Date: Fri, 05 May 2006 14:24:26 +0300 From: Alin-Adrian Anton <aanton@spintech.ro> To: freebsd-hackers@freebsd.org Cc: Cesar <listas@itm.net.br> Subject: Re: Fingerprint Authentication Message-ID: <445B35EA.5080009@spintech.ro> In-Reply-To: <445AF8AB.9080008@shapeshifter.se> References: <00fb01c66fb2$a8e157c0$0501010a@ironman> <445A5F48.60303@spintech.ro> <200605051009.49344.doconnor@gsoft.com.au> <445AF8AB.9080008@shapeshifter.se>
next in thread | previous in thread | raw e-mail | index | archive | help
Fredrik Lindberg wrote: > > The driver should work fine locally. But using it remote (via ssh etc) > is probably a no-go because verification of the fingerprint records are done by UPEKs driver at the hardware level. > > The only way as I see it (to even make it possible with UPEKs driver) > is to have a reader at both the remote machine and the client machine > and then capture a BioAPI record at the client machine and have the server verify it. But that involves transferring the record in a secure > way to the server. > Or simply have a reader on client side, which if correctly authentificated will issue public-key auth with the server, or sort of.. :) Not really BioAPI auth, but it enables the user to do remote logins by putting the finger on the reader.. -- Alin-Adrian Anton GPG keyID 0x183087BA (B129 E8F4 7B34 15A9 0785 2F7C 5823 ABA0 1830 87BA) gpg --keyserver pgp.mit.edu --recv-keys 0x183087BA "It is dangerous to be right when the government is wrong." - Voltaire
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?445B35EA.5080009>