Security

‹ show all tags | rss feed ›

Set up 2FA app for PayPal

tl;dr: the option to add TOTP security keys on PayPal is somewhat hidden, it uses Verisign Identity Protection provisioning

It is becoming common knowledge that you should use two-factor authentication whenever possible. Some services allow the use of TOTP apps on your smartphone, some only want so send you SMS codes .. and others use proprietary tokens.

read on »

Truncated IPMI Passwords

tl;dr: webui truncates new passwords to 19 chars

I used KeePassX to generate a new, 24 character password with all character types enabled. This was supposed to replace the default ADMIN/ADMIN combination for IPMI on my ESXi box. So I opened the appropriate page through a browser, navigated to Configuration > Users and modified the ADMIN user. It happily accepted the new password with no warning whatsoever and I logged out to test it .. oh well .. it didn’t work. read on »

OpenSSH + OATH-TOTP

I dug a little further after my last post and stumbled upon this excellent blog post. It turns out that using the libpam-oath module for two-factor authentication is a lot easier than the challenge-response module and it works rather fabulously. I will document the steps I took here. Again, all credit goes to the author of that blog post above - I mainly followed his explanations and links. What we are going to do We want to enable two-factor authentication when logging in via ssh. read on »

OpenSSH + YubiKey HMAC-SHA1 challenge-response

_First off: this does not work as I wanted it to work .. it has some interesting implications though._ The idea I am using a YubiKey NEO for various things. It holds my PGP keys in its secure element and has the YubiKey slots configured to use HMAC-SHA1 challenge response and static password. You can for example unlock your KeePass(X) database using OATH-HOTP or the challenge-response mechanism. The idea was to use the PAM module in its challenge-response mode for authentication during SSH logins. read on »