bsdtalk117 - One Time Passwords

Published: June 13, 2007, 9:08 p.m.

b'

    \\n
  • Important when you don\'t trust the computer you are using, such as a library computer or internet kiosk.
  • \\n
  • Available by default in Free/Net/Open BSD.
  • \\n
  • FreeBSD uses OPIE, Net/Open use S/Key.
  • \\n
  • One time passwords are based on your pass phrase, a non-repeating sequence number, and a seed.
  • \\n
  • Initial setup should be done directly on the server.
  • \\n
  • "skeyinit" for Net/Open, "opiepasswd -c" for FreeBSD.
  • \\n
  • Enter a pass phrase that is not your regular account password.
  • \\n
  • Find your current sequence number and seed with "opieinfo" or "skeyinfo", for example: "497 pc5246".
  • \\n
  • Generate a list of the next 10 passwords and write them down, using "opiekey -n 10 497 pc5246" or "skey -n 10 497 pc5246".
  • \\n
  • When you log in from a remote machine that might have a keystroke logger, you can now use a one time password instead of your regular password.
  • \\n
  • For OpenBSD, log in as account:skey, for example "bob:skey", which will cause the system to present the s/key challenge.
  • \\n
  • For NetBSD, the system will always present you with the s/key challenge if it is configured for your account, although you can still use your regular password.
  • \\n
  • FreeBSD by default will force you to use a one time password if it is configured for your account.
  • \\n
  • If you want both OPIE and password authentication, FreeBSD allows you to list trusted networks or hosts in /etc/opieaccess.
  • \\n
  • Instead of carrying a list of passwords around, you can use s/key generators on a portable device that you trust, such as a palm pilot.
  • \\n
  • For more info, check the man pages.
  • \\n
\\nFile info: 6Min, 4MB.
\\n
\\nOgg Link:
\\nhttps://archive.org/download/bsdtalk117/bsdtalk117.ogg'