mirror of
https://github.com/evgeny-gridasov/openvpn-otp.git
synced 2026-04-25 21:35:54 +03:00
[GH-ISSUE #2] Client compatibility #3
Labels
No labels
pull-request
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/openvpn-otp#3
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @1337sup3rh4x0r on GitHub (May 23, 2015).
Original GitHub issue: https://github.com/evgeny-gridasov/openvpn-otp/issues/2
This looks really interesting!
Before I upgrade my server though, I would like to know:
Does each client have to support this login method specifically or is it delivered through a generic password prompt?
I access my server via the openvpn android app a lot so this would need to be compatible for me.
Thanks for clarifing!
@evgeny-gridasov commented on GitHub (May 24, 2015):
You need to make sure that reneg_sec is set to 0 on your client. Other than that everything else should just work. You'll get a generic password prompt on the client.
When asked, provide your username and a password. Your password is a concatenation of the PIN and current OTP token, for a PIN=1234 and token=777888 you should enter 1234777888
@1337sup3rh4x0r commented on GitHub (May 24, 2015):
due to the rather weak 4 digit pin, is this combination not weaker than a strong password on its own?
@evgeny-gridasov commented on GitHub (Jun 24, 2015):
I am not a crypto expert but this combination is very common in many enterprise production environments.
@jayeye commented on GitHub (Sep 10, 2015):
Given that people usually tape the PIN on the fob itself, it indeed does not increase security. The usual reason for having a PIN is to guard against using the wrong fob and then complaining to the IT staff that their fob is not working.
@evgeny-gridasov commented on GitHub (Dec 12, 2015):
1337sup3rh4x0r - restriction on the PIN has been removed, from now on it may be an arbitrary string or even empty if you want.