<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=2094" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-12-02T23:20:16+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=2094</id>
<entry>
<author><name><![CDATA[Jasper]]></name></author>
<updated>2015-12-02T23:20:16+01:00</updated>
<published>2015-12-02T23:20:16+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2094&amp;p=8044#p8044</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=8044#p8044"/>
<title type="html"><![CDATA[Re: [Not Resolved] Yubikey 4 - hardware changes?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=8044#p8044"><![CDATA[
I got this..(on OSX)<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />→ pkcs11-tool --module $OPENSC_LIBS/opensc-pkcs11.so -T<br />Available slots:<br />Slot 0 (0x1): Yubico Yubikey 4 OTP+U2F+CCID<br />  token label        : PIV_II (PIV Card Holder pin)<br />  token manufacturer : piv_II<br />  token model        : PKCS#15 emulated<br />  token flags        : rng, login required, PIN initialized, token initialized<br />  hardware version   : 0.0<br />  firmware version   : 0.0<br />  serial num         : 00000000000000<br /></div><br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />→ pkcs11-tool --module $OPENSC_LIBS/opensc-pkcs11.so -M<br />Using slot 1 with a present token (0x1)<br />Supported mechanisms:<br />  SHA-1, digest<br />  SHA256, digest<br />  SHA384, digest<br />  SHA512, digest<br />  MD5, digest<br />  RIPEMD160, digest<br />  GOSTR3411, digest<br />  ECDSA, keySize={256,384}, hw, sign, other flags=0x1800000<br />  ECDH1-COFACTOR-DERIVE, keySize={256,384}, hw, derive, other flags=0x1800000<br />  ECDH1-DERIVE, keySize={256,384}, hw, derive, other flags=0x1800000<br />  RSA-X-509, keySize={1024,3072}, hw, decrypt, sign, verify<br />  RSA-PKCS, keySize={1024,3072}, hw, decrypt, sign, verify<br />  SHA1-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  SHA256-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  SHA384-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  SHA512-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  MD5-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  RIPEMD160-RSA-PKCS, keySize={1024,3072}, sign, verify<br /></div><br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />→ pkcs11-tool --module $OPENSC_LIBS/opensc-pkcs11.so -t -l -p MY_PIN<br />Using slot 1 with a present token (0x1)<br />C_SeedRandom() and C_GenerateRandom():<br />  seeding (C_SeedRandom) not supported<br />  seems to be OK<br />Digests:<br />  all 4 digest functions seem to work<br />  MD5: OK<br />  SHA-1: OK<br />  RIPEMD160: OK<br />Signatures (currently only RSA signatures)<br />  testing key 0 (PIV AUTH key)<br />  all 4 signature functions seem to work<br />  testing signature mechanisms:<br />    RSA-X-509: OK<br />    RSA-PKCS: OK<br />    SHA1-RSA-PKCS: OK<br />    MD5-RSA-PKCS: OK<br />    RIPEMD160-RSA-PKCS: OK<br />    SHA256-RSA-PKCS: OK<br />Verify (currently only for RSA):<br />  testing key 0 (PIV AUTH key)<br />    RSA-X-509:   ERR: C_Verify() returned CKR_GENERAL_ERROR (0x5)<br />Unwrap: not implemented<br />Decryption (RSA)<br />  testing key 0 (PIV AUTH key)<br />    RSA-X-509: OK<br />    RSA-PKCS: OK<br />1 errors<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4049">Jasper</a> — Wed Dec 02, 2015 11:20 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[hiviah]]></name></author>
<updated>2015-12-02T21:33:14+01:00</updated>
<published>2015-12-02T21:33:14+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2094&amp;p=8043#p8043</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=8043#p8043"/>
<title type="html"><![CDATA[Re: Yubikey 4 - hardware changes?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=8043#p8043"><![CDATA[
I'd be also interested what is the new chip inside of Yubikey 4.<br /><br />Regarding the PKCS#11: PKCS#11 is only the C interface, there is no &quot;internal PKCS#11&quot; signature generation. Maybe you mean the PIV applet that is compatible with PKCS#11.<br /><br />Here is some info from pkcs11-tool from <a href="https://github.com/OpenSC/OpenSC/wiki" class="postlink">OpenSC</a> using the latest Yubikey Neo (with initialized PIV applet), I'd guess it will be similar in Yubikey 4 just with the RSA-4096. Strangely it claims RSA-3072 support, but there's apparently bug in the PIV applet I guess.<br /><br />Someone may try this with Yubikey 4 and post comparison (I unfortunately ordered second Neo just few days before Yubikey 4 was announced).<br /><br />With latest Yubikey Neo you'll get:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs11-tool --module /usr/lib64/pkcs11/opensc-pkcs11.so -T<br /><br />Available slots:<br />Slot 0 (0x1): Yubikey Neo+U2F 00 00<br />  token label        : PIV_II (PIV Card Holder pin)<br />  token manufacturer : piv_II<br />  token model        : PKCS#15 emulated<br />  token flags        : rng, login required, PIN initialized, token initialized<br />  hardware version   : 0.0<br />  firmware version   : 0.0<br />  serial num         : 00000000<br /><br />$  pkcs11-tool --module /usr/lib64/pkcs11/opensc-pkcs11.so -M<br /><br />Using slot 1 with a present token (0x1)<br />Supported mechanisms:<br />  SHA-1, digest<br />  SHA256, digest<br />  SHA384, digest<br />  SHA512, digest<br />  MD5, digest<br />  RIPEMD160, digest<br />  GOSTR3411, digest<br />  ECDSA, keySize={256,384}, hw, sign, other flags=0x1800000<br />  ECDSA-SHA1, keySize={256,384}, hw, sign, other flags=0x1800000<br />  ECDH1-COFACTOR-DERIVE, keySize={256,384}, hw, derive, other flags=0x1800000<br />  ECDH1-DERIVE, keySize={256,384}, hw, derive, other flags=0x1800000<br />  RSA-X-509, keySize={1024,3072}, hw, decrypt, sign, verify<br />  RSA-PKCS, keySize={1024,3072}, hw, decrypt, sign, verify<br />  SHA1-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  SHA256-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  MD5-RSA-PKCS, keySize={1024,3072}, sign, verify<br />  RIPEMD160-RSA-PKCS, keySize={1024,3072}, sign, verify<br /><br />$ pkcs11-tool --module /usr/lib64/pkcs11/opensc-pkcs11.so -t -l -p MYPIN<br /><br />Using slot 1 with a present token (0x1)<br />C_SeedRandom() and C_GenerateRandom():<br />  seeding (C_SeedRandom) not supported<br />  seems to be OK<br />Digests:<br />  all 4 digest functions seem to work<br />  MD5: OK<br />  SHA-1: OK<br />  RIPEMD160: OK<br />Signatures (currently only RSA signatures)<br />  testing key 0 (PIV AUTH key) <br />  all 4 signature functions seem to work<br />  testing signature mechanisms:<br />    RSA-X-509: OK<br />    RSA-PKCS: OK<br />    SHA1-RSA-PKCS: OK<br />    MD5-RSA-PKCS: OK<br />    RIPEMD160-RSA-PKCS: OK<br />    SHA256-RSA-PKCS: OK<br />Verify (currently only for RSA):<br />  testing key 0 (PIV AUTH key)<br />    RSA-X-509: OK<br />    RSA-PKCS: OK<br />    SHA1-RSA-PKCS: OK<br />    MD5-RSA-PKCS: OK<br />    RIPEMD160-RSA-PKCS: OK<br />Unwrap: not implemented<br />Decryption (RSA)<br />  testing key 0 (PIV AUTH key) <br />    RSA-X-509: OK<br />    RSA-PKCS: OK<br />No errors<br /></div><br /><br />Note that if you try to use functionality like sign/decrypt directly from pkcs11-tool, you'll need to specify exact mechanism (cipher), for some reason ECDSA signing breaks, but RSA works:<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">$ pkcs11-tool --module /usr/lib64/pkcs11/opensc-pkcs11.so -m RSA-X-509 -s -l -p MYPIN &lt;&lt;&lt; &quot;Stuff to sign&quot;<br /><br />Using slot 1 with a present token (0x1)<br />Using signature algorithm RSA-X-509<br />....binary stuff...<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2457">hiviah</a> — Wed Dec 02, 2015 9:33 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[crawler]]></name></author>
<updated>2015-11-18T01:44:21+01:00</updated>
<published>2015-11-18T01:44:21+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2094&amp;p=7987#p7987</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=7987#p7987"/>
<title type="html"><![CDATA[Re: Yubikey 4 - hardware changes?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=7987#p7987"><![CDATA[
My guess is that YK4 uses a completely different chip vendor.<br />NEO is based the NXP A700x chip, which according to the specifications only support RSA keys up to 2048 bits.<br /><br />I am sure NFC will return once NXP upgrades their chips to allow for larger RSA keys.<br /><br />Note: I am not Yubico representative, so I could very well be wrong.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4034">crawler</a> — Wed Nov 18, 2015 1:44 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2015-12-02T22:10:05+01:00</updated>
<published>2015-11-17T03:12:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2094&amp;p=7982#p7982</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=7982#p7982"/>
<title type="html"><![CDATA[[Not Resolved] Yubikey 4 - hardware changes?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2094&amp;p=7982#p7982"><![CDATA[
I saw the announcement of the Yubikey 4 and Yubikey 4 nano products earlier today: <br />  <!-- m --><a class="postlink" href="https://www.yubico.com/2015/11/4th-gen-yubikey-4/">https://www.yubico.com/2015/11/4th-gen-yubikey-4/</a><!-- m --><br />  <!-- m --><a class="postlink" href="https://www.yubico.com/2015/11/yubico-docker-codesign/">https://www.yubico.com/2015/11/yubico-docker-codesign/</a><!-- m --><br />  <!-- m --><a class="postlink" href="https://www.yubico.com/products/yubikey-hardware/yubikey4/">https://www.yubico.com/products/yubikey ... /yubikey4/</a><!-- m --><br /><br />1. Out of curiosity, what were the hardware changes made between the NEO/NEO-n and the 4/4-n that allowed for RSA 4096-bit keys and internal PKCS#11 signatures? And clarification: is the PKCS#11 support for docker only available in the 4/4-n models?<br /><br />2. Also, is the lack of NFC capability on the Yubikey 4 due to having to source hardware from sources other than NXP? If not, what is the reason?<br /><br />Thanks.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Tue Nov 17, 2015 3:12 am</p><hr />
]]></content>
</entry>
</feed>