Re: RSA SecureID on Solaris

From: Norman Girard (
Date: 04/08/02

From: Norman Girard <>
To: adam morley <>
Date: 08 Apr 2002 14:20:18 +0200

Hi Adam,

On Sat, 2002-04-06 at 20:46, adam morley wrote:
> Is anyone using these to authenticate users on Solaris? Can they be easily integrated into dtlogin, apache, etc.? Perhaps with pam in some way?
There's many RSA agent to authenticate users. You can connect to in order to retreive some of them.
Patrick Asty ( has developped a
module for apache available at :
> Has anyone looked into how "secure" they are? Can one guess the number on the display, perhaps based on the serial on the back?
There's no relation between the seed and the serial number.
The synchronisation between the RSA ACE Server and the token is made by
an algoritm which takes two parameters in : a seed (64 bits) and the
current time (UCT).
Your tokens are provided with a floppy disk which contains an encrypted
flat file (.asc) you need to import to your ACE Server. The file
contains, for each token, the serial number (you can find on the back of
the token), the seed and few others parameters about the token (6 or 8
digits / 30 s, 1 min or 2 min / etc.).
The algorithm has been broken in December 2000 but you need to have the
seed in order to generate tokencodes. You can find more information
about this algorithm in :

> For those of you who do run them, have you replaced the password with the securid random + pin number? Or done something else?
In fact it depends of the agent and the type of the token.

About token types, there's two kinds of token :
- Standard Credit Card (SD200) and keyfob (SD600) where Tokencode is
provided by the token and Passcode = Pincode + Tokencode
- SecurID PINPAD (SD520) and Software SecurID where Pincode is given to
the Token in order to generate Passcode

For the type of agents, some of them use securID authentication to
replace the standard authentication method (mainly Web Agents). The
others use first the standard authentication before using the securID
authentication (NetBIOS Shares, Windows login with MSGina, telnetd,


> thanks,
> adam

Norman Girard
Pre-Sales Engineer South of Europe
Qualys Technologies
10, rue Pergolese
75016 Paris
Tel : +33 (0) 1 44 17 00 60
Fax : +33 (0) 1 44 17 00 63
Mob : +33 (0) 6 20 60 92 20

Make Your Network Secure

Relevant Pages

  • Re: about SecuriID on mobile devices
    ... tokens were tamper-resistant). ... Did I miss something or does it make the authentication a one factor ... Security pros have been debating the relative security of physical ... device has, physical or virtual, for the SecurID secret it holds, the ...
  • Re: M$ feature
    ... 128-bit AES-based SecurID, which is even resistant to DPA attacks. ... issued OTP tokens to their staff and customers are now replacing those ... authentication ceremony, even in the presence of malware. ...
  • Re: WSE 2.0 Custom Authentication
    ... you may want to look at the Security Context Token (SCT) that is ... ;)) that relates to WS-SecureConversation. ... Symmetric Key Tokens are used ... > My user authentication method is as follows: ...
  • Re: electronic-ID and key-generation
    ... basically electronic-ID is authentication. ... chips supposedly are used in tokens to allow verification of the token ... for instance, x9.84 standard for biometrics ...
  • Re: Architecture Advice
    ... Kerberos only works if your client application and your service are in the ... WS-Federation with SAML has the following benefits over Kerberos: ... Could you point out the benefits of sts over Kerberos authentication in ... the architecture for an application that uses SAML tokens ...