You can subscribe to this list here.
| 2001 |
Jan
|
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(59) |
Sep
(57) |
Oct
(5) |
Nov
(45) |
Dec
(21) |
|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2002 |
Jan
(13) |
Feb
(22) |
Mar
(14) |
Apr
(7) |
May
(33) |
Jun
(57) |
Jul
(25) |
Aug
(40) |
Sep
(53) |
Oct
(58) |
Nov
(75) |
Dec
(22) |
| 2003 |
Jan
(101) |
Feb
(101) |
Mar
(103) |
Apr
(125) |
May
(85) |
Jun
(57) |
Jul
(62) |
Aug
(42) |
Sep
(76) |
Oct
(214) |
Nov
(290) |
Dec
(274) |
| 2004 |
Jan
(187) |
Feb
(172) |
Mar
(313) |
Apr
(209) |
May
(169) |
Jun
(147) |
Jul
(118) |
Aug
(193) |
Sep
(227) |
Oct
(125) |
Nov
(246) |
Dec
(191) |
| 2005 |
Jan
(244) |
Feb
(175) |
Mar
(165) |
Apr
(130) |
May
(217) |
Jun
(122) |
Jul
(188) |
Aug
(235) |
Sep
(165) |
Oct
(133) |
Nov
(209) |
Dec
(88) |
| 2006 |
Jan
(66) |
Feb
(89) |
Mar
(108) |
Apr
(91) |
May
(29) |
Jun
(45) |
Jul
(64) |
Aug
(42) |
Sep
(44) |
Oct
(81) |
Nov
(64) |
Dec
(9) |
| 2007 |
Jan
(24) |
Feb
(122) |
Mar
(55) |
Apr
(50) |
May
(84) |
Jun
(13) |
Jul
(80) |
Aug
(70) |
Sep
(78) |
Oct
(45) |
Nov
(56) |
Dec
(42) |
| 2008 |
Jan
(65) |
Feb
(3) |
Mar
(51) |
Apr
(151) |
May
(54) |
Jun
(72) |
Jul
(73) |
Aug
(47) |
Sep
(55) |
Oct
(123) |
Nov
(16) |
Dec
(4) |
| 2009 |
Jan
(23) |
Feb
(39) |
Mar
(27) |
Apr
(36) |
May
(35) |
Jun
(51) |
Jul
(11) |
Aug
(14) |
Sep
(40) |
Oct
(67) |
Nov
(38) |
Dec
(13) |
| 2010 |
Jan
(15) |
Feb
(35) |
Mar
(40) |
Apr
(11) |
May
(26) |
Jun
(10) |
Jul
(5) |
Aug
(50) |
Sep
(86) |
Oct
(67) |
Nov
(36) |
Dec
(11) |
| 2011 |
Jan
(50) |
Feb
(6) |
Mar
(13) |
Apr
(13) |
May
(29) |
Jun
(27) |
Jul
(26) |
Aug
(27) |
Sep
(21) |
Oct
(7) |
Nov
(27) |
Dec
(4) |
| 2012 |
Jan
(11) |
Feb
(20) |
Mar
(48) |
Apr
(18) |
May
(8) |
Jun
(19) |
Jul
|
Aug
(15) |
Sep
(3) |
Oct
(4) |
Nov
(5) |
Dec
(1) |
| 2013 |
Jan
(13) |
Feb
(7) |
Mar
(4) |
Apr
(25) |
May
(2) |
Jun
(8) |
Jul
(4) |
Aug
(8) |
Sep
(7) |
Oct
|
Nov
(5) |
Dec
(10) |
| 2014 |
Jan
|
Feb
|
Mar
(6) |
Apr
(20) |
May
(5) |
Jun
|
Jul
(2) |
Aug
|
Sep
(8) |
Oct
(21) |
Nov
(4) |
Dec
(7) |
| 2015 |
Jan
(10) |
Feb
(9) |
Mar
(4) |
Apr
|
May
|
Jun
|
Jul
|
Aug
(5) |
Sep
(11) |
Oct
|
Nov
(17) |
Dec
(32) |
| 2016 |
Jan
(10) |
Feb
(15) |
Mar
(4) |
Apr
(7) |
May
(10) |
Jun
(11) |
Jul
(15) |
Aug
(26) |
Sep
(13) |
Oct
(10) |
Nov
(16) |
Dec
(6) |
| 2017 |
Jan
(9) |
Feb
(3) |
Mar
|
Apr
(2) |
May
(2) |
Jun
|
Jul
|
Aug
(3) |
Sep
(3) |
Oct
(6) |
Nov
(8) |
Dec
|
| 2018 |
Jan
(12) |
Feb
|
Mar
|
Apr
|
May
|
Jun
|
Jul
|
Aug
(4) |
Sep
|
Oct
|
Nov
|
Dec
|
|
From: Bruce S. <bw...@re...> - 2008-10-24 16:59:09
|
> If I decide to also use a token with the functionality of storing a > cert on it, I would of course choose one which is not a plain USB > flash drive. There are devices out there with all kinds of security. > Example: http://www.aladdin.com/etoken/devices/ng-otp.aspx That one is cool, and I like the fact they list Linux as a supported OS! - BS |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 16:00:50
|
Quoting Bruce Smith <bw...@re...>: > The link you send looks like a hardware device (hard to copy). > It sounds similar to RSA devices I've seen and understand. > Those make password sharing difficult (my requirement). > > There was some other talk about USB sticks. > Since they are easy to copy, I don't think those will prevent password > sharing, and don't fulfill my requirement. > > Are we on close to being on the same page yet? :-) Slowly. If I decide to also use a token with the functionality of storing a cert on it, I would of course choose one which is not a plain USB flash drive. There are devices out there with all kinds of security. Example: http://www.aladdin.com/etoken/devices/ng-otp.aspx -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 15:44:10
|
Quoting Bruce Smith <bw...@re...>: > That sounds good ... except you can't login places without cell phone > coverage (like my house). :-) I would use a device which doesn't need anything installed on the phone. It's a separate security token. Unfortunately my company locked down installing software on the blackberry, otherwise this exercise would be a lot easier for me... -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Bruce S. <bw...@re...> - 2008-10-24 15:41:35
|
The link you send looks like a hardware device (hard to copy). It sounds similar to RSA devices I've seen and understand. Those make password sharing difficult (my requirement). There was some other talk about USB sticks. Since they are easy to copy, I don't think those will prevent password sharing, and don't fulfill my requirement. Are we on close to being on the same page yet? :-) - BS >> I must be missing something. :-) > > Yes. ;-) > > You're confusing the OTP (One Time Password) I'm looking at with > storing a certificate on a USB key. > The password generator I'm looking at doesn't connect to a PC. You > register the device with your software and initialize it with a unique > key. From then on whenever you press the button on the device it will > show you a 6 digit code. This and your secret PIN are the 2 things you > need to login. > The code of course changes based upon date/time. > > -- > > Regards > Heiko Zuerker > http://www.devil-linux.org > > > ---------------------------------------------------------------- > This message was sent using IMP, the Internet Messaging Program. > > > > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's challenge > Build the coolest Linux based applications with Moblin SDK & win great prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- - BS |
|
From: Fred F. <ffr...@lo...> - 2008-10-24 15:39:47
|
Or you change the phone and stop receiving the messages (particularly when the system is not under your control). Fred Frigerio Locust USA This electronic message transmission contains information from Locust USA which may be confidential or privileged. The information is intended to be for the use of the individual or entity named above. If you are not the intended recipient, be aware that any disclosure, copying, distribution or use of the contents of this information is prohibited. If you have received this electronic transmission in error, please notify us by telephone (305-889-5410) or by reply via electronic mail immediately. -----Original Message----- From: Bruce Smith [mailto:bw...@re...] Sent: Friday, October 24, 2008 11:35 AM To: dev...@li... Subject: Re: [Devil-Linux-discuss] hard tokens That sounds good ... except you can't login places without cell phone coverage (like my house). :-) - BS > I think the system sends you an sms message with a one time key Sent > via BlackBerry from T-Mobile > > -----Original Message----- > From: "Moray McConnachie" <mmc...@ox...> > > Date: Fri, 24 Oct 2008 15:33:26 > To: <dev...@li...> > Subject: Re: [Devil-Linux-discuss] hard tokens > > > That's true, but the user would have to give someone access to their > key and their password. So you are making theft pretty tricky. I don't > know if it was truly a goal of this system to prevent a user at all > costs giving someone else access. I mean even with a traditional RSA > device a user could give someone their passcode and lend them the RSA device. > > At least one of Heiko's exemplars has the "physical" factor be > software running on a mobile phone. I don't know if it is possible in > a Java environment to lock this to a particular phone. It would be > possible in a Windows Mobile environment. > > M. > ------------------------------------- > Moray McConnachie > Head of IS +44 1865 261 600 > Oxford Analytica http://www.oxan.com > > -----Original Message----- > From: Bruce Smith [mailto:bw...@re...] > Sent: 24 October 2008 15:22 > To: dev...@li... > Subject: Re: [Devil-Linux-discuss] hard tokens > > I must be missing something. :-) > > I understand the advantages of hardware keys. > > But the USB stick approach still sounds a lot like putting an > encrypted private key on a USB stick. > > Something I have (usb stick), and something I know (password to > decrypt key). > > Maybe it's because I'm not thinking how I could use this personally. > I'm thinking in terms of a corporate wide solution. > > If I was to implement this at work, I believe I would still need a > hardware key to prevent password sharing. The hardware RSA keys > cannot be duplicated, and the number on the display is constantly changing. > That require employees to have the key in hand when logging in. It > also prevents them from making extra copies of the key and giving it > out to other people. And hence puts a stop to those people who have > the bad habit of sharing their password. > > I can't see how to accomplish the same thing with software only, on > media that can be copied. > > - BS > > >> There are two things. The USB key is part of a two factor login. >> Something you know (username and password) and something you have >> (the > >> usb key). You could duplicate the key but you need physical access, >> and you can in theory guess the value of that key but that can be as >> long as you want. Username and passwords we all know how fragile they >> are. The only other factor one can add is something you are >> (fingerprint for example). >> >> Another version of something you have which makes it harder to >> duplicate is a single key generator. If you somehow intercept the key >> on one login (Tempest? Key Logger?) it will not help you on the next >> loggin. You need to have access to the key generator. There are >> weaknesses but still stronger than password protected keychain for >> SSH > for example. >> >> There are variations and some weaken the system to avoid data loss >> through loosing the key. >> >> >> Fred Frigerio >> Locust USA >> >> This electronic message transmission contains information from Locust >> USA which may be confidential or privileged. The information is >> intended to be for the use of the individual or entity named above. >> If you are not the intended recipient, be aware that any disclosure, >> copying, distribution or use of the contents of this information is >> prohibited. If you have received this electronic transmission in >> error, please notify us by telephone (305-889-5410) or by reply via >> electronic mail immediately. >> >> -----Original Message----- >> From: Bruce Smith [mailto:bw...@re...] >> Sent: Friday, October 24, 2008 7:33 AM >> To: dev...@li... >> Subject: Re: [Devil-Linux-discuss] hard tokens >> >> I admit that I've never researched this subject, but ... >> >> Can't software tokens and USB keys easily be copied? >> Doesn't that defeat the purpose? >> >> What's the difference between a USB/software key and just putting >> your > >> private key on a USB stick? >> >> - BS >> >> >>> I found some infos, in case someone else is interested too. >>> It's all free and seems to work with software tokens, so a hardware >>> token should hopefully work too. >>> >>> http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authenticati >>> o n -using-one-time-passwords-on-your-mobile-phone/ >>> http://www.tri-dsystems.com/documentation/quickstart.html >>> http://fbq.hamal.nl/index.php/archives/8#more-8 >>> >>> -- >>> >>> Regards >>> Heiko Zuerker >>> http://www.devil-linux.org >> >> --------------------------------------------------------------------- >> - >> -- >> - >> This SF.Net email is sponsored by the Moblin Your Move Developer's >> challenge Build the coolest Linux based applications with Moblin SDK >> & > >> win great prizes Grand prize is a trip for two to an Open Source >> event > >> anywhere in the world >> http://moblin-contest.org/redirect.php?banner_id=100&url=/ >> _______________________________________________ >> Devil-linux-discuss mailing list >> Dev...@li... >> https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss >> >> --------------------------------------------------------------------- >> - >> --- This SF.Net email is sponsored by the Moblin Your Move >> Developer's > >> challenge Build the coolest Linux based applications with Moblin SDK >> & > >> win great prizes Grand prize is a trip for two to an Open Source >> event > >> anywhere in the world >> http://moblin-contest.org/redirect.php?banner_id=100&url=/ >> _______________________________________________ >> Devil-linux-discuss mailing list >> Dev...@li... >> https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss >> > > > > -- > - BS > > ---------------------------------------------------------------------- > -- > - > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > > > > ---------------------------------------------------------------------- > --- This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > ---------------------------------------------------------------------- > --- This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- - BS ------------------------------------------------------------------------ - This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss |
|
From: Bruce S. <bw...@re...> - 2008-10-24 15:34:50
|
That sounds good ... except you can't login places without cell phone coverage (like my house). :-) - BS > I think the system sends you an sms message with a one time key > Sent via BlackBerry from T-Mobile > > -----Original Message----- > From: "Moray McConnachie" <mmc...@ox...> > > Date: Fri, 24 Oct 2008 15:33:26 > To: <dev...@li...> > Subject: Re: [Devil-Linux-discuss] hard tokens > > > That's true, but the user would have to give someone access to their key > and their password. So you are making theft pretty tricky. I don't know > if it was truly a goal of this system to prevent a user at all costs > giving someone else access. I mean even with a traditional RSA device a > user could give someone their passcode and lend them the RSA device. > > At least one of Heiko's exemplars has the "physical" factor be software > running on a mobile phone. I don't know if it is possible in a Java > environment to lock this to a particular phone. It would be possible in > a Windows Mobile environment. > > M. > ------------------------------------- > Moray McConnachie > Head of IS +44 1865 261 600 > Oxford Analytica http://www.oxan.com > > -----Original Message----- > From: Bruce Smith [mailto:bw...@re...] > Sent: 24 October 2008 15:22 > To: dev...@li... > Subject: Re: [Devil-Linux-discuss] hard tokens > > I must be missing something. :-) > > I understand the advantages of hardware keys. > > But the USB stick approach still sounds a lot like putting an encrypted > private key on a USB stick. > > Something I have (usb stick), and something I know (password to decrypt > key). > > Maybe it's because I'm not thinking how I could use this personally. > I'm thinking in terms of a corporate wide solution. > > If I was to implement this at work, I believe I would still need a > hardware key to prevent password sharing. The hardware RSA keys cannot > be duplicated, and the number on the display is constantly changing. > That require employees to have the key in hand when logging in. It also > prevents them from making extra copies of the key and giving it out to > other people. And hence puts a stop to those people who have the bad > habit of sharing their password. > > I can't see how to accomplish the same thing with software only, on > media that can be copied. > > - BS > > >> There are two things. The USB key is part of a two factor login. >> Something you know (username and password) and something you have (the > >> usb key). You could duplicate the key but you need physical access, >> and you can in theory guess the value of that key but that can be as >> long as you want. Username and passwords we all know how fragile they >> are. The only other factor one can add is something you are >> (fingerprint for example). >> >> Another version of something you have which makes it harder to >> duplicate is a single key generator. If you somehow intercept the key >> on one login (Tempest? Key Logger?) it will not help you on the next >> loggin. You need to have access to the key generator. There are >> weaknesses but still stronger than password protected keychain for SSH > for example. >> >> There are variations and some weaken the system to avoid data loss >> through loosing the key. >> >> >> Fred Frigerio >> Locust USA >> >> This electronic message transmission contains information from Locust >> USA which may be confidential or privileged. The information is >> intended to be for the use of the individual or entity named above. >> If you are not the intended recipient, be aware that any disclosure, >> copying, distribution or use of the contents of this information is >> prohibited. If you have received this electronic transmission in >> error, please notify us by telephone (305-889-5410) or by reply via >> electronic mail immediately. >> >> -----Original Message----- >> From: Bruce Smith [mailto:bw...@re...] >> Sent: Friday, October 24, 2008 7:33 AM >> To: dev...@li... >> Subject: Re: [Devil-Linux-discuss] hard tokens >> >> I admit that I've never researched this subject, but ... >> >> Can't software tokens and USB keys easily be copied? >> Doesn't that defeat the purpose? >> >> What's the difference between a USB/software key and just putting your > >> private key on a USB stick? >> >> - BS >> >> >>> I found some infos, in case someone else is interested too. >>> It's all free and seems to work with software tokens, so a hardware >>> token should hopefully work too. >>> >>> http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authenticatio >>> n -using-one-time-passwords-on-your-mobile-phone/ >>> http://www.tri-dsystems.com/documentation/quickstart.html >>> http://fbq.hamal.nl/index.php/archives/8#more-8 >>> >>> -- >>> >>> Regards >>> Heiko Zuerker >>> http://www.devil-linux.org >> >> ---------------------------------------------------------------------- >> -- >> - >> This SF.Net email is sponsored by the Moblin Your Move Developer's >> challenge Build the coolest Linux based applications with Moblin SDK & > >> win great prizes Grand prize is a trip for two to an Open Source event > >> anywhere in the world >> http://moblin-contest.org/redirect.php?banner_id=100&url=/ >> _______________________________________________ >> Devil-linux-discuss mailing list >> Dev...@li... >> https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss >> >> ---------------------------------------------------------------------- >> --- This SF.Net email is sponsored by the Moblin Your Move Developer's > >> challenge Build the coolest Linux based applications with Moblin SDK & > >> win great prizes Grand prize is a trip for two to an Open Source event > >> anywhere in the world >> http://moblin-contest.org/redirect.php?banner_id=100&url=/ >> _______________________________________________ >> Devil-linux-discuss mailing list >> Dev...@li... >> https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss >> > > > > -- > - BS > > ------------------------------------------------------------------------ > - > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > > > > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's challenge > Build the coolest Linux based applications with Moblin SDK & win great prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's challenge > Build the coolest Linux based applications with Moblin SDK & win great prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- - BS |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 14:47:11
|
Quoting Bruce Smith <bw...@re...>: > I must be missing something. :-) Yes. ;-) You're confusing the OTP (One Time Password) I'm looking at with storing a certificate on a USB key. The password generator I'm looking at doesn't connect to a PC. You register the device with your software and initialize it with a unique key. From then on whenever you press the button on the device it will show you a 6 digit code. This and your secret PIN are the 2 things you need to login. The code of course changes based upon date/time. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Fred F. <ffr...@lo...> - 2008-10-24 14:35:32
|
I think the system sends you an sms message with a one time key Sent via BlackBerry from T-Mobile -----Original Message----- From: "Moray McConnachie" <mmc...@ox...> Date: Fri, 24 Oct 2008 15:33:26 To: <dev...@li...> Subject: Re: [Devil-Linux-discuss] hard tokens That's true, but the user would have to give someone access to their key and their password. So you are making theft pretty tricky. I don't know if it was truly a goal of this system to prevent a user at all costs giving someone else access. I mean even with a traditional RSA device a user could give someone their passcode and lend them the RSA device. At least one of Heiko's exemplars has the "physical" factor be software running on a mobile phone. I don't know if it is possible in a Java environment to lock this to a particular phone. It would be possible in a Windows Mobile environment. M. ------------------------------------- Moray McConnachie Head of IS +44 1865 261 600 Oxford Analytica http://www.oxan.com -----Original Message----- From: Bruce Smith [mailto:bw...@re...] Sent: 24 October 2008 15:22 To: dev...@li... Subject: Re: [Devil-Linux-discuss] hard tokens I must be missing something. :-) I understand the advantages of hardware keys. But the USB stick approach still sounds a lot like putting an encrypted private key on a USB stick. Something I have (usb stick), and something I know (password to decrypt key). Maybe it's because I'm not thinking how I could use this personally. I'm thinking in terms of a corporate wide solution. If I was to implement this at work, I believe I would still need a hardware key to prevent password sharing. The hardware RSA keys cannot be duplicated, and the number on the display is constantly changing. That require employees to have the key in hand when logging in. It also prevents them from making extra copies of the key and giving it out to other people. And hence puts a stop to those people who have the bad habit of sharing their password. I can't see how to accomplish the same thing with software only, on media that can be copied. - BS > There are two things. The USB key is part of a two factor login. > Something you know (username and password) and something you have (the > usb key). You could duplicate the key but you need physical access, > and you can in theory guess the value of that key but that can be as > long as you want. Username and passwords we all know how fragile they > are. The only other factor one can add is something you are > (fingerprint for example). > > Another version of something you have which makes it harder to > duplicate is a single key generator. If you somehow intercept the key > on one login (Tempest? Key Logger?) it will not help you on the next > loggin. You need to have access to the key generator. There are > weaknesses but still stronger than password protected keychain for SSH for example. > > There are variations and some weaken the system to avoid data loss > through loosing the key. > > > Fred Frigerio > Locust USA > > This electronic message transmission contains information from Locust > USA which may be confidential or privileged. The information is > intended to be for the use of the individual or entity named above. > If you are not the intended recipient, be aware that any disclosure, > copying, distribution or use of the contents of this information is > prohibited. If you have received this electronic transmission in > error, please notify us by telephone (305-889-5410) or by reply via > electronic mail immediately. > > -----Original Message----- > From: Bruce Smith [mailto:bw...@re...] > Sent: Friday, October 24, 2008 7:33 AM > To: dev...@li... > Subject: Re: [Devil-Linux-discuss] hard tokens > > I admit that I've never researched this subject, but ... > > Can't software tokens and USB keys easily be copied? > Doesn't that defeat the purpose? > > What's the difference between a USB/software key and just putting your > private key on a USB stick? > > - BS > > >> I found some infos, in case someone else is interested too. >> It's all free and seems to work with software tokens, so a hardware >> token should hopefully work too. >> >> http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authenticatio >> n -using-one-time-passwords-on-your-mobile-phone/ >> http://www.tri-dsystems.com/documentation/quickstart.html >> http://fbq.hamal.nl/index.php/archives/8#more-8 >> >> -- >> >> Regards >> Heiko Zuerker >> http://www.devil-linux.org > > ---------------------------------------------------------------------- > -- > - > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > > ---------------------------------------------------------------------- > --- This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- - BS ------------------------------------------------------------------------ - This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss ------------------------------------------------------------------------- This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss |
|
From: Moray M. <mmc...@ox...> - 2008-10-24 14:33:50
|
That's true, but the user would have to give someone access to their key and their password. So you are making theft pretty tricky. I don't know if it was truly a goal of this system to prevent a user at all costs giving someone else access. I mean even with a traditional RSA device a user could give someone their passcode and lend them the RSA device. At least one of Heiko's exemplars has the "physical" factor be software running on a mobile phone. I don't know if it is possible in a Java environment to lock this to a particular phone. It would be possible in a Windows Mobile environment. M. ------------------------------------- Moray McConnachie Head of IS +44 1865 261 600 Oxford Analytica http://www.oxan.com -----Original Message----- From: Bruce Smith [mailto:bw...@re...] Sent: 24 October 2008 15:22 To: dev...@li... Subject: Re: [Devil-Linux-discuss] hard tokens I must be missing something. :-) I understand the advantages of hardware keys. But the USB stick approach still sounds a lot like putting an encrypted private key on a USB stick. Something I have (usb stick), and something I know (password to decrypt key). Maybe it's because I'm not thinking how I could use this personally. I'm thinking in terms of a corporate wide solution. If I was to implement this at work, I believe I would still need a hardware key to prevent password sharing. The hardware RSA keys cannot be duplicated, and the number on the display is constantly changing. That require employees to have the key in hand when logging in. It also prevents them from making extra copies of the key and giving it out to other people. And hence puts a stop to those people who have the bad habit of sharing their password. I can't see how to accomplish the same thing with software only, on media that can be copied. - BS > There are two things. The USB key is part of a two factor login. > Something you know (username and password) and something you have (the > usb key). You could duplicate the key but you need physical access, > and you can in theory guess the value of that key but that can be as > long as you want. Username and passwords we all know how fragile they > are. The only other factor one can add is something you are > (fingerprint for example). > > Another version of something you have which makes it harder to > duplicate is a single key generator. If you somehow intercept the key > on one login (Tempest? Key Logger?) it will not help you on the next > loggin. You need to have access to the key generator. There are > weaknesses but still stronger than password protected keychain for SSH for example. > > There are variations and some weaken the system to avoid data loss > through loosing the key. > > > Fred Frigerio > Locust USA > > This electronic message transmission contains information from Locust > USA which may be confidential or privileged. The information is > intended to be for the use of the individual or entity named above. > If you are not the intended recipient, be aware that any disclosure, > copying, distribution or use of the contents of this information is > prohibited. If you have received this electronic transmission in > error, please notify us by telephone (305-889-5410) or by reply via > electronic mail immediately. > > -----Original Message----- > From: Bruce Smith [mailto:bw...@re...] > Sent: Friday, October 24, 2008 7:33 AM > To: dev...@li... > Subject: Re: [Devil-Linux-discuss] hard tokens > > I admit that I've never researched this subject, but ... > > Can't software tokens and USB keys easily be copied? > Doesn't that defeat the purpose? > > What's the difference between a USB/software key and just putting your > private key on a USB stick? > > - BS > > >> I found some infos, in case someone else is interested too. >> It's all free and seems to work with software tokens, so a hardware >> token should hopefully work too. >> >> http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authenticatio >> n -using-one-time-passwords-on-your-mobile-phone/ >> http://www.tri-dsystems.com/documentation/quickstart.html >> http://fbq.hamal.nl/index.php/archives/8#more-8 >> >> -- >> >> Regards >> Heiko Zuerker >> http://www.devil-linux.org > > ---------------------------------------------------------------------- > -- > - > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > > ---------------------------------------------------------------------- > --- This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- - BS ------------------------------------------------------------------------ - This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss |
|
From: Bruce S. <bw...@re...> - 2008-10-24 14:22:33
|
I must be missing something. :-) I understand the advantages of hardware keys. But the USB stick approach still sounds a lot like putting an encrypted private key on a USB stick. Something I have (usb stick), and something I know (password to decrypt key). Maybe it's because I'm not thinking how I could use this personally. I'm thinking in terms of a corporate wide solution. If I was to implement this at work, I believe I would still need a hardware key to prevent password sharing. The hardware RSA keys cannot be duplicated, and the number on the display is constantly changing. That require employees to have the key in hand when logging in. It also prevents them from making extra copies of the key and giving it out to other people. And hence puts a stop to those people who have the bad habit of sharing their password. I can't see how to accomplish the same thing with software only, on media that can be copied. - BS > There are two things. The USB key is part of a two factor login. > Something you know (username and password) and something you have (the > usb key). You could duplicate the key but you need physical access, and > you can in theory guess the value of that key but that can be as long as > you want. Username and passwords we all know how fragile they are. The > only other factor one can add is something you are (fingerprint for > example). > > Another version of something you have which makes it harder to duplicate > is a single key generator. If you somehow intercept the key on one login > (Tempest? Key Logger?) it will not help you on the next loggin. You need > to have access to the key generator. There are weaknesses but still > stronger than password protected keychain for SSH for example. > > There are variations and some weaken the system to avoid data loss > through loosing the key. > > > Fred Frigerio > Locust USA > > This electronic message transmission contains information from Locust > USA which may be confidential or privileged. The information is > intended to be for the use of the individual or entity named above. If > you are not the intended recipient, be aware that any disclosure, > copying, distribution or use of the contents of this information is > prohibited. If you have received this electronic transmission in error, > please notify us by telephone (305-889-5410) or by reply via electronic > mail immediately. > > -----Original Message----- > From: Bruce Smith [mailto:bw...@re...] > Sent: Friday, October 24, 2008 7:33 AM > To: dev...@li... > Subject: Re: [Devil-Linux-discuss] hard tokens > > I admit that I've never researched this subject, but ... > > Can't software tokens and USB keys easily be copied? > Doesn't that defeat the purpose? > > What's the difference between a USB/software key and just putting your > private key on a USB stick? > > - BS > > >> I found some infos, in case someone else is interested too. >> It's all free and seems to work with software tokens, so a hardware >> token should hopefully work too. >> >> http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authentication >> -using-one-time-passwords-on-your-mobile-phone/ >> http://www.tri-dsystems.com/documentation/quickstart.html >> http://fbq.hamal.nl/index.php/archives/8#more-8 >> >> -- >> >> Regards >> Heiko Zuerker >> http://www.devil-linux.org > > ------------------------------------------------------------------------ > - > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge Build the coolest Linux based applications with Moblin SDK & > win great prizes Grand prize is a trip for two to an Open Source event > anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's challenge > Build the coolest Linux based applications with Moblin SDK & win great prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- - BS |
|
From: Fred F. <ffr...@lo...> - 2008-10-24 13:54:14
|
There are two things. The USB key is part of a two factor login. Something you know (username and password) and something you have (the usb key). You could duplicate the key but you need physical access, and you can in theory guess the value of that key but that can be as long as you want. Username and passwords we all know how fragile they are. The only other factor one can add is something you are (fingerprint for example). Another version of something you have which makes it harder to duplicate is a single key generator. If you somehow intercept the key on one login (Tempest? Key Logger?) it will not help you on the next loggin. You need to have access to the key generator. There are weaknesses but still stronger than password protected keychain for SSH for example. There are variations and some weaken the system to avoid data loss through loosing the key. Fred Frigerio Locust USA This electronic message transmission contains information from Locust USA which may be confidential or privileged. The information is intended to be for the use of the individual or entity named above. If you are not the intended recipient, be aware that any disclosure, copying, distribution or use of the contents of this information is prohibited. If you have received this electronic transmission in error, please notify us by telephone (305-889-5410) or by reply via electronic mail immediately. -----Original Message----- From: Bruce Smith [mailto:bw...@re...] Sent: Friday, October 24, 2008 7:33 AM To: dev...@li... Subject: Re: [Devil-Linux-discuss] hard tokens I admit that I've never researched this subject, but ... Can't software tokens and USB keys easily be copied? Doesn't that defeat the purpose? What's the difference between a USB/software key and just putting your private key on a USB stick? - BS > I found some infos, in case someone else is interested too. > It's all free and seems to work with software tokens, so a hardware > token should hopefully work too. > > http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authentication > -using-one-time-passwords-on-your-mobile-phone/ > http://www.tri-dsystems.com/documentation/quickstart.html > http://fbq.hamal.nl/index.php/archives/8#more-8 > > -- > > Regards > Heiko Zuerker > http://www.devil-linux.org ------------------------------------------------------------------------ - This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss |
|
From: Moray M. <mmc...@ox...> - 2008-10-24 13:50:59
|
>What's the difference between a USB/software key and just putting your private key on a USB stick? Two-factor: "something you have and something you know". Sure you can steal the USB key, but how these things often work is that you enter a passcode which you know into the software or hardware, and it gives you back a one-time key. You can only get a valid one-time key if you know the passcode and if you have the device which matches that passcode. So to steal it you need to steal the password and the device from the user. One of the funniest things I've ever seen in my working life is when a user brought out his credit-card-sized OTP generator and it turned out he had written his passcode in indelible ink on the back :-> DUHH! m. ------------------------------------- Moray McConnachie Head of IS +44 1865 261 600 Oxford Analytica http://www.oxan.com -----Original Message----- From: Bruce Smith [mailto:bw...@re...] Sent: 24 October 2008 12:33 To: dev...@li... Subject: Re: [Devil-Linux-discuss] hard tokens I admit that I've never researched this subject, but ... Can't software tokens and USB keys easily be copied? Doesn't that defeat the purpose? - BS > I found some infos, in case someone else is interested too. > It's all free and seems to work with software tokens, so a hardware > token should hopefully work too. > > http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authentication > -using-one-time-passwords-on-your-mobile-phone/ > http://www.tri-dsystems.com/documentation/quickstart.html > http://fbq.hamal.nl/index.php/archives/8#more-8 > > -- > > Regards > Heiko Zuerker > http://www.devil-linux.org ------------------------------------------------------------------------ - This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 13:36:39
|
Quoting Bruce Smith <bw...@re...>: > I admit that I've never researched this subject, but ... > > Can't software tokens and USB keys easily be copied? > Doesn't that defeat the purpose? > > What's the difference between a USB/software key and just putting your > private key on a USB stick? Take a look at this device: http://www.aladdin.com/etoken/devices/pass.aspx It doesn't have a key you have to load anywhere. It calculates a number based on some encryption algorithm and the date/time. You then have to enter this number as your password. As a 2nd factor you can add a PIN number. In order to login somebody would have to have your token (the hardware device) and your PIN. Of course you have to ensure that accounts get locked out after x invalid tries, because these devices only display a 6 digit numerical code. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Bruce S. <bw...@re...> - 2008-10-24 12:40:19
|
I admit that I've never researched this subject, but ... Can't software tokens and USB keys easily be copied? Doesn't that defeat the purpose? What's the difference between a USB/software key and just putting your private key on a USB stick? - BS > I found some infos, in case someone else is interested too. > It's all free and seems to work with software tokens, so a hardware > token should hopefully work too. > > http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authentication-using-one-time-passwords-on-your-mobile-phone/ > http://www.tri-dsystems.com/documentation/quickstart.html > http://fbq.hamal.nl/index.php/archives/8#more-8 > > -- > > Regards > Heiko Zuerker > http://www.devil-linux.org |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 02:03:52
|
I found some infos, in case someone else is interested too. It's all free and seems to work with software tokens, so a hardware token should hopefully work too. http://www.oiepoie.nl/2008/05/02/free-strong-two-factor-authentication-using-one-time-passwords-on-your-mobile-phone/ http://www.tri-dsystems.com/documentation/quickstart.html http://fbq.hamal.nl/index.php/archives/8#more-8 -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 00:35:19
|
Quoting Serge Leschinsky <fi...@in...>: > Hi, > > Heiko Zuerker wrote: >> Hey, >> >> I want to start using hard tokens (OTP, keyfob) for certain tasks >> (i.e. login to firewall, secured web portal, etc.). >> >> Does anyone know a free (maybe as in GPL?) or cheap solution? Since >> it's for personal use I don't see myself spending $1000... >> >> Depending how it's implemented we could even add it to DL. >> > > http://www.opensc-project.org/ > > I worked with Alladin e-tokens (http://www.ealaddin.com/). > It works :-) Not sure about the price, it was not personal project. I was hoping not to have a cert on a USB key. Worst case scenario I'll go for that. I was hoping to use a device like this: http://www.aladdin.com/etoken/devices/pass.aspx -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Heiko Z. <he...@zu...> - 2008-10-24 00:23:31
|
Quoting Fred Frigerio <ffr...@lo...>: > I thought you could do that with a token on a USB key and some PAM > module. I really remember something like that. > http://usbauth.delta-xi.net/doku.php is probably a good start. I never > used it but almost did in my Gentoo box. I want to avoid having to plug in a USB device. My hope is to have a solution which allows me to connect from any computer to my HTTP or SSH servers, not having to worry about keyboard loggers or any crap like that. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Fred F. <ffr...@lo...> - 2008-10-23 22:26:46
|
I thought you could do that with a token on a USB key and some PAM module. I really remember something like that. http://usbauth.delta-xi.net/doku.php is probably a good start. I never used it but almost did in my Gentoo box. Fred Frigerio Locust USA This electronic message transmission contains information from Locust USA which may be confidential or privileged. The information is intended to be for the use of the individual or entity named above. If you are not the intended recipient, be aware that any disclosure, copying, distribution or use of the contents of this information is prohibited. If you have received this electronic transmission in error, please notify us by telephone (305-889-5410) or by reply via electronic mail immediately. -----Original Message----- From: Heiko Zuerker [mailto:he...@zu...] Sent: Thursday, October 23, 2008 11:46 AM To: Devil-Linux Discuss Mailinglist Subject: [Devil-Linux-discuss] hard tokens Hey, I want to start using hard tokens (OTP, keyfob) for certain tasks (i.e. login to firewall, secured web portal, etc.). Does anyone know a free (maybe as in GPL?) or cheap solution? Since it's for personal use I don't see myself spending $1000... Depending how it's implemented we could even add it to DL. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. ------------------------------------------------------------------------ - This SF.Net email is sponsored by the Moblin Your Move Developer's challenge Build the coolest Linux based applications with Moblin SDK & win great prizes Grand prize is a trip for two to an Open Source event anywhere in the world http://moblin-contest.org/redirect.php?banner_id=100&url=/ _______________________________________________ Devil-linux-discuss mailing list Dev...@li... https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss |
|
From: Serge L. <fi...@in...> - 2008-10-23 22:09:58
|
Hi, Heiko Zuerker wrote: > Hey, > > I want to start using hard tokens (OTP, keyfob) for certain tasks > (i.e. login to firewall, secured web portal, etc.). > > Does anyone know a free (maybe as in GPL?) or cheap solution? Since > it's for personal use I don't see myself spending $1000... > > Depending how it's implemented we could even add it to DL. > http://www.opensc-project.org/ I worked with Alladin e-tokens (http://www.ealaddin.com/). It works :-) Not sure about the price, it was not personal project. -- Serge |
|
From: Heiko Z. <he...@zu...> - 2008-10-23 20:46:07
|
Hey, I want to start using hard tokens (OTP, keyfob) for certain tasks (i.e. login to firewall, secured web portal, etc.). Does anyone know a free (maybe as in GPL?) or cheap solution? Since it's for personal use I don't see myself spending $1000... Depending how it's implemented we could even add it to DL. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Heiko Z. <he...@zu...> - 2008-10-23 20:11:12
|
Quoting DL mail <mai...@gm...>: > Hello, > > Because of a new hardware with S-ATA Cdrom, yesterday I tried for the first time the devil-linux-1.3.6-2008-09-10 with one of my syslog server. > > The only thing I miss for the moment is the pam library for radius: pam_radius_auth.so. > > Could you add it in the next release? > > Thanks for your great job. I took a quick look at the build system and the library should be on the CD, but it's missing for some reason. No idea why. Not sure when I'll have time to look at it. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: Heiko Z. <he...@zu...> - 2008-10-23 16:15:51
|
It's on CVS now and on the FTP Server (thanks Serge). You can download and compile it. A pre-compiled version is not yet available. Heiko Quoting warptrosse <war...@gm...>: > Hi, this new version is on some kind of svn?... can i have access to it... for test it? > > thx > > > On Tue, Oct 21, 2008 at 5:16 PM, Serge Leschinsky <fi...@in...> wrote: > Hello, > > > warptrosse wrote: > > > I'm trying to put *devil-linux* in a virtual hard-disk... using > > *install-on-usb*.... but It gives me folllowing error: > > > > ============================== > > ======================================================= > > mke2fs 1.40.8 (13-Mar-2008) > > Warning: 256-byte inodes not usable on older systems > > tune2fs 1.40.8 (13-Mar-2008) > > Setting maximal mount count to -1 > > copying files > > copying image of CD in /dev/ide/host0/bus1/target0/lun0/cd to device > > mounted on ./tmp-install2usb/disk-mnt/bootcd.iso > > /sbin/install-on-usb: line 28: 804 Bus error nice dd bd=$bs > > count=$nsectors if=$1 of=$2 > > Install failed! > > syncing and unmounting (this could take a while) > > ================================================================ > > For me it looks like you have a problem with hardware paravirtualization... "Bus > error"... > > > I'll try to change the *inodes* size to *128*... in *mke2fs* line of > > *install-on-usb* script (mke2fs -I 128 <disk>).... > > > It's already done. See lines 511-513 of install-on-usb: > > if echo $FORMAT | grep ext > /dev/null; then > local OPTION="-I 128" > fi > > > > I'm using a VM with a *4gb* virtual *hard-disk* (/dev/hda) and an ide > > *cd-rom* (/dev/hdc).... maybe the *hard-disk* must be *sata*.... > > The new version of DL (with kernel 2.6.26.6) will be availible soon. Probably it > will be better with KVM than 2.6.25.x > > -- > Serge > > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's challenge > Build the coolest Linux based applications with Moblin SDK & win great prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss -- WARPTROSSE {The knowledge of a man belongs to all the humanity} -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |
|
From: warptrosse <war...@gm...> - 2008-10-23 13:46:14
|
Hi, this new version is on some kind of svn?... can i have access to it... for test it? thx On Tue, Oct 21, 2008 at 5:16 PM, Serge Leschinsky <fi...@in...>wrote: > Hello, > > warptrosse wrote: > > > I'm trying to put *devil-linux* in a virtual hard-disk... using > > *install-on-usb*.... but It gives me folllowing error: > > > > ============================== > > ======================================================= > > mke2fs 1.40.8 (13-Mar-2008) > > Warning: 256-byte inodes not usable on older systems > > tune2fs 1.40.8 (13-Mar-2008) > > Setting maximal mount count to -1 > > copying files > > copying image of CD in /dev/ide/host0/bus1/target0/lun0/cd to device > > mounted on ./tmp-install2usb/disk-mnt/bootcd.iso > > /sbin/install-on-usb: line 28: 804 Bus error nice dd bd=$bs > > count=$nsectors if=$1 of=$2 > > Install failed! > > syncing and unmounting (this could take a while) > > ================================================================ > > For me it looks like you have a problem with hardware paravirtualization... > "Bus > error"... > > > > > I'll try to change the *inodes* size to *128*... in *mke2fs* line of > > *install-on-usb* script (mke2fs -I 128 <disk>).... > > > It's already done. See lines 511-513 of install-on-usb: > > if echo $FORMAT | grep ext > /dev/null; then > local OPTION="-I 128" > fi > > > I'm using a VM with a *4gb* virtual *hard-disk* (/dev/hda) and an ide > > *cd-rom* (/dev/hdc).... maybe the *hard-disk* must be *sata*.... > > The new version of DL (with kernel 2.6.26.6) will be availible soon. > Probably it > will be better with KVM than 2.6.25.x > > -- > Serge > > ------------------------------------------------------------------------- > This SF.Net email is sponsored by the Moblin Your Move Developer's > challenge > Build the coolest Linux based applications with Moblin SDK & win great > prizes > Grand prize is a trip for two to an Open Source event anywhere in the world > http://moblin-contest.org/redirect.php?banner_id=100&url=/ > _______________________________________________ > Devil-linux-discuss mailing list > Dev...@li... > https://lists.sourceforge.net/lists/listinfo/devil-linux-discuss > -- WARPTROSSE {The knowledge of a man belongs to all the humanity} |
|
From: DL m. <mai...@gm...> - 2008-10-23 11:12:03
|
Hello, Because of a new hardware with S-ATA Cdrom, yesterday I tried for the first time the devil-linux-1.3.6-2008-09-10 with one of my syslog server. The only thing I miss for the moment is the pam library for radius: pam_radius_auth.so. Could you add it in the next release? Thanks for your great job. |
|
From: Heiko Z. <he...@zu...> - 2008-10-22 15:52:43
|
Quoting Peter Jannesen <P.J...@vi...>: >> > I have the bad luck that the other side of one of my >> ipsec-tunnels is >> > using keep a live which result in 4 statistics log messages >> every 30 >> > seconds per tunnel.These message are generated because of the >> > '--enable-stats' option in the build script. >> > Is it posible to remove this option from then build proces? >> >> I personally don't use IPSec, so I'm not sure how useful this >> parameter is. >> Does anybody know if we need it in general or not? Any opinions? > > The stats message are switch on by adding then '--enable-stats' to the > ./configure for ipsec-tools. There is no runtime option to switch the > message off. Since nobody complained about it, I'm leaning towards turning it off as Peter requested. -- Regards Heiko Zuerker http://www.devil-linux.org ---------------------------------------------------------------- This message was sent using IMP, the Internet Messaging Program. |