On Wed, Jun 06, 2007 at 11:58:38AM -0700, Henry B. Hotz wrote:
> The OTP travels over a TBD link to the KDC.  The KDC then uses the  
> vendor-provided software to validate the OTP;  in other words the  
> vendor is validating that the KDC has a valid OTP.

How is that different than with, say, PAM?  How can the OTP server know
whether its client is a telnet server, or something else?  How can it
know that the user is on the client's console, logically or physically?

> The OTP vendor never validates the client and has no connection to  
> the client.  However that is exactly the problem which needs to be  
> solved.

Right -- that's a problem with the OTP protocols that we have.  Now I
understand your issue.

My argument is that to get better than this we'll need key generating
OTPs.  So we can build authentication mechanisms (for EAP/GSS/SASL,
pre-auth for the Kerberos V KDC PDU exchanges, etc...) that can do
better than today's simple minded just-send-the-OTP-over schemes.

That's definitely way out of scope for this list, UNLESS we (including
you) want to develop our own OTP protocols and authentication mechanisms
here.  But I suspect we don't.

Nico
-- 

Reply via email to