Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add warning about apps that don't support alternative hashing algorithms #30

Open
samdjstevens opened this issue Mar 3, 2020 · 5 comments
Labels
documentation Improvements or additions to documentation good first issue Good for newcomers help wanted Extra attention is needed

Comments

@samdjstevens
Copy link
Owner

Add some warnings in the README about using SHA256 and SHA512, with a list of known apps that do and don't support them.

@samdjstevens samdjstevens added documentation Improvements or additions to documentation good first issue Good for newcomers help wanted Extra attention is needed labels Mar 3, 2020
@connickshields
Copy link

I just wanted to give you a heads up that after testing, Google Authenticator on Android doesn't support SHA256 or SHA512. I also believe that Duo Security on iOS doesn't support SHA256 or SHA512, but I am not 100% sure on that.

@mendess
Copy link

mendess commented Jul 20, 2021

It seems Authy and 2FAS Authenticator also don't support SHA256 and SHA512

@Stexxen
Copy link

Stexxen commented Jul 20, 2021

Copied across from - #27 (comment)

Apps that work with SHA-256 and SHA-512
Android

  • Oracle Mobile Authenticator
  • Auth0 Guardian
  • Sophos Authenticator
  • FreeOTP Authenticator

iOS

  • Oracle Mobile Authenticator
  • IBM Verify
  • Sophos Authenticator
  • FreeOTP Authenticator

And apps that appear to not support SHA-256

  • Google Authenticator
  • Microsoft Authenticator
  • LastPass Authenticator
  • Duo Mobile
  • Authy
  • 2FAS Auth

@mendess
Copy link

mendess commented Jul 20, 2021

I'd like to add that Aegis on Android, also works with SHA256 and SHA512.

@damarur
Copy link

damarur commented Sep 19, 2023

Hey, I tried to use this library but no success.
I ended up using Keycloak implementations, adapting it a little bit.
Just in case this helps somebody, the URL that made it work with Google Authenticator and Microsoft Authenticator is something like this (used for creating the QR code):
otpauth://<type>/<issuer>:<username>?secret=<secret>&digits=6&algorithm=SHA1&issuer=<issuer>&period=30
Where type is "totp" or "hotp". (in my case "totp" because it's based on time)
Issuer and username will be displayed at the app and secret is just you secret in plain text.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
documentation Improvements or additions to documentation good first issue Good for newcomers help wanted Extra attention is needed
Projects
None yet
Development

No branches or pull requests

5 participants