bro are these legitimate keys?

On Mon, Apr 29, 2024, 6:14 PM Martin Neitzel <
neit...@hackett.marshlabs.gaertner.de> wrote:

> PW> Apparently I need to "purchase an inexpensive OATH TOTP compatible
> PW> token device."
>
> Here's another "thumbs-up" for the pkg "oath-toolkit".
>
> I drive its oathtool(1) with a simple, rwx------ shell wrapper which
> collects my personal seed secrets and tells me both the current and
> upcoming TOTP, syncing on the HH:MM:{00,30} switch-overs.
>
> (With an intentional off-by-one, cannot remember why I preferred
> it that way, though.  The sample seeds below are not the real thing
> -- no worries.)
>
> Oh:  exit the loop with Ctrl-C.
>
>                                                         Martin Neitzel
>
>
> #!/bin/sh
>
> case "$1" in
>         -h*|-hzi)       secret=LDCKNdVBUJUWMCDBCDOKQSDLC ;;
>         -g*|-github)    secret=KMSXBBSPVOFBWCKX ;;
>         -m*|-microsoft) secret=sxok3dck8skxn9sx ;;
>         -o*|-oci)       secret="SLODCNCDJNCDJBDCJBDCJBSXNI" ;;
>         -*)     echo "$1: no such option" 1>&2 ; exit 1 ;;
>         ?*)     secret=$1 ;;
>         "")     echo "usage: $0 [ -h | -m | -g | -o | <SECRET> ]"
>                 exit 1
>                 ;;
> esac
>
> trap "exit 0" INT
>
> while true; do
>         t=`date +%S`
>         date +"%T,  current & next token (changes on seconds :00 and :30):"
>         oathtool --totp -w1 -b $secret
>         # gotcha!  $t may come as 08 or 09 which would be illegal octal
>         # numbers -- so we need to nuke a leading "0":
>         sleep $(( 1 + 30 - (${t#0} % 30) ))
> done
>

Reply via email to