Date: Thu, 9 Jul 2015 09:47:15 -0700 From: jungle Boogie <jungleboogie0@gmail.com> To: lev@freebsd.org Cc: "freebsd-security@freebsd.org" <freebsd-security@freebsd.org> Subject: Re: FreeBSD + Yubikey NEO in OATH-HOTP mode? Message-ID: <CAKE2PDvEeKEWaDOkKisXoKmwpVyDi1PRba%2BOPXdek=Oo=4Qe1Q@mail.gmail.com> In-Reply-To: <559E9E3E.7050709@FreeBSD.org> References: <559E9E3E.7050709@FreeBSD.org>
next in thread | previous in thread | raw e-mail | index | archive | help
Hi, On 9 July 2015 at 09:15, Lev Serebryakov <lev@freebsd.org> wrote: > Does somebody succeed to setup FreeBSD for usage with Yubikey NEO > token without Yubico authentication service, with OATH-HOTP? I don't have the neo but it works, at least, with openssh. See comments in this blog post: http://sysconfig.org.uk/two-factor-authentication-with-ssh.html And this blog post discussing neo with some password manager called pass: https://drupalwatchdog.com/blog/2015/6/yubikey-neo-and-better-password-manager-pass -- ------- inum: 883510009027723 sip: jungleboogie@sip2sip.info xmpp: jungle-boogie@jit.si
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?CAKE2PDvEeKEWaDOkKisXoKmwpVyDi1PRba%2BOPXdek=Oo=4Qe1Q>