<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=41" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2008-05-14T19:31:29+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=41</id>
<entry>
<author><name><![CDATA[hrag]]></name></author>
<updated>2008-05-14T19:31:29+01:00</updated>
<published>2008-05-14T19:31:29+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=41&amp;p=45#p45</id>
<link href="https://forum.yubico.com/viewtopic.php?t=41&amp;p=45#p45"/>
<title type="html"><![CDATA[What if an unauthorized person takes my YubiKey...]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=41&amp;p=45#p45"><![CDATA[
Q: What if an unauthorized person takes my YubiKey when I'm not looking and uses it then returns it? Does this mean that they have access until I log in again? How do I prevent something like that?<br /><br />A: The first countermeasure is to use a two-factor approach, i.e. combining the token with a PIN or a password.<br /><br />If there is a store-replay concern as you mention above, a good countermeasure is to ask for the user to supply an OTP more than one time during a session. The token has a second timer and the validating application can use this counter to calculate the delta between two OTPs during one session. Consider a service where the user uses the token to log in. After a &quot;make a payment&quot; request, the server asks for a second confirmation OTP. The server will then measure the token's reported delta vs. the expected. If they match, the transaction is committed.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=58">hrag</a> — Wed May 14, 2008 7:31 pm</p><hr />
]]></content>
</entry>
</feed>