<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=23&amp;t=1453" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-07-08T12:48:58+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=23&amp;t=1453</id>
<entry>
<author><name><![CDATA[CypherCookie]]></name></author>
<updated>2015-07-08T12:48:58+01:00</updated>
<published>2015-07-08T12:48:58+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7540#p7540</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7540#p7540"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7540#p7540"><![CDATA[
OK so after apply my brain for more than 2 seconds i realised that its not possible to get the YubiKey to unlock the filevault as the entire disk is encrypted. <br /><br />As this is Apple there is also no public TPM in which you can store key data etc in therefore I do not believe that it is possible at present to achieve this.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3807">CypherCookie</a> — Wed Jul 08, 2015 12:48 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[CypherCookie]]></name></author>
<updated>2015-07-08T11:41:12+01:00</updated>
<published>2015-07-08T11:41:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7539#p7539</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7539#p7539"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7539#p7539"><![CDATA[
Hi all,<br /><br />We use slot 2 with a static key, which is generated randomly at whatever length you need. <br /><br />We then use this as dual authentication to allow users to login and unlock their screen saver. <br /><br />While the static token isn't ideal, it is needed as the authentication mechanism needs to know what the key is to allow 2 factor authentication to work. Also if you use file vault on a mac or another encrypted platform the token is securely locked away until the user un-encrypts the drive. <br /><br />I am currently looking at how we can use the static token to unlock FileVault as well.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3807">CypherCookie</a> — Wed Jul 08, 2015 11:41 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[zviratko]]></name></author>
<updated>2015-03-13T15:12:41+01:00</updated>
<published>2015-03-13T15:12:41+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7023#p7023</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7023#p7023"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=7023#p7023"><![CDATA[
IMO using static password with Yubikey completely defeats security<br /><br />IF you just use the static password, insert the Yubikey during boot, press the key, then put it back on your keychain, it could have some benefit (like having a much longer/harder to crack password)<br /><br />BUT<br /><br />IF you use the Yubikey for anything else, you are bound to hit it from time to tame, pasting your password into whatever you're doing (like your terminal where it will show up in .bash_history unless erased) - this allows the password to show up in keyloggers, history, remote servers - wherever it ends...<br /><br />It's a convenience feature, replaceable by a BatteryHorseStaplePassword easily.<br /><br />What would make sense is using the smartcard component to store the private key for the FDE encryption.<br />With FileVault, this is impossible by design as the private key is stored on the drive and encrypted with passwords, but it &quot;could&quot; be possible to encrypt this private key with yubikey's key, thus having no password at all, and cracking key encryption is much harder (IMO?) than cracking a password for a key.<br />- This is however impossible at the moment, and would likely need support built-into the EFI firmware from Apple.<br /><br />A different story is with encrypted images - those can be encrypted with a keychain-backed key, so you could use a Yubikey as a smartcard to protect some of your data - it's not FDE though so usability and security will suffer, but not by that much.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3463">zviratko</a> — Fri Mar 13, 2015 3:12 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mortenbendtsen]]></name></author>
<updated>2014-11-24T13:51:03+01:00</updated>
<published>2014-11-24T13:51:03+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6337#p6337</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6337#p6337"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6337#p6337"><![CDATA[
<div class="quotetitle">skitapa wrote:</div><div class="quotecontent"><br /><div class="quotetitle">mortenbendtsen wrote:</div><div class="quotecontent"> just use a static password preferably in combination with a short password you remember to create something similar to 2-factor.<br /></div><br /><br />Thank you sir! That is awesome, I had not realized this. I was kind of disappointed that I was forced to use a static password to unlock  FileVault2 but with your idea I can use a static password, remove the enter key and just add my own short one on the end of it. That is great! Now I don't need to be afraid to loose my yubikeys <img src="https://forum.yubico.com/images/smilies/icon_e_biggrin.gif" alt=":-D" title="Very Happy" /></div><br /><br />Personally I keep the enter at the end and add my own short password at the beginning of the password, but that is a matter of preference.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3269">mortenbendtsen</a> — Mon Nov 24, 2014 1:51 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[skitapa]]></name></author>
<updated>2014-11-24T13:48:15+01:00</updated>
<published>2014-11-24T13:48:15+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6336#p6336</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6336#p6336"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6336#p6336"><![CDATA[
<div class="quotetitle">mortenbendtsen wrote:</div><div class="quotecontent"><br />just use a static password preferably in combination with a short password you remember to create something similar to 2-factor.<br /></div><br /><br />Thank you sir! That is awesome, I had not realized this. I was kind of disappointed that I was forced to use a static password to unlock  FileVault2 but with your idea I can use a static password, remove the enter key and just add my own short one on the end of it. That is great! Now I don't need to be afraid to loose my yubikeys <img src="https://forum.yubico.com/images/smilies/icon_e_biggrin.gif" alt=":-D" title="Very Happy" /><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2548">skitapa</a> — Mon Nov 24, 2014 1:48 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mortenbendtsen]]></name></author>
<updated>2014-11-10T11:21:11+01:00</updated>
<published>2014-11-10T11:21:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6172#p6172</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6172#p6172"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6172#p6172"><![CDATA[
It is quite easy to to set up your yubikey with the FileVault in OS X. You just use a static password preferably in combination with a short password you remember to create something similar to 2-factor. <br /><br />Only thing that is very important is that you change the speed of the yubikey to 40ms otherwise the pre-boot authentication does not work. You can do that in the settings or tools tab of the personalization tool.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3269">mortenbendtsen</a> — Mon Nov 10, 2014 11:21 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[skitapa]]></name></author>
<updated>2014-11-04T16:04:30+01:00</updated>
<published>2014-11-04T16:04:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6125#p6125</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6125#p6125"/>
<title type="html"><![CDATA[Re: OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=6125#p6125"><![CDATA[
I would also like to see this.<br />However, I can not see how this would be implemented. A mac can have a network connection before booting an encrypted drive but I think that it is not available for users to play with, and is probably only available for remote booting and so on.<br />Do note that this is plain speculation on my part. For some reason storing a static password in one slot of the yubikey and decrypting the drive that way does not work for me but has been reported to work, so that could be one option for you.<br />It's always a good thing to let apple know that support for yubikey should be implemented in the OS so don´t forget to mail them and let them know.<br /><br />And remember Anyone who thinks that they are too small to make a difference has never tried to fall asleep with a mosquito in the room <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":-)" title="Smile" /><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2548">skitapa</a> — Tue Nov 04, 2014 4:04 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[pknickles]]></name></author>
<updated>2014-08-31T21:14:12+01:00</updated>
<published>2014-08-31T21:14:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1453&amp;p=5508#p5508</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=5508#p5508"/>
<title type="html"><![CDATA[OSX v10.9.4 &quot;FileVault&quot; via Neo Personalization Tool v3.1.14]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1453&amp;p=5508#p5508"><![CDATA[
I'd like to encrypt my Mac but I'm also a bit concerned about whether or not it will even work...  (The latest post I can find on Yubico support boards is from 6 months ago.)<br /><br />Can this be done yet?  If so, could Yubico produce an EXPLICITLY DETAILED instruction set?  (I only ask for explicit instructions because 6-9 months ago I tried this and nearly lost access to all my data.  Rather than me figuring this one on my own (via several calls to Yubico tech support) I'd think a runbook would be the easiest/best path for Yubico customers.  I can't be the only person who wants to do this...)<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2909">pknickles</a> — Sun Aug 31, 2014 9:14 pm</p><hr />
]]></content>
</entry>
</feed>