Two-factor authentication
Two-factor authentication
Posted Sep 2, 2011 18:12 UTC (Fri) by slashdot (guest, #22014)In reply to: Two-factor authentication by dugsong
Parent article: kernel.org compromised
As far as I can tell ebirdie's objections apply to your solution as well.
In short, the issue is that a compromised client has full control of the connection after the authentication is done, regardless of whatever fancy mechanism you use to authenticate.
If you don't care about detection, it doesn't even require a compromised client: just software that detects authentication being successfully completed and simulates some keyboard/mouse input that gives the attacker full control of the server and shuts out the administrator from it.
