X-Git-Url: http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=blobdiff_plain;f=README.md;h=23aa837107ab31f62a3b3a89fe9f56457417455c;hp=c12a0dc12b2e18b8a183b116033bdcdca2bac43b;hb=194a1c30bd4a0668debc82f40eefa49adfc11a8e;hpb=288c17d345dfd026fb9d71976275cdabdbeeaf88 diff --git a/README.md b/README.md index c12a0dc..23aa837 100644 --- a/README.md +++ b/README.md @@ -1,3 +1,4 @@ +% Challenge-Response PAM Module ``` Copyright (c) 2013 Eugene Crosser @@ -24,7 +25,7 @@ freely, subject to the following restrictions: ------------------------------------------------------------------------ -# Challenge-Response PAM Module for HMAC-SHA1 Hardware Token(s) +## Challenge-Response PAM Module for HMAC-SHA1 Hardware Token(s) This package provides a UNIX [PAM](http://en.wikipedia.org/wiki/Pluggable_Authentication_Modules) @@ -72,6 +73,9 @@ period. The downside is that if the token is used against multiple hosts, and one of them leaks the secret to an adversary, all hosts are compromised. This is not the case with the first approach. +The particular data structure is outlined in the picture: +![](auth-data-structure.svg) + ## Module Operation Authentication file, containing nonce, encrypted shared secret, @@ -135,9 +139,13 @@ PAM module has the following parameters: ## Getting the Source -[clone](git://git.average.org/git/pam_pcsc_cr.git) or +Check the [project homepage](http://www.average.org/chal-resp-auth/). + +Pick the source tarball +[here](http://www.average.org/chal-resp-auth/pam_pcsc_cr-0.9.1.tar.xz), +or you can [clone](git://git.average.org/git/pam_pcsc_cr.git) or [browse](http://www.average.org/gitweb/?p=pam_pcsc_cr.git;a=summary) -the repo. +the git repo. ## Author