Re: Putting OPIE to rest (was: Re: cant login after make installworld: pam_opie.so.6 not found)

2023-01-05 Thread grarpamp
On 1/5/23, Graham Perrin wrote: > I recall the original email Orthagonal as it, and some notes since neither consider any potential gap issue or/of any perhaps whimful removal process, nor moves forward on any of potential better alternatives to that which were hint (port) a bit in posts even bef

Putting OPIE to rest (was: Re: cant login after make installworld: pam_opie.so.6 not found)

2023-01-05 Thread Graham Perrin
On 05/01/2023 02:59, grarpamp wrote: … https://lists.freebsd.org/archives/freebsd-security/2022-September/ https://lists.freebsd.org/archives/freebsd-security/2022-October/ … I recall the original email addressing three public lists (awareness across an unusually broad audience): -current,

Re: Putting OPIE to rest

2022-10-16 Thread grarpamp
On 9/15/22, Dag-Erling Smørgrav wrote: > Neither HOTP nor TOTP require dedicated devices. > HOTP codes are sequential and can be pre-generated... Those aren't really their intended or advertised usage models, nor do common implementations support those modes. Is FreeBSD contributing and supplying

Re: Putting OPIE to rest

2022-09-15 Thread Dag-Erling Smørgrav
grarpamp writes: > OPIE is the only PAM that allows printing out the future > secure tokens. Old school, secure, it just works. > > HOTP requires hardware, TOTP requires time, > neither are printable, both of those require some other > [hackable] hw/sw device that costs $$$ money, and > those devi

Re: Putting OPIE to rest

2022-09-15 Thread grarpamp
On 9/15/22, Dag-Erling Smørgrav wrote: > I will be removing OPIE from the main branch within the next few days. > It has long outlived its usefulness. Anyone still using it should look > into OATH HOTP / TOTP instead (cf. security/pam_google_authenticator). > https://reviews.freebsd.org/D36592 A

Putting OPIE to rest

2022-09-15 Thread Dag-Erling Smørgrav
I will be removing OPIE from the main branch within the next few days. It has long outlived its usefulness. Anyone still using it should look into OATH HOTP / TOTP instead (cf. security/pam_google_authenticator). https://reviews.freebsd.org/D36592 DES -- Dag-Erling Smørgrav - d...@des.no