FreeBSD + Yubikey NEO in OATH-HOTP mode?
Robert Simmons
rsimmons0 at gmail.com
Fri Jul 10 00:40:30 UTC 2015
I use security/duo with Yubikeys configured as the token all over the
place. It works flawlessly with sudo, su, openssh-portable, and the OS
openssh.
https://svnweb.freebsd.org/ports/head/security/duo/
On Thu, Jul 9, 2015 at 12:15 PM, Lev Serebryakov <lev at freebsd.org> wrote:
> -----BEGIN PGP SIGNED MESSAGE-----
> Hash: SHA512
>
>
> Does somebody succeed to setup FreeBSD for usage with Yubikey NEO
> token without Yubico authentication service, with OATH-HOTP?
>
> - --
> // Lev Serebryakov
> -----BEGIN PGP SIGNATURE-----
> Version: GnuPG v2.0.22 (MingW32)
>
> iQJ8BAEBCgBmBQJVnp4+XxSAAAAAAC4AKGlzc3Vlci1mcHJAbm90YXRpb25zLm9w
> ZW5wZ3AuZmlmdGhob3JzZW1hbi5uZXRGOTZEMUNBMEI1RjQzMThCNjc0QjMzMEFF
> QUIwM0M1OEJGREM0NzhGAAoJEOqwPFi/3EeP9kQP/RdOqWCRxEQFVUCH/PrbHaEt
> dgFGk4Y50jG2HzGXodKtdVXJ6+YIry24v/w23Ba9Z3MqOuOOX8FCfF0dTATCDGVP
> La+HCai+ggT+KcZl3phUu6nuG6ucI4rPmSvwotQjqSdFYoGrwp2GqaL6PMwtpD3L
> CETZnJrCH2+vl5FFeMdb0C6NwzwSFWQNvBiKfmi7Hnc3a+EA5i2KEQE1zIQHqX+N
> 7aw7ncn2BUOvPpgCvqFFqmuvM9y21pJu6yLuLtLaqU2s2D5+UX8OnTTTObwadnd0
> LndlK0TKCDwHFiqBnbZIWrwQNLVKw7q4MXQFA3EbhforYtgvX/XpkqtSl1yzuohY
> dAkaUXND+Na1dz0MrJqqdnD9lPjJg9JkMbtZCTxVTHZK1x4KnSi4cK4J2i3kgepx
> OxtNR6T6kfeNrwF4Tph8GoM3Q/Vn9w5XMNj1ZjTQyMHCui7ip6h99UzHT+cUNG/i
> Ke69TqpJ1k1GXTJVORgAbynwaciEXCTfzul0BCOWufO/kwp5Z5QcPf6QaNnr51XS
> iE7N0Y7gQr+ZkdqaN+VbN2PaGi9wb4yTGDD281SKH93JgxejzAOGZG80H5izLDtu
> 7OsJvDHG3WNTL5UE6LEY4dCQpiTbddvgsoqwGZtdApGqp+N5hBlDF/k6vq1J+nHA
> fo2DXanU3Lr74XgVAFOJ
> =mC8W
> -----END PGP SIGNATURE-----
> _______________________________________________
> freebsd-security at freebsd.org mailing list
> http://lists.freebsd.org/mailman/listinfo/freebsd-security
> To unsubscribe, send any mail to "freebsd-security-unsubscribe at freebsd.org
> "
>
More information about the freebsd-security
mailing list