Re: Requiring multiple authentication


Use pam! You can form the authentication just the way you want. Or you
can just use password on the private key.
I use ssh-keys if available, but if that failed, it prompts me for an
one time password instead.


On Tue, Mar 4, 2008 at 4:48 PM, Jeff Simmons <jsimmons@xxxxxxxxxxxxxxx> wrote:
While doing a bit of research, I've found some historic attempts to require
multiple authentication in sshd (i.e. both public/private key and
login/password). Is there any way to get this working in the current ssh
distribution, specifically in up to date stable OpenBSD?

Thanks for any assistance, even a no, we don't do that.

Jeff Simmons jsimmons@xxxxxxxxxxxxxxx
Simmons Consulting - Network Engineering, Administration, Security
"You guys, I don't hear any noise. Are you sure you're doing it right?"
-- My Life With The Thrill Kill Kult

Relevant Pages

  • Re: public key vs passwd authentication?
    ... Thus PKI authentication = ... > password authentication. ... a password used to unlock a private key (although doesn't necessarily ... lots of identity theft references ... ...
  • Re: PKI: the end
    ... in an asymmetric cryptography key is a business process specification. ... authentication (i.e. some entity uniquely is in possession of the ... privacy and confidentiality of a private key may be technology. ... A relying party might also be told that they could assume that as part ...
  • Re: Basic question about RSA
    ... Or am I just being slow on the uptake? ... I did understand at the time, that this is *not* how digital signatures ... provide authentication". ... "It's impossible to encrypt a message using an RSA private key and so ...
  • Re: [opensuse] Results of moving ssh to a high port - Zero scriptkiddies in a 24 hour period.
    ... authentication in favor of keybased authentication. ... moving that private key from ... You can email the public key, if you wish, as it ... password protect the key. ...
  • Re: Basic question about RSA
    ... elevated at to achieve the longest range, ... method of authentication, which you stated in your orginal post, ... (Alice encrypts with her private key, ...