Re: mobile phone + password = 2 factor auth?

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Tue, May 26, 2009 at 13:11, Seth Vidal <skvidal@xxxxxxxxxxxxxxxxx> wrote:
> On Tue, 26 May 2009, Till Maas wrote:
>
>>
>> Why is this? Even an attacker that got access to your desktop without
>> specifically targetting a Fedora infrastructure team member can afterwards
>> compromise your phone, once he noticed that you use it to login to Fedora.
>> The
>> browser cache or e-mails may indicate that you login to Fedora and some
>> config
>> files for phone synchronization can show the attacker, how the phone can
>> be
>> compromised.
>
> Doesn't this same argument stand if you plug the yubikey into the machine?
> Ie: sniff the incoming usb traffic and grab the "password" that the yubikey
> has just inputted?
>
> -sv

Yubikey uses a one time password (OTP) so sniffing the output of the
device would yield the key for that particular time and wouldn't be
able to be used at a later time.

Eric "Sparks"

_______________________________________________
Fedora-infrastructure-list mailing list
Fedora-infrastructure-list@xxxxxxxxxx
https://www.redhat.com/mailman/listinfo/fedora-infrastructure-list

[Index of Archives]     [Fedora Development]     [Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [KDE Users]

  Powered by Linux