TCLUG Archive
[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [TCLUG:5974] Hardware Authentication





On Wed, 12 May 1999, Subba Rao wrote:

> What are the various hardware authentication technologies that are available?

I was thinking about using a lame 386 or a 030 to do a trick like that. :)

Put it on a closed ethernet behind the server and have the server pass
auth requests on to the totally-firewalled box thats only accepting auth
requests from the server box. (from privliaged ports)  Would be nice for a
high-traffic shell box. Or for a server-server solution.  Would take some
hacking though to setup.  would want to use public/private key setup
between the two boxes too.  and hide the key somewhere in the filesystem
using those tools that let you hide stuff in wav files or whatnot.
(graphics too.)  or in a partition that you directly access.. etc.. make
it a little harder than the average hacker to get to it.. and if they just
had a sniffer handy they couldn't leech anything from the connections. 

Just dont know how to keep it secure if someone even got root.  at least
if they did they couldn't add users/auths. :)

Scott Dier