Date: Tue, 4 Jun 1996 09:26:09 +0930 (CST) From: Michael Smith <msmith@atrad.adelaide.edu.au> To: ewb@zns.net (Will Brown) Cc: angio@aros.net, karpen@sea.campus.luth.se, freebsd-security@freebsd.org Subject: Re: MD5 Crack codeu$ Message-ID: <199606032356.JAA02746@genesis.atrad.adelaide.edu.au> In-Reply-To: <199606032245.SAA02583@selway.i.com> from "Will Brown" at Jun 3, 96 06:45:36 pm
next in thread | previous in thread | raw e-mail | index | archive | help
Will Brown stands accused of saying: > > I thought the Security Dynamics card had only an LCD display and no > keyboard. It generates a new password every minute. That plus a PIN > are used to gain access. So you have to HAVE the card and KNOW the PIN > - two factors. Exactly how it stays in time-sync with servers I don't > know. Maybe there is more to it... (speak up folks). Yes The way the local security freak described it to me the server will accept results that are either one early or one late, and uses the bias on these to calculate the drift in the clock on each card & thus keep in sync. There's certainly no keypad in any of what he described. > Will Brown ewb@zns.net Professional Web Design -- ]] Mike Smith, Software Engineer msmith@atrad.adelaide.edu.au [[ ]] Genesis Software genesis@atrad.adelaide.edu.au [[ ]] High-speed data acquisition and (GSM mobile) 0411-222-496 [[ ]] realtime instrument control (ph/fax) +61-8-267-3039 [[ ]] Collector of old Unix hardware. "Where are your PEZ?" The Tick [[
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199606032356.JAA02746>