Sponsored Content
Full Discussion: Multi-factor authentication
Operating Systems HP-UX Multi-factor authentication Post 302772052 by DGPickett on Friday 22nd of February 2013 02:37:26 PM
Old 02-22-2013
If you have the money for the tokens (I have carried many), the vendors help you get set up. I am not an SA focused guy.

Once, I proposed writing a free lightweight one where on top of the password, there was a challenge-response from a small database or flat file. You take a printout home and answer from that. Challenges get a one time use, so you need to generate a new set and print it out now and then. I guess you could put it in a file and automate it. What you have and what you know = 2 things. You might be able to set it up as a shell wrapper in passwd that demands the response before starting your shell.
 

7 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

My partition disappeared!!!! URGENT!! (newbie factor)

I just inst freeBSD boot installation and it didnt work for(probably my lack of knowledge) reasons but i now have to partitions in freeBSD and i really need them back for windows at the moment. i just cant find them. The bad thing is that i only got this bundled version of windows so i cant really... (2 Replies)
Discussion started by: riwa
2 Replies

2. AIX

chvg -t (factor size) - risk?

have machine running AIX 4.3.3ML 11. It's rootvg has about 1GB of space available and is made up of 2 9GB drives. We are going to upgrade it to AIX 5.x but wanted more disk space for the upgrade. So was going to install 2 new 18GB drives. The plan was to bring the 2 18GB drives in as hdisk# and... (2 Replies)
Discussion started by: spattson
2 Replies

3. UNIX for Dummies Questions & Answers

factor [start[stop]

Another question for you guys! This is so fun. So I am playing around with the factor operation. I read in "man factor" that you can actually print a list of primes in between a range, using the syntax factor ] However, every time I enter two values, it just returns the factored value.... (1 Reply)
Discussion started by: statichazard
1 Replies

4. Shell Programming and Scripting

How to substract selective values in multi row, multi column file (using awk or sed?)

Hi, I have a problem where I need to make this input: nameRow1a,text1a,text2a,floatValue1a,FloatValue2a,...,floatValue140a nameRow1b,text1b,text2b,floatValue1b,FloatValue2b,...,floatValue140b look like this output: nameRow1a,text1b,text2a,(floatValue1a - floatValue1b),(floatValue2a -... (4 Replies)
Discussion started by: nricardo
4 Replies

5. Shell Programming and Scripting

shell, read table and write the value for each factor to output

Hey guyz, I have a table like this: 1 A=#;B=#;C=# 2 A=#;C=#;D=#;E=#;E=# 3 B=#;B=#;B=#;D=# # are just some numbers. I want to have the output like this: * 1 2 3 A # # NA B # NA # C # # NA D NA # # E NA # NA So basically, I wanna know in each of the rows in my input (which... (9 Replies)
Discussion started by: @man
9 Replies

6. Shell Programming and Scripting

Help on writing data from 2 different files to one based on a common factor

Hello all, I have 2 text files. For example: File1.txt contains data A B C D ****NEXT**** X Y Z ****NEXT**** L M N and File2.txt contains data (13 Replies)
Discussion started by: vat1kor
13 Replies

7. Cybersecurity

Two Factor Authentication – Best for the UNIX/Linux Server Security

The UNIX/Linux server security is challenging because these servers are at a risk of getting compromised at any point of time by the attackers. In today's enterprise environment, the UNIX and Linux servers are growing popular. With their increased popularity, these servers have become the primary... (1 Reply)
Discussion started by: reve-secure
1 Replies
SKEY(3) 						   BSD Library Functions Manual 						   SKEY(3)

NAME
skey, skeychallenge, skeylookup, skeygetnext, skeyverify, skeyzero, getskeyprompt, skey_set_algorithm, skey_get_algorithm, skey_haskey, skey_keyinfo, skey_passcheck, skey_authenticate -- one-time password (OTP) library LIBRARY
S/key One-Time Password Library (libskey, -lskey) SYNOPSIS
#include <skey.h> int skeychallenge(struct skey *mp, const char *name, char *ss, size_t sslen); int skeylookup(struct skey *mp, const char *name); int skeygetnext(struct skey *mp); int skeyverify(struct skey *mp, char *response); int skeyzero(struct skey *mp, char *response); int getskeyprompt(struct skey *mp, char *name, char *prompt); const char * skey_set_algorithm(const char *new); const char * skey_get_algorithm(void); int skey_haskey(const char *username); const char * skey_keyinfo(const char *username); int skey_passcheck(const char *username, char *passwd); int skey_authenticate(const char *username); void f(char *x); int keycrunch(char *result, const char *seed, const char *passwd); void rip(char *buf); char * readpass(char *buf, int n); char * readskey(char *buf, int n); int atob8(char *out, const char *in); int btoa8(char *out, const char *in); int htoi(int c); const char * skipspace(const char *cp); void backspace(char *buf); void sevenbit(char *buf); char * btoe(char *engout, const char *c); int etob(char *out, const char *e); char * put8(char *out, const char *s); DESCRIPTION
The skey library provides routines for accessing NetBSD's one-time password (OTP) authentication system. Most S/Key operations take a pointer to a struct skey, which should be considered as an opaque identifier. FUNCTIONS
The following high-level functions are available: skeychallenge(mp, name, ss, sslen) Return a S/Key challenge for user name. If successful, the caller's skey structure mp is filled and 0 is returned. If unsuccessful (e.g. if name is unknown), -1 is returned. skeylookup(mp, name) Find an entry for user name in the one-time password database. Returns 0 if the entry is found and 1 if the entry is not found. If an error occurs accessing the database, -1 is returned. skeygetnext(mp) Get the next entry in the one-time password database. Returns 0 on success and the entry is stored in mp and 1 if no more entries are available. If an error occurs accessing the database, -1 is returned. skeyverify(mp, response) Verify response response to a S/Key challenge. Returns 0 if the verification is successful and 1 if the verification failed. If an error occurs accessing the database, -1 is returned. skeyzero(mp, response) Comment out user's entry in the S/Key database. Returns 0 on success and the database is updated, otherwise -1 is returned and the database remains unchanged. getskeyprompt(mp, name, prompt) Issue a S/Key challenge for user name. If successful, fill in the caller's skey structure mp and return 0. If unsuccessful (e.g. if name is unknown) -1 is returned. The following lower-level functions are available: skey_set_algorithm(new) Set hash algorithm type. Valid values for new are "md4", "md5" and "sha1". skey_get_algorithm(void) Get current hash type. skey_haskey(username) Returns 0 if the user username exists and 1 if the user doesn't exist. Returns -1 on file error. skey_keyinfo(username) Returns the current sequence number and seed for user username. skey_passcheck(username, passwd) Checks to see if answer is the correct one to the current challenge. skey_authenticate(username) Used when calling program will allow input of the user's response to the challenge. Returns zero on success or -1 on failure. The following miscellaneous functions are available: f(x) One-way function to take 8 bytes pointed to by x and return 8 bytes in place. keycrunch(char *result, const char *seed, const char *passwd) Crunch a key. rip(buf) Strip trailing CR/LF characters from a line of text buf. readpass(buf, n) Read in secret passwd (turns off echo). readskey(buf, n) Read in an s/key OTP (does not turn off echo). atob8(out, in) Convert 8-byte hex-ascii string in to binary array out. Returns 0 on success, -1 on error. btoa8(out, in) Convert 8-byte binary array in to hex-ascii string out. Returns 0 on success, -1 on error. htoi(int c) Convert hex digit to binary integer. skipspace(cp) Skip leading spaces from the string cp. backspace(buf) Remove backspaced over characters from the string buf. sevenbit(buf) Ensure line buf is all seven bits. btoe(engout, c) Encode 8 bytes in c as a string of English words. Returns a pointer to a static buffer in engout. etob(out, e) Convert English to binary. Returns 0 if the word is not in the database, 1 if all good words and parity is valid, -1 if badly formed input (i.e. > 4 char word) and -2 if words are valid but parity is wrong. put8(out, s) Display 8 bytes s as a series of 16-bit hex digits. FILES
/usr/lib/libskey.a static skey library /usr/lib/libskey.so dynamic skey library /usr/lib/libskey_p.a static skey library compiled for profiling SEE ALSO
skey(1), skeyaudit(1), skeyinfo(1) BUGS
The skey library functions are not re-entrant or thread-safe. The skey library defines many poorly named functions which pollute the name space. BSD
November 10, 2001 BSD
All times are GMT -4. The time now is 06:11 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy