<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=576" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2012-04-23T09:49:32+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=576</id>
<entry>
<author><name><![CDATA[melcron]]></name></author>
<updated>2012-04-23T09:49:32+01:00</updated>
<published>2012-04-23T09:49:32+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=3017#p3017</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=3017#p3017"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=3017#p3017"><![CDATA[
<div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />If you are using system level Truecrypt encryption of the whole of the hard disk, I don't think there is any mechanism for a keylogger to be active at that point, mainly because you have only just jumped from the BIOS into the password prompt issued by the Truecrypt Boot Loader.<br /></div><br /><br />As the OP mentioned the use of auto-mount I assumed he was not using whole disk encryption.  There are cases in which a user wants to encrypt a partition or file container separate from their operating system, that way the computer is functional while more private data is stored safely away.<br /><br />Although for my laptop a yubikey with a static password and full disk encryption would be great... and this thread prompted me to read more about the issue and realize that the performance impact isn't as dramatic as I thought.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2021">melcron</a> — Mon Apr 23, 2012 9:49 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[zardoz]]></name></author>
<updated>2012-04-22T21:35:56+01:00</updated>
<published>2012-04-22T21:35:56+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=3016#p3016</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=3016#p3016"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=3016#p3016"><![CDATA[
<div class="quotetitle">melcron wrote:</div><div class="quotecontent"><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent">Because if you first enter a strong password you know by heart and then press the yubikey you have effectively created a two part authentication, something you know and something you have<br /></div><br /><br />This is not true multi-factor authentication: &quot;something the user knows&quot; and &quot;something the user has.&quot; If the system is compromised (keylogger) the infiltrator now knows the entire sequence and can access the encrypted drive without the Yubikey present.<br /><br />We have successfully made the password more difficult to brute force (likely scenario) and/or if the Yubikey is destroyed one cannot be forced to enter the password (unlikely scenario.) If only we could protect from keyloggers, which I believe is the most likely scenario.</div><br /><br />If you are using system level Truecrypt encryption of the whole of the hard disk, I don't think there is any mechanism for a keylogger to be active at that point, mainly because you have only just jumped from the BIOS into the password prompt issued by the Truecrypt Boot Loader.<br /><br />Z.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1733">zardoz</a> — Sun Apr 22, 2012 9:35 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[melcron]]></name></author>
<updated>2012-04-22T20:41:03+01:00</updated>
<published>2012-04-22T20:41:03+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=3014#p3014</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=3014#p3014"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=3014#p3014"><![CDATA[
<div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />Because if you first enter a strong password you know by heart and then press the yubikey you have effectively created a two part authentication, something you know and something you have<br /></div><br /><br />This is not true multi-factor authentication: &quot;something the user knows&quot; and &quot;something the user has.&quot; If the system is compromised (keylogger) the infiltrator now knows the entire sequence and can access the encrypted drive without the Yubikey present.<br /><br />We have successfully made the password more difficult to brute force (likely scenario) and/or if the Yubikey is destroyed one cannot be forced to enter the password (unlikely scenario.) If only we could protect from keyloggers, which I believe is the most likely scenario.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2021">melcron</a> — Sun Apr 22, 2012 8:41 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jafo_Jeeper]]></name></author>
<updated>2011-08-31T18:19:12+01:00</updated>
<published>2011-08-31T18:19:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=2780#p2780</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2780#p2780"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2780#p2780"><![CDATA[
Thought I'd already replied to this-<br /><br />Thanks for setting off the lightbulb in my head. LOVE this thing!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1528">Jafo_Jeeper</a> — Wed Aug 31, 2011 6:19 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[andlil]]></name></author>
<updated>2011-02-05T09:47:20+01:00</updated>
<published>2011-02-05T09:47:20+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=2552#p2552</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2552#p2552"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2552#p2552"><![CDATA[
<div class="quotetitle">Jafo_Jeeper wrote:</div><div class="quotecontent"><br />OK, so you set a static passcode, and anyone and their uncle can launch it since this doesn't actually scan for a certain fingerprint.<br /><br />How is this not a security issue?<br /></div><br /><br />Because if you first enter a strong password you know by heart and then press the yubikey you have effectively created a two part authentication, something you know and something you have<br /><br />//A<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=805">andlil</a> — Sat Feb 05, 2011 9:47 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jafo_Jeeper]]></name></author>
<updated>2011-02-05T05:34:25+01:00</updated>
<published>2011-02-05T05:34:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=2550#p2550</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2550#p2550"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2550#p2550"><![CDATA[
OK, so you set a static passcode, and anyone and their uncle can launch it since this doesn't actually scan for a certain fingerprint.<br /><br />How is this not a security issue?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1528">Jafo_Jeeper</a> — Sat Feb 05, 2011 5:34 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[modelrockettier]]></name></author>
<updated>2011-01-28T02:34:43+01:00</updated>
<published>2011-01-28T02:34:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=2531#p2531</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2531#p2531"/>
<title type="html"><![CDATA[Re: TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2531#p2531"><![CDATA[
unfortunately, Truecrypt does not support the Yubikey right now (unless you are using a static password, in which case almost everything supports it).<br /><br />If you download the Yubikey configuration tool, you can easily set a static password into its second slot<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1262">modelrockettier</a> — Fri Jan 28, 2011 2:34 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Eric Vogel]]></name></author>
<updated>2010-10-08T03:10:41+01:00</updated>
<published>2010-10-08T03:10:41+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=576&amp;p=2376#p2376</id>
<link href="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2376#p2376"/>
<title type="html"><![CDATA[TrueCrypt Auto Mount]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=576&amp;p=2376#p2376"><![CDATA[
Do I miss understand automount? I create a file container, use Yubikey. I can mount it find but auto-mount devices it says wrong password or no volume found.<br /><br />How do I get prompted on login to put Yubikey when I login?<br /><br />Also, how do I set the static password for Yubikey? I might wanna have a second one to keep off my keys around the house and the other on my keychain.<br /><br />Thank you,<br />Eric Vogel<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1377">Eric Vogel</a> — Fri Oct 08, 2010 3:10 am</p><hr />
]]></content>
</entry>
</feed>