OpenBSD Journal

PasswordAuthentication

Contributed by mk/reverse on from the how do we know it's really you dept.

yes 62.9% (554 votes)


no 37.1% (327 votes)


Total votes: 881

(Comments are closed)


Comments
  1. By Templeton Peck (62.175.42.214) on

    I use blockwords: sex, viagra, money...

  2. By Anonymous Coward (68.125.27.117) on

    Keys are nice.

  3. By Ian McWilliam (220.240.54.229) on

    Password Authentication on what?

    Comments
    1. By Michael Knudsen (217.157.199.114) on

      sshd_config(5)

      Comments
      1. By Ian McWilliam (220.240.54.229) on

        The Poll is exceptionally vague.................

        Comments
        1. By Rob Sessink (80.56.45.32) on

          meant to be

          Comments
          1. By Mike (207.65.179.13) on

            > meant to be

            Missing poll answer option -
            ( x ) Maybe

      2. By Ian McWilliam (220.240.54.229) on

        The Poll is exceptionally vague.................

        Comments
        1. By Anonymous Coward (218.138.164.87) on

          Its not vague at all, clearly you are a newbie to ssh.

  4. By Darren Tucker (203.206.247.88) on

    (x) Depends on where the connection is from.

  5. By ivlad (212.233.69.35) on

    Do one-time passwords count as well? ;)

    Comments
    1. By Michael Knudsen (217.157.199.114) on

      I think that would be `ChallengeResponseAuthentication'.

  6. By Paladdin (80.58.46.107) on

    As far as I need mobility and capability to access computers on a bunch of systems and platforms, I find passwords quite useful... And it doesn't take such an effort learn a strong pass :) Just make sure you don't stick it on the computer screen :D

    Comments
    1. By Gabriel (200.221.124.40) on

      ONE strong pass is like writting it along the username!

      Comments
      1. By Paladdin (80.58.46.107) on

        Why? I don't think so. Sure, having the same pass in your .htaccess file and your ssh account could be a bad idea: if you have more admin accounts, others could see your password, but I usually don't have to face this kind of problems.

        And I think it's better to have one strong pass than write down ten passphrases on a paper...

        If I get mad about security, then I use certificates but... as said, and by the moment, passwords are right for me.

        Of course, this could change in the future! :)

        Comments
        1. By Paladdin (80.58.46.107) on

          Well... Did I mentioned earlier that my SimbianOS PuTTY port doesn't support anything but passwords? :)

          So, I can't live without PasswordAuthentication

          By the way, to all those funny BOFHs... It's really an amazing experience adding PF filters with your mobile phone (Nokias 60xx, SonyEricsson P800-900) while walking around, breathing fresh air. Try it!

          :D

  7. By James (151.203.103.8) on For undeadly??

    Maybe they mean for undeadly. I don't think password auth is necessary as identification isn't necessary, only the information or ideas one shares.

    Comments
    1. By Michael Knudsen (217.157.199.114) on

      It is a poll trying to show how many have disabled PasswordAuthentication in sshd.

      Comments
      1. By Michael Knudsen (217.157.199.114) on

        .. therefore the sshd_config(5) capitalisation.

  8. By cruel (195.39.211.10) on

    is it OpenBSD journal or ClosedBSD journal? if you say "let it be open", be open...

  9. By Sean Brown (204.209.209.129) on

    Only until kerberos is set up. BTW, does OpenSSH support LDAP for authorization? For that matter, does OpenBSD support LDAP at all?

    Comments
    1. By Anonymous Coward (24.102.88.31) on

      $ cd /usr/ports
      $ make search key=ldap | less

      Comments
      1. By Sean Brown (68.147.170.205) on

        Yes ok that was a broad question and that was stupid of me. I know that its in ports but what I meant was does OpenBSD support LDAP Authentication, for instance using LDAP in place of NIS. Linux and Solaris use PAM, but as far as I know that would require rebuilding everything to support PAM. I'm sort of just talking to myself, I won't be looking into doing this for a few weeks.

        Comments
        1. By benz (62.212.101.66) on http://wiki.mirbsd.de/BennySiegert

          No, you need not use PAM (and you don't want to). OpenBSD uses BSD auth, so you need sysutils/login_ldap from ports. However, every user needs an entry in the passwd file because OpenBSD does not support nsswitch.

          --Benny.

          Comments
          1. By Sean Brown (204.209.209.129) on

            Thank you.

          2. By Michael Knudsen (217.157.199.114) on

            There was a patch on tech@ a few days ago you might want to check out if you need this.

            Comments
            1. By Sean Brown (204.209.209.129) on

              I couldn't find anything in a quick search of the archives, could you be more specific? Also anyone have details as to why PAM is such a bad idea, I'm really just getting into setting this up for myself.

              Comments
              1. By Michael Knudsen (217.157.199.114) on

                It's right here.

                Comments
                1. By Sean Brown (204.209.209.129) on

                  Thank you. I couldnt find it because I didn't search for nsswich, but for LDAP. Silly me.

          3. By mirabile (213.196.251.237) on http://mirbsd.de/

            And, as we all know, PAM and nsswitch just introduce
            additional bloat, code paths and bugs. That's why it's
            good that OpenBSD does not implement nsswitch.

            (There is a kludge for YP/NIS+ though.)

  10. By mirabile (213.196.251.237) on http://mirbsd.de/

    Sure, keys are nice, and I'm actively advocacting them.

    But they don't help with:
    * IMAP4 (over SSL) - I'm using ldap for these now
    * logins from "gimme a shell quick" boxen
    * logins from at work
    * lusers too stupid for PuTTYgen
    * me being too lazy or paranoid to wear S/Key passwords with me

    That's why I've got it set to yes, but I'm actually
    using my key like 70-75% of the time (95% if you count
    multiplexed sessions separate instead of as one).

    PS: Did I tell already just HOW much ssh multiplexing rocks?

  11. By Anonymous Coward (194.146.123.33) on

    no passwords suck...

    i use biometric foreskin scan (bfs[tm])

    Comments
    1. By Anonymous Coward (81.168.23.162) on

      how do you get the scanner up to your head?

Credits

Copyright © - Daniel Hartmeier. All rights reserved. Articles and comments are copyright their respective authors, submission implies license to publish on this web site. Contents of the archive prior to as well as images and HTML templates were copied from the fabulous original deadly.org with Jose's and Jim's kind permission. This journal runs as CGI with httpd(8) on OpenBSD, the source code is BSD licensed. undeadly \Un*dead"ly\, a. Not subject to death; immortal. [Obs.]