Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 8 Apr 1999 15:20:42 -0400 (EDT)
From:      Daniel Hagan <dhagan@cs.vt.edu>
To:        FreeBsd-security@freebsd.org
Subject:   Login & s/key brain damage?
Message-ID:  <Pine.OSF.4.02.9904081509520.19340-100000@vtopus.cs.vt.edu>

index | next in thread | raw e-mail

On a FreeBSD-3.1-Release system, I've configured the following in
/etc/skey.access
----->8-----
permit group wheel internet (my network) (my netmask)
# Force everyone to login with skey.
deny
----->8-----

This seems to work just as advertised, except for one thing:  Logging in
with an invalid username results in immediate error message while valid
accounts proceed to the password prompt:

----->8-----
%telnet localhost
Trying 127.0.0.1...
Connected to localhost.cs.vt.edu.
Escape character is '^]'.

FreeBSD/i386 (myhost.cs.vt.edu) (ttyp2)

login: bozo
Login incorrect
login: root
s/key 94 po93853
Password: 

----->8-----

It seems to me that a more correct behavior would be to always present a
(possibly random) skey challenge, and only reject the login after they try
a password. This current situation seems to present an easy way of id-ing
userid's on a system that someone wants secure.  Is this correct behavior,
or should we think about modifying login(1)?

Daniel

-- 
Daniel Hagan
Computer Systems Engineer
dhagan@cs.vt.edu



To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message



help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.OSF.4.02.9904081509520.19340-100000>