From: “Alan (Gesture Man) Wexelblat” <wex@media.mit.edu>
To: hfinney@shell.portal.com
Message Hash: e6d36d62d452e3e4c8496a784585d7b54860f91cde489dcf9aca0b2a34fc52c2
Message ID: <9311181717.AA22357@media.mit.edu>
Reply To: <9311181655.AA08484@jobe.shell.portal.com>
UTC Datetime: 1993-11-18 17:21:29 UTC
Raw Date: Thu, 18 Nov 93 09:21:29 PST
From: "Alan (Gesture Man) Wexelblat" <wex@media.mit.edu>
Date: Thu, 18 Nov 93 09:21:29 PST
To: hfinney@shell.portal.com
Subject: hohocon
In-Reply-To: <9311181655.AA08484@jobe.shell.portal.com>
Message-ID: <9311181717.AA22357@media.mit.edu>
MIME-Version: 1.0
Content-Type: text/plain
It seems to me that a simpler solution than challenge-response would be to
emultate the tear-sheet crypto systems and just have a series of one-shot
passwords generated. Each time you log in, it requires the next password
from the sheet, so capturing the old one does no good (just as breaking the
one-time codes from tear sheets doesn't help).
Now if I could just figure out a simple way to do this on UNIX...
--Alan
Return to November 1993
Return to “sommerfeld@orchard.medford.ma.us (Bill Sommerfeld)”