From owner-freebsd-security@freebsd.org Tue Jun 18 13:10:50 2019 Return-Path: Delivered-To: freebsd-security@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id A055615BB636 for ; Tue, 18 Jun 2019 13:10:50 +0000 (UTC) (envelope-from rsimmons0@gmail.com) Received: from mail-lj1-x242.google.com (mail-lj1-x242.google.com [IPv6:2a00:1450:4864:20::242]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (2048 bits) client-digest SHA256) (Client CN "smtp.gmail.com", Issuer "GTS CA 1O1" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 8AC9574511 for ; Tue, 18 Jun 2019 13:10:49 +0000 (UTC) (envelope-from rsimmons0@gmail.com) Received: by mail-lj1-x242.google.com with SMTP id m23so13036992lje.12 for ; Tue, 18 Jun 2019 06:10:49 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=2iEWld0Of0eFsdSYXOFgR1U0R/13cE9G+Hn64FSm86Y=; b=gKx/m21ly27qBc3YRrRSnZi5+6emVnpSm1rrGScra3D9DzXWaPr07sEItM/MAFgJ3k b1fEhfCYS/fqmV1NmdXtAWe3TowAiEU3tgRWlPOljCUkas9dx04NaOx2tIQX59oh91q9 bIABY9DHkIanXphCYukZ6YvxhUNm3nh5upcQ8VXssNUkCsgctD604R1vi7KPRY45s6zt h2KODnorqigMyGTyrPjVcjBnOWzP2sJQWWppdT42PIpHTWVV1WHflyu9pGAGLtVV+jLm MwGCHLxeuoHf/c7Bs3f1KIIEZEnyetVUPoobO09lOrlhQkp3ocUw2hUrrc2biQb2O+M4 ZAkw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2iEWld0Of0eFsdSYXOFgR1U0R/13cE9G+Hn64FSm86Y=; b=HYC6dEPCnkYj2uJOCjxpOXSmleuAdVs8Hq9jszMcsk3xcG6ERupMDr7+uS66qhfuuX y6ygQVLBYPaS+dmJdpu0lrE+JnHYyGGJxFFgvRDoow84K02tBUCx5/6cofpihrjiwFo1 /vEHHGXIfPVLzM+UFt0JYSPrM6BN8Eazat3M7oltG1BR4RGs4D57eOzvp75SaqDTmAt9 NQosFMxtriQ0/LupfKJBQq0/7jF6AIDlJXj7K+cHG8An/qfnGfusCSAQaFbWKMauKf2C JJb0tTxXRhDySL4yHROSmEqlGxCPwancNXOI8+6EbQ5cJAo4IWTSFhTeEM3c6KgUWcWm aWCA== X-Gm-Message-State: APjAAAUtf3HAZGJKsADeLSXs+7Aj9NtZ1g1tl7SuvI2xTrGOs+OxfCKj C4wRC9NB+KW6aZkSwGuWV64mg2jpTbaNCCyVkJU= X-Google-Smtp-Source: APXvYqyRXMAL53WOh97bOvcTOVYlFfGxt+FpnKiHcyRLmMLvYgSACLlLzsIfL6syyTPpbEiP6mAi7d+W6YKfPrIZKMI= X-Received: by 2002:a2e:9155:: with SMTP id q21mr31988234ljg.198.1560863447963; Tue, 18 Jun 2019 06:10:47 -0700 (PDT) MIME-Version: 1.0 References: <20190618075954.GA30296@admin.sibptus.ru> In-Reply-To: From: Robert Simmons Date: Tue, 18 Jun 2019 09:10:36 -0400 Message-ID: Subject: Re: Untrusted terminals: OPIE vs security/pam_google_authenticator To: Dan Langille Cc: Victor Sudakov , freebsd-security@freebsd.org X-Rspamd-Queue-Id: 8AC9574511 X-Spamd-Bar: --- Authentication-Results: mx1.freebsd.org; dkim=pass header.d=gmail.com header.s=20161025 header.b=gKx/m21l; dmarc=pass (policy=none) header.from=gmail.com; spf=pass (mx1.freebsd.org: domain of rsimmons0@gmail.com designates 2a00:1450:4864:20::242 as permitted sender) smtp.mailfrom=rsimmons0@gmail.com X-Spamd-Result: default: False [-3.15 / 15.00]; TO_DN_SOME(0.00)[]; R_SPF_ALLOW(-0.20)[+ip6:2a00:1450:4000::/36]; FREEMAIL_FROM(0.00)[gmail.com]; URI_COUNT_ODD(1.00)[5]; DKIM_TRACE(0.00)[gmail.com:+]; DMARC_POLICY_ALLOW(-0.50)[gmail.com,none]; MX_GOOD(-0.01)[cached: alt3.gmail-smtp-in.l.google.com]; NEURAL_HAM_SHORT(-0.76)[-0.763,0]; FROM_EQ_ENVFROM(0.00)[]; RCVD_TLS_LAST(0.00)[]; MIME_TRACE(0.00)[0:+,1:+]; FREEMAIL_ENVFROM(0.00)[gmail.com]; ASN(0.00)[asn:15169, ipnet:2a00:1450::/32, country:US]; DWL_DNSWL_NONE(0.00)[gmail.com.dwl.dnswl.org : 127.0.5.0]; ARC_NA(0.00)[]; NEURAL_HAM_MEDIUM(-0.99)[-0.993,0]; R_DKIM_ALLOW(-0.20)[gmail.com:s=20161025]; FROM_HAS_DN(0.00)[]; RCPT_COUNT_THREE(0.00)[3]; NEURAL_HAM_LONG(-1.00)[-1.000,0]; MIME_GOOD(-0.10)[multipart/alternative,text/plain]; PREVIOUSLY_DELIVERED(0.00)[freebsd-security@freebsd.org]; TO_MATCH_ENVRCPT_SOME(0.00)[]; RCVD_IN_DNSWL_NONE(0.00)[2.4.2.0.0.0.0.0.0.0.0.0.0.0.0.0.0.2.0.0.4.6.8.4.0.5.4.1.0.0.a.2.list.dnswl.org : 127.0.5.0]; IP_SCORE(-0.39)[ip: (2.93), ipnet: 2a00:1450::/32(-2.49), asn: 15169(-2.32), country: US(-0.06)]; RCVD_COUNT_TWO(0.00)[2] Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: freebsd-security@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: "Security issues \[members-only posting\]" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 18 Jun 2019 13:10:50 -0000 I am thinking about it from the perspective of having one single 2fa across as many systems as possible. On Tue, Jun 18, 2019, 09:09 Robert Simmons wrote: > You are correct for SSH. > > On Tue, Jun 18, 2019, 09:07 Dan Langille wrote: > >> On Jun 18, 2019, at 9:02 AM, Robert Simmons wrote: >> >> On Tue, Jun 18, 2019, 04:01 Victor Sudakov wrote: >> >> Dear Colleagues, >> >> I've used OPIE for many years (and S/Key before that) to login to my >> system from untrusted terminals (cafes, libraries etc). >> >> Now I've read an opinion that OPIE is outdated (and indeed its upstream >> distribution is gone) and that pam_google_authenticator would be more >> secure: https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D237270 >> >> Is that truly so? With 20 words in OPIE and only 6 digits in >> pam_google_authenticator, how strong is pam_google_authenticator against >> brute force and other attacks? >> >> >> Victor, >> >> To throw a new wrinkle in the equation: Google Authenticator codes can b= e >> intercepted by a phishing page. U2F protocol is even better, and can't b= e >> intercepted via phishing. >> >> There are U2F libraries in ports. >> >> https://en.wikipedia.org/wiki/Universal_2nd_Factor >> >> Cheers, >> Rob >> >> >> >> If my Google Authenticator codes are on my phone, and I'm entering them >> into my ssh session, how is a phishing page involved? >> >> =E2=80=94 >> Dan Langille >> http://langille.org/ >> >> >> >> >> >>