<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=603" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2011-08-06T02:47:05+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=603</id>
<entry>
<author><name><![CDATA[Hani]]></name></author>
<updated>2011-08-06T02:47:05+01:00</updated>
<published>2011-08-06T02:47:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=603&amp;p=2767#p2767</id>
<link href="https://forum.yubico.com/viewtopic.php?t=603&amp;p=2767#p2767"/>
<title type="html"><![CDATA[Re: Purpose of the Secret Identifier &amp; Time Stamp? &amp; other Q]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=603&amp;p=2767#p2767"><![CDATA[
With regards to the timestamps. I don't think they provide any extra security.<br />They are there to protect against Phishing (where someone grabs your key and generates a number of OTP which he can use later).<br />In the case of Yubico keys, these stolen OTP will be valid until a new OTP comes along with a higher session counter.<br />In their documentation Yubico mentions that to increase security you can ask for 2 OTPs and use the timestamp to ensure they were generated within a given time period. But the attacker is likely to have grabbed more than one OTP. <br />The server could vary the delay from the first OTP to the request of the second OTP but for practical reasons that can't be very long and once you factor in the 10s grace period (for network delays) this random delay is likely less than the time the attacker had to collect OTPs.<br /><br />If the above is correct I don't see the point why you would ever validate timestamps. <br /><br />Could someone at Yubico confirm my assumptions or let me know if they are incorrect?<br /><br />Regards,<br />Hani<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1749">Hani</a> — Sat Aug 06, 2011 2:47 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[jjkool]]></name></author>
<updated>2010-12-07T23:03:28+01:00</updated>
<published>2010-12-07T23:03:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=603&amp;p=2462#p2462</id>
<link href="https://forum.yubico.com/viewtopic.php?t=603&amp;p=2462#p2462"/>
<title type="html"><![CDATA[Purpose of the Secret Identifier &amp; Time Stamp? &amp; other Q's]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=603&amp;p=2462#p2462"><![CDATA[
If you use the Identity Prefix to lookup the AES key for decryption, I'm not understanding what purpose the Secret Identifier serves. The spec says to use all zeroes if one is not needed, but can someone give me an example of when I might want to use one?<br /><br />I understand that the &quot;session counter&quot; in combination with the &quot;session use&quot; is used to determine replay attacks. Why are these fields not combined into one non-volatile counter that goes up with each use. Wouldn't that serve the same purpose?<br /><br />About the time stamp: Is it only really used when accepting 2 OTPs, one after the other during the same session. I've read articles online that say it guards against phishing attacks, but how?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1464">jjkool</a> — Tue Dec 07, 2010 11:03 pm</p><hr />
]]></content>
</entry>
</feed>