Tuesday, 2012-12-18

*** nowen (~nowen@50-194-249-125-static.hfc.comcastbusiness.net) has joined #wikid13:49
*** nowen has quit (Quit: Leaving.)17:46
*** nowen (~nowen@50-194-249-125-static.hfc.comcastbusiness.net) has joined #wikid19:54
*** AndChat583569 (~AndChat58@2600:1006:b015:e14e::103) has joined #wikid22:02
nowenhi22:02
AndChat583569hey22:02
AndChat583569Quick question about Wikid22:02
AndChat583569If you use the software token... is that really two factor? It seems like that would actually just be another password. If my password is compromised, the attacker would just need to know my pin to log in. It's not exactly "something I have" at that point.22:04
nowenthe second factor is possession of the private key embedded in the software token.22:04
AndChat583569But that can be accessed with the pin, correct?22:05
nowenyou can argue that it more easily stolen but I would counter that using public-private keys on the devices is better crypto than shared secret22:05
nowenbecause who has the secret?22:05
AndChat583569true22:06
nowenAndChat583569: the private key can be accessed with the passphrase22:06
nowenthe PIN is verified on the server22:06
nowenwhat are you trying to lock down? ipsec vpn? ssl-vpn?22:07
AndChat583569ssh between hosts22:07
nowenwell, I think security is all about trade-offs. what other tools could you afford if you went with WiKID?22:09
AndChat583569Basically using a PAM and a 2 factor authenticator22:09
nowenhave you thought about setting up a 'jump box' with 2FA and then use keys from there?22:09
AndChat583569I did.22:09
nowenyou can also use 2FA for sudo22:09
nowenyou can also require smartphone tokens if that makes  you feel better22:10
AndChat583569There is a software 2factor client that can run from the command line yes?22:10
nowenyes, you can run the java client from the command line and there's a python version too22:10
AndChat583569Yeah, the smartphone solution would fit something I have, but not everyone in my group has a smartphone :)22:11
nowenhttp://code.google.com/p/pywikid/22:11
nowenlol22:11
nowendo the sysadmins without smart phones carry pagers?22:13
nowen;-)22:13
AndChat583569Just to make sure we're on the same page, if I used the software client, it would be conceptually the same as if I had a PAM that prompted for another password? Because using the software client would fit the "something I know" factor (the PIN)?22:13
nowenyes - you need the PIN and the private key embedded in the token client.22:14
nowenis this for PCI?22:14
AndChat583569no22:14
nowenok22:14
nowenwe also did an update to pam radius that prompted for a password too.22:15
nowenbut I think that's overkill22:15
AndChat583569Yeah probably22:16
AndChat583569Okay, thanks nowen! I think you answered my question pretty well.22:16
nowenyou still need to validate the account separtely22:16
nowennp22:16
nowenlet me know what you need22:16
*** AndChat583569 has quit (Quit: Bye)22:17
*** nowen has quit (Quit: Leaving.)23:10

Generated by irclog2html.py 2.11.0 by Marius Gedminas - find it at mg.pov.lt!