Published: June 13, 2007, 9:08 p.m.
\n- Important when you don't trust the computer you are using, such as a library computer or internet kiosk.
\n- Available by default in Free/Net/Open BSD.
\n- FreeBSD uses OPIE, Net/Open use S/Key.
\n- One time passwords are based on your pass phrase, a non-repeating sequence number, and a seed.
\n- Initial setup should be done directly on the server.
\n- "skeyinit" for Net/Open, "opiepasswd -c" for FreeBSD.
\n- Enter a pass phrase that is not your regular account password.
\n- Find your current sequence number and seed with "opieinfo" or "skeyinfo", for example: "497 pc5246".
\n- Generate a list of the next 10 passwords and write them down, using "opiekey -n 10 497 pc5246" or "skey -n 10 497 pc5246".
\n- When you log in from a remote machine that might have a keystroke logger, you can now use a one time password instead of your regular password.
\n- For OpenBSD, log in as account:skey, for example "bob:skey", which will cause the system to present the s/key challenge.
\n- For NetBSD, the system will always present you with the s/key challenge if it is configured for your account, although you can still use your regular password.
\n- FreeBSD by default will force you to use a one time password if it is configured for your account.
\n- If you want both OPIE and password authentication, FreeBSD allows you to list trusted networks or hosts in /etc/opieaccess.
\n- Instead of carrying a list of passwords around, you can use s/key generators on a portable device that you trust, such as a palm pilot.
\n- For more info, check the man pages.
\n
\nFile info: 6Min, 4MB.
\n
\nOgg Link:
\nhttps://archive.org/download/bsdtalk117/bsdtalk117.ogg