smart card authentication with Linux?

Paul Lussier p.lussier at comcast.net
Mon Nov 14 15:35:01 EST 2005


Ben Scott <dragonhawk at gmail.com> writes:

>   So let me get this straight.  You want an authentication mechanism
> which does not require central coordination, but allows rejection of
> compromised keys.  How are the auth clients going to determine when a
> key is compromised, then?  Use the Force or something?  :) 

Generate them based on a sequence number similar to S/Key.

>   It seems to me that the "hardware-based" part of this is just an
> attempt to reduce the likelihood of a key being compromised.  You're
> assuming that the hardware key will be more likely to be turned in,
> and more likely to be resistant to duplication.  Sure, you're probably
> right on both counts, but "more likely" is not the same as "absolutely
> assured".  Ultimately, you still have to solve the compromised key
> problem.

Correct.

>   Is there a reason the auth clients can't automatically download a
> signed CKL from the 'net?

Yes, many of the systems we need to access are not allowed to make
connections to the internet.  We need to ssh into a "secure" bastion
host between the internet and the company's intranet.  From there we
can ssh into the system we need to service.
-- 

Seeya,
Paul



More information about the gnhlug-discuss mailing list