Blame | Last modification | View Log | RSS feed
## Configuration for the OTP module.## This module allows you to use various handheld OTP tokens# for authentication (Auth-Type := otp). These tokens are# available from various vendors.## It works in conjunction with otpd, which implements token# management and OTP verification functions; and lsmd or gsmd,# which implements synchronous state management functions.# otpd, lsmd and gsmd are available from TRI-D Systems:# <http://www.tri-dsystems.com/># You must list this module in BOTH the authorize and authenticate# sections in order to use it.otp {# otpd rendezvous point.# (default: /var/run/otpd/socket)#otpd_rp = /var/run/otpd/socket# Text to use for the challenge. The '%' character is# disallowed, except that you MUST have a single "%s"# sequence in the string; the challenge itself is# inserted there. (default "Challenge: %s\n Response: ")#challenge_prompt = "Challenge: %s\n Response: "# Length of the challenge. Most tokens probably support a# max of 8 digits. (range: 5-32 digits, default 6)#challenge_length = 6# Maximum time, in seconds, that a challenge is valid.# (The user must respond to a challenge within this time.)# It is also the minimal time between consecutive async mode# authentications, a necessary restriction due to an inherent# weakness of the RADIUS protocol which allows replay attacks.# (default: 30)#challenge_delay = 30# Whether or not to allow asynchronous ("pure" challenge/# response) mode authentication. Since sync mode is much more# usable, and all reasonable tokens support it, the typical# use of async mode is to allow resync of event based tokens.# But because of the vulnerability of async mode with some tokens,# you probably want to disable this and require that out-of-sync# users resync from specifically secured terminals.# See the otpd docs for more info.# (default: no)#allow_async = no# Whether or not to allow synchronous mode authentication.# When using otpd with lsmd, it is *CRITICALLY IMPORTANT*# that if your OTP users can authenticate to multiple RADIUS# servers, this must be "yes" for the primary/default server,# and "no" for the others. This is because lsmd does not# share state information across multiple servers. Using "yes"# on all your RADIUS servers would allow replay attacks!# Also, for event based tokens, the user will be out of sync# on the "other" servers. In order to use "yes" on all your# servers, you must either use gsmd, which synchronizes state# globally, or implement your own state synchronization method.# (default: yes)#allow_sync = yes# If both allow_async and allow_sync are "yes", a challenge is# always presented to the user. This is incompatible with NAS's# that can't present or don't handle Access-Challenge's, e.g.# PPTP servers. Even though a challenge is presented, the user# can still enter their synchronous passcode.# The following are MPPE settings. Note that MS-CHAP (v1) is# strongly discouraged. All possible values are listed as# {value = meaning}. Default values are first.#mschapv2_mppe = {2 = required, 1 = optional, 0 = forbidden}#mschapv2_mppe_bits = {2 = 128, 1 = 128 or 40, 0 = 40}#mschap_mppe = {2 = required, 1 = optional, 0 = forbidden}#mschap_mppe_bits = {2 = 128}}