tl;dr TypToP (pronounced as 'tAip-top') is a password checking scheme that learns from your mistakes in typing login password and let you log in to your laptop with small typos.
If you install this software and want to participate in our research study, please fill in this this short survey. Thanks!!
Checkout the new C++ version of this here. It is more stable and much faster. Prebuild packages are available for many systems.
It requires Python-2.7 and some more depending on your OS, check the Requirements Section.
- OSX 10.9+
- Most of Linux distros (Tested in Ubuntu 14.04+, CentOS, RedHat, Arch.)
# If you don't have pip, install it using the following command.
$ curl https://bootstrap.pypa.io/get-pip.py | sudo python2.7 # use 'wget -O -' if you don't have 'curl'
$ sudo pip install -U --ignore-installed typtop && sudo typtops.py --init
To uninstall run $ sudo typtops.py --uninstall
.
TypToP has following non-python dependencies requird only for Linux. The Pythonic dependencies are auto-installed while installing with pip.
python-setputools
, if you are a python user, then this is most likely already installed.python-dev
, forpython.h
dependencies with some Cython modules.openssl-dev
orlibssl-dev
, for cryptography.io (only in Linux only). The name might be different for your distribution. Please Google.libffi-dev
, for cryptography.io.libpam-dev
, for pam_typtop.gcc
, obviously!! Might be best way to install it isbuild-essential
.cronie
, andwget
for Arch Linux.
-
CentOS: I had to install gcc and python-devel
$ yum install python-devel gcc python-devel openssl-devel
-
Redhat: I had to install redhat-rpm-config and python-devel
$ dnf install python-devel openssl-devel redhat-rpm-config
-
Debian (and Ubuntu):
$ apt-get install build-essential python-dev libffi-dev libssl-dev pkg-config
-
Arch
$ pacman -S python-devel cronie wget
(This is for those who are overly interested in learning about the software :)) Password typing mistakes are prevalent and annoying, as it unnecessarily stops legitimate users from doing something more productive than merely retyping their passwords. Usability of passwords will improve significantly, if some small typographical errors are allowed while checking passwords. However, as passwords are not stored in plaintext, it is not trivial to check whether or not an entered password is a typo of the stored password or an adversarial guess. One possible solution is to check a set of possible corrections of the entered password, and test each of them against the stored hash of the original password; if any of the corrections produce correct hash, then let the user login. The major drawback of this approach is that, to be effective in correcting typos, we need to learn an optimal small set of correctors that can cover a large swath of corrections. This is not only difficult to obtain, but also having a global set of correctors is wasteful and insecure, as not every people make all types of typing mistakes.
Here, we propose a typo correcting system that learns about the typos made by an individual while typing their passwords, and allows the user to log in with five most probable mistyped variants of their password which are safe to do so. In this way, we can keep the number of corrections low (saving in computation overhead and security loss), while maximizing the benefits of password typo correction.
In OSX, this installs a modified
pam_opendirectory
module which calls the Typtop module on every invocation for authentication for su
and screensaver
.
Note, sudo
is not modified, so if (for some reason) TypTop fails, you can just change the /etc/pam.d/su
and
/etc/pam.d/screensaver
file.
In Linux, pam_unix
is primary module for authentication. Typtop creates a PAM module named
pam_typtop.so
and modify the pam config files in way such that
whenever pam_unix
is called for authentication the control is next passed on to pam_typtop.so
.
In Linux all binaries (su, sudo, login etc.) are modified to use pam_typtop.so, however, even if TypTop crashes
the applications will function properly, only with a error message about pam_typtop.
This runs with shadow
group's permission, which is not technically root
, but close.
You can use this utility to control the settings of adaptive
typo-tolerance. We are working on cleaning this utility and making it easier to use.
$ typtop
usage: typtop [-h] [--init] [--allowtypo {yes,no}] [--allowupload {yes,no}]
[--status STATUS [STATUS ...]] [--uninstall] [--update]
[--check CHECK CHECK CHECK] [--debug]
optional arguments:
-h, --help show this help message and exit
--init To initialize the DB. You have to run this once you
install pam_typtop
--allowtypo {yes,no} Allow login with typos of the password
--allowupload {yes,no}
Allow uploading the non-sensitive anonymous data into
the server for research purposes.
--status STATUS [STATUS ...]
Prints current states of the typo-tolerance. Needs a
username as argument.
--uninstall Uninstall TypToP from your machine. Will delete all
the data related to TypTop too.
--update Updates TypTop to the latest released version
--check CHECK CHECK CHECK
(INTERNAL FUNCTION. PLEASE DON'T CALL THIS.)
--debug Prepare report for debugging.
(If you discover TypTop is not working as it should,
can you please run this and send the output to me.)
This module tries to add typo tolerance to standard Unix password based authentication systems. It uses Pluggable authentication module (PAM) to plug typo tolerant password checking into normal linux login.
The script will report the following information back to us for research purposes. All the collected data is anonymous, and handled with utmost care. All the sensitive data in the user's laptop is encrypted, and the weakest link in the whole system is as strong as the user's correct password or typos of it. It's important to note not all typos are accepted as safe, and the system will allow only the typos which are very "close" to the original password.
- The timestamp and local time of logging in.
- A unique id of the submitted password. The id is obtained by computing
HMAC
of the submitted password with a key derived from the original password and a random 128-bit secret. The 128-bit secret never leaves the user's computer. Therefore, without the secret, it is impossible to perform brute-force dictionary attack against the submitted passwords and invert the ids. The key is encrypted with a public key derived from user's password so even if someone steals the key from the laptop has to know the password to use it. If the user uninstalls the script that key is deleted immediately. - Whether or not the entered password is one of the frequent typos.
- Whether or not the entered password is an easy-to-correct typo (i.e., flipped cases, or a character added to the end or beginning of the original password).
- The relative change in the strength of the typo with respect to the original password.
- The edit distance between the typo and the original password
-
I installed typo-tolerance, but I don't see any changes. Don't panic, Typtop works silently. Try to check the
/var/log/typtop.log
, if it is getting updated with every invocation ofsu
orsudo
, then it is working.If not, then there is something to worry about. This could be due to multiple reasons. The installations might be unsuccessful.
You can run
typtop --status $USER
, and check if the lineLogin with typos: True
exists or not. If "Login with typos" is not true, you can set it to true by runningsudo typtop --allowtypo yes
. -
Can I opt out from participating in the study after I install the software? Of course! Our script has two parts. The first part is responsible for managing the necessary database of typos and sending the anonymous and non-sensitive logs to the server. The second part allows you to log in with a previously seen typo of your password which meets certain password policies.
- To allow/disallow logging in with a mistyped password,
$ sudo typtop --allowtypo yes/no
- To enable/disable sending the logs (and participating in the research study),
$ sudo typtop --allowupload yes/no
- By default the software will send the logs and will allow you to log in with your mistyped password.
- Also, you can uninstall the whole things by running
$ sudo typtop --uninstall
, and it will remove all store-data and reset your setting to the usual log-in settings
- To allow/disallow logging in with a mistyped password,
-
What if the typo-tolerance PAM module is buggy? Shall I be locked out? We took lot of effort in ensuring that the pam no one is locked out due to PAM. But in case you are locked out, the option is to go to recover mode and be droped to a recover shell, or boot with a usb drive, and reset the password.
-
If the password is changed, the
pam_typtop
will automatically updates itself after couple of right new password entry.
- Remove typtops.py and creat a c binary for all typtop operations
Enjoy! Write to us with your feedbacks and comments.