oath-toolkit-help
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [OATH-Toolkit-help] Aladdin eToken OTP secret length


From: Simon Josefsson
Subject: Re: [OATH-Toolkit-help] Aladdin eToken OTP secret length
Date: Sun, 01 May 2011 10:45:38 +0200
User-agent: Gnus/5.110016 (No Gnus v0.16) Emacs/23.2 (gnu/linux)

Mitya <address@hidden> writes:

> Hi,
>
> Aladdin eToken OTP uses HOTP with 192-bit (24-byte) seed.
> Attempts to use such a seed in /etc/users.oath make PAM authentication
> fail, since secret length is hard-coded to 20 bytes
> (liboath/usersfile.c:67) and pam_sm_authenticate() returns
> OATH_TOO_SMALL_BUFFER.
>
> Please consider increasing secret length to 24 bytes. Thank you!

I have increased it to 32 bytes, and added some self tests to catch
regression in this area.  Please confirm whether the next release works
with the Aladdin eToken!

256 bits is enough for anyone. :-)

/Simon



reply via email to

[Prev in Thread] Current Thread [Next in Thread]