On 2015-12-16 06:21:01, Ilkka Virta wrote:
> A problem with doing that, is that anything that runs with the user's 
> permissions could trivially read the secret key from the user's home 
> directory. With SSH keys it's not a problem, since they are _public_ 
> keys. Plus, a user could do something stupid, like resetting the OTP 
> counter on every login, so they wouldn't need to use a pesky changing 
> password, but instead use the same one always...
>
> I think some unix-like systems have per-user password files under /etc, 
> so that they don't need setuid-root helpers to access them, but there 
> still is some program to sanity check the password the user tries to 
> set. (a setgid helper plus some trickery with file and directory 
> permissions.) Doing something like that would simplify the backend, but 
> of course you'd still need a helper application to access the files.

Right, you are right of course. I do think it's critical to keep that
file from being readable from random apps. The format *is* also a little
brittle so it seems important to have standardized access as well...

Maybe having a system similar to shadow passwords would be necessary
here: there could be a secret file that can only be read by root (or
with the right caps) and would need a special tool (oath.passwd?) to
reset.

so harder than i thought...

a.
-- 
Si l'image donne l'illusion de savoir
C'est que l'adage pretend que pour croire,
L'important ne serait que de voir
                        - Lofofora

Reply via email to