Subject: Re: [harikiri@ATTRITION.ORG: S/Key & OPIE Database
To: None <>
From: RJ Atkinson <rja@inet.org>
List: tech-security
Date: 02/01/2000 08:45:52
  by redmail.netbsd.org with SMTP; 1 Feb 2000 13:44:35 -0000
          by poptart.corp.home.net (Netscape Messaging Server 3.54)
           with ESMTP id AAA719D; Tue, 1 Feb 2000 05:44:28 -0800
Message-Id: <4.2.0.58.20000201080456.0095b450@avarice.inner.net>
Date: Tue, 01 Feb 2000 08:45:52 +0000
To: 
	tech-security@netbsd.org (NetBSD Security Technical Discussion List)
From: RJ Atkinson <rja@inet.org>
Subject: Re: [harikiri@ATTRITION.ORG: S/Key & OPIE Database
  Vulnerability]
Cc: tech-security@netbsd.org
In-Reply-To: <m12Ewof-000g6HC@most.weird.com>
References: <v04220801b4b9a9cb09b5@[204.179.128.134]>
 <20000124175648.A13877@noc.untraceable.net>
 <v04220801b4b9a9cb09b5@[204.179.128.134]>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"

At 16:03 30-01-00 , Greg A. Woods wrote:

>How "easy" is it to mis-configure s/key so that a number of hosts will
>all share the same challenge/response keys for each account?   (This is
>the most common problem I've seen s/key or OPIE sites encounter.)

OPIE sites with a default configuration should not have multiple users
ending up with the same sequence number (e.g. "99") and challenge string
(e.g. "most02030") at all often.

>Is the "bug" where "skey" generates different responses on different
>architectures known and if so is it fixed in -current and 1.4.2?

Not a problem with OPIE.

Ran