"Eric J. Schwertfeger" <[EMAIL PROTECTED]> writes:

> On 18 Apr 2000, Niels M�ller wrote:
> 
> > What should the user interface for that (i.e. lshd command line flags)
> > look like? 
> 
> I don't know the internal mechanics of lshd, so  I don't know which of the
> following would fit the best.  It largely depends on what mechanism would
> be used for adding additional auth mechanisms in the future.
> 
> --require-authcount=2
> 
> specifies that the user must auth using two methods rather than just one,
> though this doesn't control what two methods can be used.

I'm not sure this is terribly useful. It also seems a little
dangerous, in that the meaning of --require-authcount=2 changes.  if you uppgrade lshd 
to a version that implements yet
another userauth method,

> --require-auth=key,password
> 
> Allows for explicit control of whatever auth methods are added in the
> future.  Maybe allow for =key,* for key and any one other auth mechanism.
> 
> --require-key-and-password
> 
> Not as flexible as the second idea, but easier to code.
> 
> --require-key
> --require-password
> 
> One option per auth mechanism.
> 
> * Warning: you are now entering a floating-castles zone *
> 
> Hmmm.... thinking about the way Apache allows you to layer authentication
> schemes.  Of course, the parsing gets more complicated at that level.
> Maybe something that allows and/or type logic.  Use , for or, and + for
> and, and allow parenthesis.
> 
> --auth-control=(key+password),otp
> 
> could specify that the user can log in with key and password, or with just
> a one-time-password.  Or some kind of syntax that would allow netmasks to
> be added, so you could specify that anything on the local net gets in with
> just a key or password, anything else requires both (which would be useful
> to me in the DMZ at my day job).
> 
> --auth-control=net:12.9.219.0/24+*,(key+*)
> 
> or
> 
> --auth-control=(net:12.9.219.0/24,key)+*
> 
> (assuming that * indicates a wildcard meaning any auth method not used
> in matching some other part of the condition.  Meaning that net+key would
> be OK, since key wouldn't be used in the first part since you already have
> net, but net+net would fail.
> 
> Thinking it might be easier to track down, or do, a noninteractive
> PAM-type setup.
> 
> * You are now leaving the floating-castles zone, we hope no permanent
> damage was inflicted*
> 
> > As for ssh-agent, the version I use with ssh1 uses a unix domain
> > socket located under /tmp/ssh-my-name/, which is protected using the
> > file system's permisison bits. Any ssh-agent like functionality for
> > lsh will probably use a similar method.
> 
> And I realized that going farther than that is pointless on many OS, since
> many of them have a /proc structure that lets any process read the memory
> space of any other process that is owned by the same user, allowing any
> process that is running as me to peek into whatever program necessary
> to get the required password/passphrase.

Reply via email to