Hello all,
we installed PrivacyIDEA 3.7.3 on Ubuntu 18.04.6 LTS. It works fine with TOTP, Google-Authenticator, RADIUS, and some VPN in our test-environment.
Now we are testing the use of a hardware-token, eToken Pass. The import of aladdin-xml for a few test-tokens was successful, the token type is “hotp”
But if we resync token with the input of two consecutive hash-values it always responds “resync failed”.
After changing the sync window to “999999” the following is showing up in the debug-log:
[2022-09-22 11:56:12,733][1743][139929312982784][DEBUG][privacyidea.lib.tokens.HMAC:186] Entering checkOtp with arguments (<privacyidea.lib.tokens.HMAC.HmacOtp object at 0x7f43bc090da0>, ‘129923’, 999999) and keywords {}
[2022-09-22 11:56:12,733][1743][139929312982784][DEBUG][privacyidea.lib.tokens.HMAC:153] OTP range counter: 1 - 1000000
[2022-09-22 11:56:12,733][1743][139929312982784][DEBUG][privacyidea.lib.crypto:186] Entering decrypt with arguments (…) and keywords {}
[2022-09-22 11:56:12,733][1743][139929312982784][DEBUG][privacyidea.lib.crypto:186] Entering aes_cbc_decrypt with arguments (…) and keywords {}
[2022-09-22 11:56:12,733][1743][139929312982784][DEBUG][privacyidea.lib.crypto:200] Exiting aes_cbc_decrypt with result HIDDEN
[2022-09-22 11:56:12,734][1743][139929312982784][DEBUG][privacyidea.lib.crypto:200] Exiting decrypt with result HIDDEN
[2022-09-22 11:56:15,827][1743][139929312982784][DEBUG][privacyidea.lib.tokens.HMAC:198] Exiting checkOtp with result 358927
[2022-09-22 11:56:15,828][1743][139929312982784][DEBUG][privacyidea.lib.tokens.hotptoken:591] exit. Failed to verify second otp: nextOtp: ‘402893’ != otp2: ‘192992’ ret: False
[2022-09-22 11:56:15,828][1743][139929312982784][DEBUG][privacyidea.lib.tokens.hotptoken:198] Exiting resync with result False
Does anyone have an approach to troubleshooting?
Thanks in advance
Jörg
Expert knowledge: In roughly 2012 there have been a couple of etoken Pass, that used a quirky keylength of 192 bit. This would not comply to any standard.
Thank you for your quick answer, cornelinux.
When importing the aladdin-xml there is a pgp public key shown up, which is of kind “RSA2048”. I assume, the keylength is also 2048 bit.
The etoken-pass has a production date 07/18/2022.
This is really strange to me.
We bought this just to test how to handle an alternative authentication method. We think that not everyone wants to use their cell phone, but a separate token.
Thank you for your patience, cornelinux. After I have imported the XML, the token type “hotp” appears in PI under “token detail”. I can’t change the token type via PI-surface.
If I press the button of the eToken several times, the same 6-digit number appears for 30s, and then another. The packaging in which the tokens were delivered says “token bundle etoken pass time”
In addition to the XML, another file (alpine.dat) was supplied by the vendor, which contains more information: