From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on inbox.vuxu.org X-Spam-Level: X-Spam-Status: No, score=0.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID autolearn=ham autolearn_force=no version=3.4.4 Received: (qmail 1129 invoked from network); 8 Sep 2021 17:59:39 -0000 Received: from 4ess.inri.net (216.126.196.42) by inbox.vuxu.org with ESMTPUTF8; 8 Sep 2021 17:59:39 -0000 Received: from pb-smtp21.pobox.com ([173.228.157.53]) by 4ess; Wed Sep 8 13:50:04 -0400 2021 Received: from pb-smtp21.pobox.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 19E8914C5BD for <9front@9front.org>; Wed, 8 Sep 2021 13:49:48 -0400 (EDT) (envelope-from unobe@cpan.org) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed; d=pobox.com; h=message-id :to:subject:date:from:in-reply-to:mime-version:content-type :content-transfer-encoding; s=sasl; bh=TFYh+7mIhl9ho1wAg3QbXBqxp rTakmF6CIb1MEZGs9w=; b=t05jaOSmXfpobfV/ymSQ+a94v4wgq/wwj58+TlDrK Uok++i4c2HUkX2uEe1ziLtTtfCqIXyzuIccSHdmk4sL4LckMZrKMoQhrfYPPz/Yb uckdD5wIb4Kq+b3koEMXJWj0R4SVaCHtOK3nA1LxQmAPwveTPV9qF/xUQmnV//jV jE= Received: from pb-smtp21.sea.icgroup.com (unknown [127.0.0.1]) by pb-smtp21.pobox.com (Postfix) with ESMTP id 0D17214C5BC for <9front@9front.org>; Wed, 8 Sep 2021 13:49:48 -0400 (EDT) (envelope-from unobe@cpan.org) Received: from strider (unknown [47.34.135.186]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by pb-smtp21.pobox.com (Postfix) with ESMTPSA id 5AAE114C5BB for <9front@9front.org>; Wed, 8 Sep 2021 13:49:45 -0400 (EDT) (envelope-from unobe@cpan.org) Message-ID: <413DD0E37E3D9724879653B3B5F8E467@smtp.pobox.com> To: 9front@9front.org Date: Wed, 08 Sep 2021 10:49:43 -0700 From: unobe@cpan.org In-Reply-To: <35FD7A952D0CFEC0075D185A3594FCD5@eigenstate.org> MIME-Version: 1.0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit X-Pobox-Relay-ID: 273C8348-10CD-11EC-831C-98D80D944F46-09620299!pb-smtp21.pobox.com List-ID: <9front.9front.org> List-Help: X-Glyph: ➈ X-Bullshit: advanced structured proxy scripting SSL over TOR GPU injection optimizer Subject: Re: [9front] dp9ik plugins for pam and bsd auth. Reply-To: 9front@9front.org Precedence: bulk Quoth ori@eigenstate.org: > Quoth Jacob Moody : > > Hello all, > > > > I sent some mail previously regarding some work on a standalone tlsclient ripped out of drawterm. > > The repo[0] now contains a pam module and bsd auth executable for use in making UNIX system > > authentication defer to a 9front authentication server. The ssl library has been changed > > to use openssl rather then gnutls as well. I personally have been using the pam module for a > > couple months now and haven't had much issue with it. I figure this might be interesting > > to those running a hybrid network. > > > > Thanks, > > moody > > > > [0] http://shithub.us/moody/tlsclient/HEAD/info.html > > This is great! Thanks moody. > Thanks, this actually looks like something I should try out. > > ...So, who's going to do the factotum based chrome password > manager extension? An extension would be nice. I began working on a factotum extension but decided to just write a JS snippet that communicates via a websocket to a Perl process that was a pass-through to (p9p's) factotum. IIRC, 'twas non-trivial to write an extension, so I took the path of least resistance. The JS snippet was rudimentary--I had stored it as a bookmark so I could "fill in" whichever site I was using. I haven't used it for more than a year (tempus volat), but I can post it somewhere if anyone is interested in looking at the JS and Perl. I never did get the 'confirm' functionality implemented within the browser, but maybe that was a benefit since the browser didn't have full control of the secstore and the confirmation had to occur outside the browser.