-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 Does somebody succeed to setup FreeBSD for usage with Yubikey NEO token without Yubico authentication service, with OATH-HOTP? - -- // Lev Serebryakov -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (MingW32) iQJ8BAEBCgBmBQJVnp4+XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRGOTZEMUNBMEI1RjQzMThCNjc0QjMzMEFF QUIwM0M1OEJGREM0NzhGAAoJEOqwPFi/3EeP9kQP/RdOqWCRxEQFVUCH/PrbHaEt dgFGk4Y50jG2HzGXodKtdVXJ6+YIry24v/w23Ba9Z3MqOuOOX8FCfF0dTATCDGVP La+HCai+ggT+KcZl3phUu6nuG6ucI4rPmSvwotQjqSdFYoGrwp2GqaL6PMwtpD3L CETZnJrCH2+vl5FFeMdb0C6NwzwSFWQNvBiKfmi7Hnc3a+EA5i2KEQE1zIQHqX+N 7aw7ncn2BUOvPpgCvqFFqmuvM9y21pJu6yLuLtLaqU2s2D5+UX8OnTTTObwadnd0 LndlK0TKCDwHFiqBnbZIWrwQNLVKw7q4MXQFA3EbhforYtgvX/XpkqtSl1yzuohY dAkaUXND+Na1dz0MrJqqdnD9lPjJg9JkMbtZCTxVTHZK1x4KnSi4cK4J2i3kgepx OxtNR6T6kfeNrwF4Tph8GoM3Q/Vn9w5XMNj1ZjTQyMHCui7ip6h99UzHT+cUNG/i Ke69TqpJ1k1GXTJVORgAbynwaciEXCTfzul0BCOWufO/kwp5Z5QcPf6QaNnr51XS iE7N0Y7gQr+ZkdqaN+VbN2PaGi9wb4yTGDD281SKH93JgxejzAOGZG80H5izLDtu 7OsJvDHG3WNTL5UE6LEY4dCQpiTbddvgsoqwGZtdApGqp+N5hBlDF/k6vq1J+nHA fo2DXanU3Lr74XgVAFOJ =mC8W -----END PGP SIGNATURE-----
On Thu, Jul 9, 2015, at 11:15, Lev Serebryakov wrote:> > Does somebody succeed to setup FreeBSD for usage with Yubikey NEO > token without Yubico authentication service, with OATH-HOTP? >What have you tried so far? I don't do the offline auth, but this seems to be documented well in ykpamcfg(1)
Hi, On 9 July 2015 at 09:15, Lev Serebryakov <lev at freebsd.org> wrote:> Does somebody succeed to setup FreeBSD for usage with Yubikey NEO > token without Yubico authentication service, with OATH-HOTP?I don't have the neo but it works, at least, with openssh. See comments in this blog post: http://sysconfig.org.uk/two-factor-authentication-with-ssh.html And this blog post discussing neo with some password manager called pass: https://drupalwatchdog.com/blog/2015/6/yubikey-neo-and-better-password-manager-pass -- ------- inum: 883510009027723 sip: jungleboogie at sip2sip.info xmpp: jungle-boogie at jit.si
I use security/duo with Yubikeys configured as the token all over the place. It works flawlessly with sudo, su, openssh-portable, and the OS openssh. https://svnweb.freebsd.org/ports/head/security/duo/ On Thu, Jul 9, 2015 at 12:15 PM, Lev Serebryakov <lev at freebsd.org> wrote:> -----BEGIN PGP SIGNED MESSAGE----- > Hash: SHA512 > > > Does somebody succeed to setup FreeBSD for usage with Yubikey NEO > token without Yubico authentication service, with OATH-HOTP? > > - -- > // Lev Serebryakov > -----BEGIN PGP SIGNATURE----- > Version: GnuPG v2.0.22 (MingW32) > > iQJ8BAEBCgBmBQJVnp4+XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w > ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRGOTZEMUNBMEI1RjQzMThCNjc0QjMzMEFF > QUIwM0M1OEJGREM0NzhGAAoJEOqwPFi/3EeP9kQP/RdOqWCRxEQFVUCH/PrbHaEt > dgFGk4Y50jG2HzGXodKtdVXJ6+YIry24v/w23Ba9Z3MqOuOOX8FCfF0dTATCDGVP > La+HCai+ggT+KcZl3phUu6nuG6ucI4rPmSvwotQjqSdFYoGrwp2GqaL6PMwtpD3L > CETZnJrCH2+vl5FFeMdb0C6NwzwSFWQNvBiKfmi7Hnc3a+EA5i2KEQE1zIQHqX+N > 7aw7ncn2BUOvPpgCvqFFqmuvM9y21pJu6yLuLtLaqU2s2D5+UX8OnTTTObwadnd0 > LndlK0TKCDwHFiqBnbZIWrwQNLVKw7q4MXQFA3EbhforYtgvX/XpkqtSl1yzuohY > dAkaUXND+Na1dz0MrJqqdnD9lPjJg9JkMbtZCTxVTHZK1x4KnSi4cK4J2i3kgepx > OxtNR6T6kfeNrwF4Tph8GoM3Q/Vn9w5XMNj1ZjTQyMHCui7ip6h99UzHT+cUNG/i > Ke69TqpJ1k1GXTJVORgAbynwaciEXCTfzul0BCOWufO/kwp5Z5QcPf6QaNnr51XS > iE7N0Y7gQr+ZkdqaN+VbN2PaGi9wb4yTGDD281SKH93JgxejzAOGZG80H5izLDtu > 7OsJvDHG3WNTL5UE6LEY4dCQpiTbddvgsoqwGZtdApGqp+N5hBlDF/k6vq1J+nHA > fo2DXanU3Lr74XgVAFOJ > =mC8W > -----END PGP SIGNATURE----- > _______________________________________________ > freebsd-security at freebsd.org mailing list > http://lists.freebsd.org/mailman/listinfo/freebsd-security > To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org > " >