Forgot your password?
typodupeerror
Security Linux

Linux Kernel Git Repositories Add 2-Factor Authentication 49

Posted by samzenpus
from the locking-things-down dept.
LibbyMC writes For a few years now Linux kernel developers have followed a fairly strict authentication policy for those who commit directly to the git repositories housing the Linux kernel. Each is issued their own ssh private key, which then becomes the sole way for them to push code changes to the git repositories hosted at kernel.org. While using ssh keys is much more secure than just passwords, there are still a number of ways for ssh private keys to fall into malicious hands. So they've further tightened access requirements with two-factor authentication using yubikeys.
This discussion has been archived. No new comments can be posted.

Linux Kernel Git Repositories Add 2-Factor Authentication

Comments Filter:
  • by jcochran (309950) on Monday August 18, 2014 @04:06PM (#47698413)

    Well, you could have answered your own question by simply using google to look up Yubikey and reading a bit. But to give you a partial answer, the token generates an AES encrypted value and passes that value to the server for authentication. During authentication, the server decrypts the value. (the shared secret between the token and the server is the AES encryption key). The decrypted value includes a counter. And if the counter isn't greater than the previously used counter, the authentication attempt is invalid. So if you were to hit the button 100 times and record those codes, you could authenticate using any of those codes, but as soon as I hit the button and authenticated using the resulting code, all of the codes you recorded would become instantly invalid.

Thufir's a Harkonnen now.

Working...