Published: June 13, 2007, 9:08 p.m.
b'
\\n- Important when you don\'t trust the computer you are using, such as a library computer or internet kiosk.
\\n- Available by default in Free/Net/Open BSD.
\\n- FreeBSD uses OPIE, Net/Open use S/Key.
\\n- One time passwords are based on your pass phrase, a non-repeating sequence number, and a seed.
\\n- Initial setup should be done directly on the server.
\\n- "skeyinit" for Net/Open, "opiepasswd -c" for FreeBSD.
\\n- Enter a pass phrase that is not your regular account password.
\\n- Find your current sequence number and seed with "opieinfo" or "skeyinfo", for example: "497 pc5246".
\\n- Generate a list of the next 10 passwords and write them down, using "opiekey -n 10 497 pc5246" or "skey -n 10 497 pc5246".
\\n- When you log in from a remote machine that might have a keystroke logger, you can now use a one time password instead of your regular password.
\\n- For OpenBSD, log in as account:skey, for example "bob:skey", which will cause the system to present the s/key challenge.
\\n- For NetBSD, the system will always present you with the s/key challenge if it is configured for your account, although you can still use your regular password.
\\n- FreeBSD by default will force you to use a one time password if it is configured for your account.
\\n- If you want both OPIE and password authentication, FreeBSD allows you to list trusted networks or hosts in /etc/opieaccess.
\\n- Instead of carrying a list of passwords around, you can use s/key generators on a portable device that you trust, such as a palm pilot.
\\n- For more info, check the man pages.
\\n
\\nFile info: 6Min, 4MB.
\\n
\\nOgg Link:
\\nhttps://archive.org/download/bsdtalk117/bsdtalk117.ogg'