On 2013-03-04, Peter Bisroev <pe...@int19h.net> wrote:
> Hi All,
>
> Recently I had a chance to play with ./sysutils/login_oath and
> ./security/oath-toolkit ports maintained by Stuart Henderson. Both
> ports work fantastic, thanks Stuart!
>
> However I have a general question regarding various auth options with
> SSH (hopefully this list is OK for this discussion). There are obvious
> benefits to both public key and OTP authentication and they are very
> useful and unique in their own ways. But which one would you consider
> more secure?
>
> I am aware that "more secure" depends on the situation, such a whether
> the login is happening from a trusted terminal, how is the secret key
> stored on the device that is generating TOTP, is the public key
> encrypted, etc. But what are your thoughts in general?

I think it totally depends on the situation and can't really be applied
in general.. Either of them can be made to be unsafe.

> Would it make sense to have the ability to allow OpenSSH on OpenBSD to
> allow both public key and OTP to be used simultaneously (like RedHat's
> patch allows using RequiredAuthentications2 option to sshd_config)? Or
> does it make things needlessly complex?
>
> Thanks everyone!
> --peter
>
>

OpenSSH has this in -current, see sshd_config(5) AuthenticationMethods.

Reply via email to