keith.c.howell at gmail.com
Tue Mar 27 08:17:02 EDT 2012
I second the use of Yubikey. I have the RFID enabled version.
The downside to the two factor authentication is that you need access to
the internet for it to work since it uses an authentication server.
However, there is a "static" mode on the Yubikey.
When you run the configuration program, there are two 'slots' on the
device. The first slot (quick button press) is the default TFA that is
pre-programmed by Yubikey. The second slot requires you to hold the
button for 3 seconds. This can be set for a second TFA or you can set is
as a static password.
You can also use slot one for static mode, but you loose the YubiKey
authentication until you re-register your key with them.
If you don't trust YubiKey, you can also run your own private servers.
On 03/27/2012 08:07 AM, Alex Smith (K4RNT) wrote:
> I use LastPass in conjunction with a YubiKey for one-time passwords.
> It's a cool little USB hardware token that appears to the host as a USB
> keyboard, and when you press the button on it, it generates a random
> 40-character OTP. Really nice little gadget - I use the PAM modules
> available for the YubiKey to add two-factor authentication to my Linux
> www.yubico.com/lastpass <http://www.yubico.com/lastpass>
> On Tue, Mar 27, 2012 at 07:06, Matt Ryanczak <ryanczak at gmail.com
> <mailto:ryanczak at gmail.com>> wrote:
> On 3/26/12 10:17 PM, Soren Harward wrote:
> > I'm using SpiderOak and I really like it, particularly because
> > everything is encrypted on the remote end. On one hand, I feel
> > uncomfortable putting passwords in any file, but on the other hand, I
> > trust SpiderOak with files with personal and financial information
> > that can be used to cause a lot more damage than a bunch of
> > compromised passwords.
> I don't trust anyone with any of my data. If I don't encrypt it myself,
> with keys known only to me, I do not feel the data is safe.
More information about the Novalug