On Wed, Jun 06, 2007 at 04:32:09PM -0700, Henry B. Hotz wrote:
> On Jun 6, 2007, at 12:58 PM, Nicolas Williams wrote:
> >I was thinking of pam_otp.
> 
> Ah!  Very interesting point.
> 
> I guess we're in violent agreement about the problem, but I guess an  

We've converged :)

But you see the problem, surely.  To do what you want you'd need to spec
out:

 - a new OTP
 - an SSHv2 userauth method
 - a SASL/GSS-API mechanism
 - an EAP method
 - a Kerberos V pre-auth

And get some/all of that implemented, and new tokens manufactured and
deployed.  By the time you've done the bare minimum the world will have
passed OTPs by -- we'll all be using smartcards embedded in our brains
by then.

> OTP vendor might argue that they've done as much as they can by  
> supplying such a pam module.  Only thing I can say is that the client- 
> side OTP "thing" really needs to be fastened to the user, not the app  
> server (telnetd in this example), and that SA's should be smart  
> enough not to subvert the security model.  Less than satisfying.

They would say that.  Look, it's easy to generate a string of stuff and
have the user type it in to software that doesn't know what else to do
with that stuff than to just kick it over to some other component, ad
naseum till you get to the OTP vendor's components.  How many ssh
clients and servers do you know that are pluggable w.r.t. userauth
methods?  How many different SASL and GSS-API plug-in ABIs are there?
And how many SASL or GSS-API implementations are not pluggable?  How
many KDCs are pluggable for pre-auth, right now (I know, MIT is working
on it)?

So I can't blame the OTP vendors.  They did the best they could to get
to the point where they got a good ROI.

> This discussion is really taking more time than I should devote to  
> it, I'm afraid.

It is.

Reply via email to