Skip site navigation (1)Skip section navigation (2)
Date:      Mon, 2 Mar 2009 10:28:49 +1100
From:      "Rich Healey" <healey.rich@itreign.com>
To:        <freebsd-security@freebsd.org>
Subject:   RE: OPIE considered insecure
Message-ID:  <006001c99ac5$7ad42c90$707c85b0$@rich@itreign.com>
In-Reply-To: <20090211180709.GB1467@server.vk2pj.dyndns.org>
References:  <200902090957.27318.mail@maxlor.com>	<20090209170550.GA60223@hobbes.ustdmz.roe.ch>	<alpine.BSF.2.00.0902091246280.61088@mm.orthanc.ca>	<20090209134738.G15166@treehorn.dfmm.org>	<alpine.BSF.2.00.0902091402040.61088@mm.orthanc.ca>	<20090209224806.GB63675@hobbes.ustdmz.roe.ch>	<alpine.BSF.2.00.0902091519580.61088@mm.orthanc.ca> <20090211180709.GB1467@server.vk2pj.dyndns.org>

next in thread | previous in thread | raw e-mail | index | archive | help
I've been reading this thread with great interest. At present my primary
server is ssh keys only, which is all well and good, to login I bounce to a
node that allows passwords and then to my server, but this is still not
ideal. It just eliminates a very small attach surface.

I'm thinking about implementing OPIE, but after reading this I'm not so
sure. What's consensus on the best approach to one time logins?

-----Original Message-----
From: owner-freebsd-security@freebsd.org
[mailto:owner-freebsd-security@freebsd.org] On Behalf Of Peter Jeremy
Sent: Thursday, 12 February 2009 5:07 AM
To: Lyndon Nerenberg
Cc: freebsd-security@freebsd.org
Subject: Re: OPIE considered insecure

On 2009-Feb-09 15:30:33 -0800, Lyndon Nerenberg <lyndon@orthanc.ca> wrote:
> From what you're describing, I would be more inclined to carry a 
> bootable OS on that USB stick and reboot into that.

Keep in mind that libraries, internet cafes etc aren't going to be keen on
you turning up with some (to them) random USB stick and wanting to reboot
their pride-and-joy off it.

I suspect your choices are to either use OPIE (or some adaption thereof)
with ssh on an untrusted computer and assume that anything you type will be
logged or carry your own trusted computer and use some form of wireless (3G,
NextG etc) to communicate with your systems.

Note that using very large sequence numbers should slow down an attacker
(though only linerarly) since they still need to iterate
MD5 by that many rounds.

--
Peter Jeremy




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?006001c99ac5$7ad42c90$707c85b0$>