Re: Looking for Special Challenge-Response Auth PAM Module, or Similar

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

 



On Wed, 24 Aug 2022, Demi Marie Obenour wrote:

From a more meta perspective:

- Having a shared secret used by all appliances is a really bad idea.
 Root or even physical access to one appliance should not harm the
 security of any other appliance.

- A determined attacker with physical access *will* be able to get
 root on the box, so plan accordingly.  You do not want the iOS
 situation where researchers hoard exploits because they cannot do
 their work without them.

- It seems that you are trying to prevent your customer (who presumably
 owns the product) from being able to log in to their own devices.
 Generally, this is considered rather consumer-unfriendly, so I
 would like to know what the underlying reason for it is.

- Challenge-response will not prevent an attacker from injecting
 their own data into the already-authenticated session.  However,
 given that you should be assuming that whoever has physical access
 can get root (see above), this should not be a serious problem.

very much agree with everything Demi says here.

years ago I implemented the Defender challenge/response protocol as a pam plugin. It had a per-user secret (see discussion above on how you could have a per device one) and then generated a random number and presented it to you. you entered it into a handheld calc type thing which encrypted it with the secret (this is old enough it used DES), and a portion of the result was the password (6-8 characters of challenge, 8 characters of hex output, not unreasonable to type)

just don't implement it as a phone app or you become only as secure as that app

but again, why so customer hostile?

David Lang
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev
_______________________________________________
openssh-unix-dev mailing list
openssh-unix-dev@xxxxxxxxxxx
https://lists.mindrot.org/mailman/listinfo/openssh-unix-dev

[Date Prev] [Date Next] [Thread Prev] [Thread Next] [Date Index] [Thread Index]

[Index of Archives]     [Linux ARM Kernel]     [Linux ARM]     [Linux Omap]     [Fedora ARM]     [IETF Annouce]     [Security]     [Bugtraq]     [Linux]     [Linux OMAP]     [Linux MIPS]     [ECOS]     [Asterisk Internet PBX]     [Linux API]

  Powered by Linux