | xclip -sel clipboard
Obviously, that's a decent amount of typing so you'd want to script it so you can step through the whole dance by just clicking your mouse.
Two command line flags are supported
Use the --version
or -v
flag to show the version of ga-cmd
. This is useful for version validation and bug reporting. Example:
$ ga-cmd --version
ga-cmd version 1.0.0
Use the --list
or -l
flag to list the key names (tags) in the configuration file. Example:
$ ga-cmd --list
myfavesite
mysocialsite
myfinancialsite
Bash completions can be performed on the command line with the Bash completion script ga-cmd-completion.sh
. Example:
$ ga-cmd <tab><tab>
myfavesite myfinancialsite mysocialsite
$ ga-cmd myf<tab><tab>
myfavesite myfinancialsite
And using
$ ga-cmd mys<tab><tab>
will autocomplete to
$ ga-cmd mysocialsite
To enable Bash completion, before executing ga-cmd
use
source ga-cmd-completion.sh
Or to enable Bash completion for all future terminals add the above to your .bashrc
file.
Warning: If you build this application with an internal key, protect the executable and don't distribute it. It contains your authentication key which must be kept private (though it's loosely obscured), and anyone that can execute the application can use your verification codes.
The git repository contains submodules. Clone this repo then setup the submodules with:
$ git clone https://github.com/arcanericky/ga-cmd.git
$ cd ga-cmd
$ git submodule update --init --recursive
Install the PAM development library. On Ubuntu do this with:
$ sudo apt-get install -y libpam0g-dev
Optional: If you want to generate code coverage reports using the makefile coverage
target, install gcovr.
$ sudo apt-get install -y gcovr
Once you've done this, switch into the src
directory and execute build.sh
. If you want the application to contain a single internal key for a single service, specify the key on the command line. Otherwise, just execute build.sh
and use the external configuration file.
Building without an internal key:
$ cd src
$ ./build.sh
Building with an internal key:
$ cd src
$ ./build.sh <16 to 64 character key>
The source will compile, test routines are built and verified, then the ga-cmd
is built and deposited at bin/ga-cmd
.