OTP, deployability.

Ken Hornstein kenh at cmf.nrl.navy.mil
Fri Jun 17 14:14:39 EDT 2011


>Providing a list of the valid OTPs to an external client would never be
>implemented by any vendor.

You are incorrect.  I worked with one OTP vendor who did exactly that,
and we deployed that solution with Kerberos (and we're not the only ones).

Now, I will agree that a large company like RSA is never going to
do that, because they don't have to; they have enough clients that
the people who want to use SecurID with Kerberos is a tiny part of
their customer base.  But the competitors to SecurID may be more
open to anything that can give them some advantage over RSA; it's not
a guarantee, but it is a possibility.

>Exposing valid future OTPs to a remote party is very dangerous.
>How you are going to protect it?
>With what? Password, cert? Static key?
>This can be confined to a specific use case (potentially) but it is too
>costly and too risky to implement such interface.

Meh.  This is a solvable problem; pick a solution that meets your security
requirements.  For example, a static key would certainly be sufficient,
or you could co-locate your OTP server with your Kerberos server.  When
I hear "it's too hard", to me that really means, "We don't want to bother".

--Ken



More information about the krbdev mailing list