Date: Sun, 14 Jan 2001 01:46:08 -0600 (CST) From: Frank Tobin <ftobin@uiuc.edu> To: <opentrax@email.com> Cc: <genisis@istar.ca>, <security@FreeBSD.ORG> Subject: Re: opinions on password policies Message-ID: <Pine.BSF.4.31.0101140141480.41470-100000@palanthas.neverending.org> In-Reply-To: <200101140733.XAA00644@spammie.svbug.com>
next in thread | previous in thread | raw e-mail | index | archive | help
opentrax@email.com, at 23:33 -0800 on Sat, 13 Jan 2001, wrote:
This is not a good policy. For small infrasturcures (5-100 users),
PKA might be acceptable. However, this is useful only if ALL users
login remotely. Even then, PKA, such as used in SSH, has
management problems.
I'll agree that a lot is dependent on the context of the authentication
(something which was not elaborated on). However, if it is a system where
each user has their own (single-user,closed) workstation, along with there
existing network-wide servers used, a good policy might be to mandate
public-key authentictaion on the network-wide servers, while not caring
about the security policy each user puts on his own machine.
If there is secure computational power at the hands of the user, then PKA
is definitely a good way to go.
--
Frank Tobin http://www.uiuc.edu/~ftobin/
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-security" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.4.31.0101140141480.41470-100000>
