Hi Stuart,

On Mon, Mar 4, 2013 at 7:33 PM, Stuart Henderson <s...@spacehopper.org> wrote:
>> I am aware that "more secure" depends on the situation, such a whether
>> the login is happening from a trusted terminal, how is the secret key
>> stored on the device that is generating TOTP, is the public key
>> encrypted, etc. But what are your thoughts in general?
>
> I think it totally depends on the situation and can't really be applied
> in general.. Either of them can be made to be unsafe.

That makes sense. I guess it all depends on your trust relationship
with the party whom you are allowing to connect to your hosts.

> OpenSSH has this in -current, see sshd_config(5) AuthenticationMethods.

That is great! I will definitely give it a go.

Thank you!
--peter

Reply via email to