<div dir="ltr">A malicious attacker gained access to <a href="http://codespaces.com">codespaces.com</a> Amazon EC2 control panel and deleted nearly all of their data, snapshots and backups included. They are now out of business.<br>
<br>This could have been prevented had they chosen to use two-factor authentication on their Amazon EC2 accounts.<br><br>Proxmox should implement two-factor authentication so it can offer protections from stolen credentials.<br>
<br>Personally I would like to see support for Yubikeys since I already use them.<br><br>The libauth-yubikey-webclient-perl package provides a rather simple way to validate the One time Passwords generated by yubikeys.<br>
<br>Very basic validation of the OTP:<br><br>#!/bin/perl<br><span class="seweuk61mkf4l5r"></span><span class="seweuk61mkf4l5r"></span><br>$api_id = "Obtain";<br>$api_key = "From Yubico <a href="https://upgrade.yubico.com/getapikey/">https://upgrade.yubico.com/getapikey/</a>";<br>
$otp = $ARGV[0];<br>use Auth::Yubikey_WebClient;<br><br>if ($otp) {<br> my $yubi = Auth::Yubikey_WebClient->new({<br> id => $api_id,<br> api => $api_key<br> });<br> $result = $yubi->otp($otp);<br> if ( $result eq "OK" ) {<br>
print "OK\n";<br> } else {<br> print "BAD\n";<br> $yubi->debug();<br> }<br>}</div>