Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 09 Oct 1998 22:21:14 -0500
From:      "Jeffrey J. Mountin" <jeff-ml@mountin.net>
To:        Brandon Huey <bh@synergy.transbay.net>
Cc:        freebsd-security@FreeBSD.ORG
Subject:   RE: fwtk and skey authorization (+ssh)
Message-ID:  <3.0.3.32.19981009222114.007449dc@207.227.119.2>
In-Reply-To: <Pine.BSF.3.96.981009133426.22833A-100000@synergy.transbay. net>
References:  <l03110708b2441198068e@[192.168.6.3]>

next in thread | previous in thread | raw e-mail | index | archive | help
At 01:35 PM 10/9/98 -0700, Brandon Huey wrote:
> 
>on a related note, i recently discovered an s/key patched ssh and it's
>working great.
> 
>you can find it at: http://www.lackluster.net/~scott/ssh_skey.html

Rather neat, but is it doing the OTP over an encrypted tunnel ie first you
enter your private key password, then it prompts for a SKey password on the
server.  Or is this just so that you can use either RSA or SKey OTP
authentication?

Now if there was something to make it optional for POP, rather than
mandatory.  If you compile popper on a clean install, once you add a
/etc/skey.access file and do not wish to use SKey, the access file need a
permit.  Would be better to use a 2nd access file, especially if you use an
alternate passwd file.

Just commenting, since it not extremely important in my case, which is why
I haven't looked into it much. 8-)


Jeff Mountin - Unix Systems TCP/IP networking
jeff@mountin.net

To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?3.0.3.32.19981009222114.007449dc>