On Sun, May 18, 2008 at 12:56:29PM +0000, Stuart Henderson wrote:
> On 2008-05-18, Mark Shroyer <[EMAIL PROTECTED]> wrote:
> > I've set up a nice secondary authentication mechanism on a Linux server.
> > I use this when I must shell in from, e.g., a computer lab, and I don't
> > have an authorized SSH private key on my workstation.  To login without
> > a private key, I must:
> >
> >  1) Enter my account's current S/Key one-time password
> >
> > and
> >
> >  2) Enter my Unix password
> >
> > in sequence.
> 
> In what way does typing your password in to an untrusted machine
> improve security?

 1) I didn't say untrusted machine.  I know these computers' admins and
    fully trust them.

 2) If it is impossible to log into the machine remotely with only its
    password, then when one actually thinks about it for just a moment
    and gets over the knee-jerk "OMG you're giving them your
    password!!1!" reaction, one realizes that this scheme *does* in fact
    increase security compared to S/Key alone, even if I were to use it
    from an untrusted machine.

Now, I don't want this thread to turn into a long and boring critique of
my authentication device.  I just want to know, for better or for worse,
how one would go about setting it up on OpenBSD without PAM.  Any ideas?

-- 
Mark Shroyer
http://markshroyer.com/contact/

Reply via email to