<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=12&amp;t=2265" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-03-23T16:41:59+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=12&amp;t=2265</id>
<entry>
<author><name><![CDATA[brian_sm]]></name></author>
<updated>2016-03-23T16:41:59+01:00</updated>
<published>2016-03-23T16:41:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2265&amp;p=8481#p8481</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2265&amp;p=8481#p8481"/>
<title type="html"><![CDATA[Support for unlimited HOTPs / TOTPs]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2265&amp;p=8481#p8481"><![CDATA[
I have a plethora of TOTP accounts, currently on my smartphone.<br /><br />Unfortunately the standard Yubikey has only two slots for OATH HOTP/TOTP(*). I believe that more recent devices will store 28-32 credentials(**).<br /><br />It would be great if the Yubikey could handle an unlimited number of TOTP accounts in a secure way. I believe this should be possible by two operations:<br /><br />1. pass in the initial secret, encrypt it with an (internal) AES key, return the encrypted secret<br />2. pass in the encrypted secret plus challenge or timestamp, return the HMAC-SHA1 response<br /><br />Then an unlimited number of encrypted secrets could be stored safely in host storage, or even backed up to the cloud, but not usable without the companion Yubikey.<br /><br />Perhaps this is entering too close into YubiHSM territory? But if it were limited to just HMAC-SHA1 types of operations I don't think it would be usable for encryption.<br /><br />Thanks,<br /><br />Brian.<br /><br />(*) The document at <!-- m --><a class="postlink" href="https://www.yubico.com/wp-content/uploads/2014/02/Yubico-TOTP-Setup.pdf">https://www.yubico.com/wp-content/uploa ... -Setup.pdf</a><!-- m --> says:<br />&quot;All YubiKey hardware can support the OATH-TOTP standard authentication method ...<br />This method utilizes one of the two configuration slots for a single site; no more than 2 sites or services<br />can be supported on a single YubiKey&quot;<br /><br />... but doesn't mention that keys other than Yubikey Standard/Edge may support a different method.<br /><br />(**) At <!-- m --><a class="postlink" href="https://www.yubico.com/faq/how-many-credentials-can-i-store-with-yubico-authenticator/">https://www.yubico.com/faq/how-many-cre ... enticator/</a><!-- m --><br />it says &quot;You can store up to 32 OATH credentials (TOTP or HOTP) on the YubiKey and access them using the Yubico Authenticator companion application.&quot;<br /><br />From earlier context in the paragraph, I think &quot;the YubiKey&quot; here must be referring to the YubiKey 4.<br /><br />At <!-- m --><a class="postlink" href="https://developers.yubico.com/yubioath-desktop/">https://developers.yubico.com/yubioath-desktop/</a><!-- m --> it says it supports<br />&quot;both slot-based credentials (compatible with any YubiKey that supports OTP) as well as the more powerful standalone OATH functionality of the YubiKey NEO&quot;<br />... but makes no mention of the YubiKey 4.<br /><br />This is an area of documentation which I think could do with some tidying up.  Reading between the lines, I *think* that the YubiKey 4 has the same &quot;new&quot; OATH capabilities as the YubiKey NEO, except with 32 slots instead of 28.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1987">brian_sm</a> — Wed Mar 23, 2016 4:41 pm</p><hr />
]]></content>
</entry>
</feed>