OPNsense uses TOTP which is an open Standard. There are many open and closed clients supporting it
Quote from: mimugmail on March 24, 2018, 10:12:07 pmOPNsense uses TOTP which is an open Standard. There are many open and closed clients supporting it Oh that's interesting... so why does the OPNsense documentation refer users to Google to set up and use OTP authentication to the firewall?
Quote from: seamus on March 24, 2018, 11:03:30 pmQuote from: mimugmail on March 24, 2018, 10:12:07 pmOPNsense uses TOTP which is an open Standard. There are many open and closed clients supporting it Oh that's interesting... so why does the OPNsense documentation refer users to Google to set up and use OTP authentication to the firewall?It does not only refer to Google Authenticator - it is already included in the sources but the build is not released yet:https://github.com/opnsense/docs/blob/27a90b3e0721d72525bd44ef23ee9f1ead1dd7c9/source/manual/how-tos/two_factor.rst#step-4---activate-authenticator-for-this-otp-seed
Yes - I've been using the Google Authenticator with my OPNsense firewall for several months now, and I've read through the documentation a few times now; esp the "How To" page. And I'm aware that 2FA is not proprietary to Google; it's an open standard, covered by an RFC, and there are other implementations that implement the standard that would be perfectly compatible with Google's implementation. However, unless I am misinformed, Google has recently made their code/their implementation of 2FA proprietary.
And so given all of that is true, my question is, "Why use Google's software and/or services in OPNsense?" In other words, given that it's an open standard, and other implementations are available, why is OPNsense's practice to refer users to Google - at least for the client side of the solution? Is it just because Google has a mobile app, and that's convenient for some users?
And please don't take this question as a challenge to decisions made by the OPNsense project. I support the project whole-heartedly, and I only want to understand the logic behind the approach.
P.S. And finally and FWIW, as a personal opinion only, I find using most all of Google's "services" and software these days is a frustrating PITA - it's far too arcane.
Quote from: seamus on March 25, 2018, 03:20:39 pmYes - I've been using the Google Authenticator with my OPNsense firewall for several months now, and I've read through the documentation a few times now; esp the "How To" page. And I'm aware that 2FA is not proprietary to Google; it's an open standard, covered by an RFC, and there are other implementations that implement the standard that would be perfectly compatible with Google's implementation. However, unless I am misinformed, Google has recently made their code/their implementation of 2FA proprietary.You can still download the sources and they are under an open source license:https://github.com/google/google-authenticator-android/
This project is an older fork of the one on the Play store. It's an older version that doesn't get changes synced to it from the Play store version.