On Mon, 20 Jun 2005 07:32:09 -0500, Dave Feustel wrote: >On Monday 20 June 2005 01:32 am, Ben Hooper wrote: >> |>I thought you had more insight. All of OpenBSD's security is >> |at risk with >> |>this technology. >> |> >> |The security features of an OS will not stop a physical attack, no >> |matter how well designed. This is no different than the admin leaving >> |root's password on a post-it note stuck to the underside of the file >> |drawer. If you don't trust your physical environment, change it. In >> |this case, I'd remove the 'secure' flag from ttyCn, and use either a >> |serial console or SSH in from a keyboard I trusted (by buying >> |it myself >> |from a retailer, and using appropriate tamper-evident tape). >> >> >> One Time Passwords such as skey(1) are also good for insecure environments. >> >> Ben. > >I just read the man page for skey, but I still don't quite understand >how it works. Would I use a calculator to generate a response that I >type in response to a challenge, or what? > > Read it again and again and include the SEE ALSO files and learn how to use the docs and stop asking questions, the answers to which you have been pointed to already.
Seems like <anything> is a challenge to you boy. >From the land "down under": Australia. Do we look <umop apisdn> from up over? Do NOT CC me - I am subscribed to the list. Replies to the sender address will fail except from the list-server.