Nicolas Williams wrote on 12/ 1/06 09:15 AM:
> On Fri, Dec 01, 2006 at 04:49:53PM +0100, Bart Blanquart wrote:
>> === INTRODUCTION ===
>> --------------------
>>
>> When logging in remotely it is possible to use certificates or keys  
>> to establish the user's identity, but this is only possible if the  
>> host from which the login is initiated is under control of the user  
>> (so that the keys or certificates can be stored securely).
> 
> Note that smartcards are one way for users to deal with untrusted client
> hosts.  I suppose you want to avoid making smartcards a requirement; say
> so :)

 From a security perspective, that may be true, although you still risk
exposure of the PIN used to unlock the card (one of your two factors).

 From a practical perspective, an untrusted client probably isn't going
to have the right "middleware" that's needed to make your particular
type of smart card usable, if it even does have a card reader.


[snip]
> Adding support for a distributed OTP shouldn't be hard (unless we're
> talking about full RADIUS or DIAMETER support).

I think there'd be value in a supported pam_radius in Solaris, because
that would enable use of existing "AAA" providers. The FreeRADIUS
project has an implementation that works on Solaris:

http://www.freeradius.org/pam_radius_auth/

'course if you want a complete solution, you'd need the server-side of
RADIUS too (with your chosen OTP "engine" behind it)... but maybe
FreeRADIUS could help with that too...

What ever happed to OPIE anyway? :)

     ~Iain

-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/x-pkcs7-signature
Size: 6143 bytes
Desc: S/MIME Cryptographic Signature
URL: 
<http://mail.opensolaris.org/pipermail/security-discuss/attachments/20061201/cf4ea7c7/attachment.bin>

Reply via email to