Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 9 Jul 2015 09:47:15 -0700
From:      jungle Boogie <jungleboogie0@gmail.com>
To:        lev@freebsd.org
Cc:        "freebsd-security@freebsd.org" <freebsd-security@freebsd.org>
Subject:   Re: FreeBSD + Yubikey NEO in OATH-HOTP mode?
Message-ID:  <CAKE2PDvEeKEWaDOkKisXoKmwpVyDi1PRba%2BOPXdek=Oo=4Qe1Q@mail.gmail.com>
In-Reply-To: <559E9E3E.7050709@FreeBSD.org>
References:  <559E9E3E.7050709@FreeBSD.org>

next in thread | previous in thread | raw e-mail | index | archive | help
Hi,
On 9 July 2015 at 09:15, Lev Serebryakov <lev@freebsd.org> wrote:
> Does somebody succeed to setup FreeBSD for usage with Yubikey NEO
> token without Yubico authentication service, with OATH-HOTP?

I don't have the neo but it works, at least, with openssh.

See comments in this blog post:
http://sysconfig.org.uk/two-factor-authentication-with-ssh.html

And this blog post discussing neo with some password manager called pass:
https://drupalwatchdog.com/blog/2015/6/yubikey-neo-and-better-password-manager-pass



-- 
-------
inum: 883510009027723
sip: jungleboogie@sip2sip.info
xmpp: jungle-boogie@jit.si



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKE2PDvEeKEWaDOkKisXoKmwpVyDi1PRba%2BOPXdek=Oo=4Qe1Q>