<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=299" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2009-03-27T20:35:34+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=299</id>
<entry>
<author><name><![CDATA[Greg Woods]]></name></author>
<updated>2009-03-27T20:35:34+01:00</updated>
<published>2009-03-27T20:35:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1350#p1350</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1350#p1350"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1350#p1350"><![CDATA[
&gt; Perhaps the script that Ferrix provided for reprogramming to a static password will be helpful as a basis for creating a Linux script to do what needs to be done. It's at<br />&gt;<br />&gt; <!-- m --><a class="postlink" href="http://s3.collectivesoftware.com/statickey.wsf">http://s3.collectivesoftware.com/statickey.wsf</a><!-- m --><br /><br />There are some helpful details in that script, but it still doesn't show me how I can modify the Linux programming software to be able to set the programming password. Until we can do this, it is trivial for an attacker to reprogram the key and DoS the user out of our servers, or activate the auto-navigation feature to obtain an OTP for cracking a user account.<br /><br />&gt; Also I assume that you've seen the stuff at<br />&gt; <br />&gt; <!-- m --><a class="postlink" href="http://www.yubico.com/developers/personalization/">http://www.yubico.com/developers/personalization/</a><!-- m --><br /><br />Yes, but it doesn't (yet) have source code so I can't get the information I need from that. It does have the ability to set the password, but only by going through a Windows GUI. That's OK for testing, but isn't going to work for us with thousands of production users. At best, this would require mousing keys between the personalization GUI and a program that can generate random keys and then install those keys into the YubiPAM database. <br /><br />What we really need is a way to program the tokens, disable the auto-navigation feature, and protect the token from reprogramming in the field, all from a Linux command line.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=356">Greg Woods</a> — Fri Mar 27, 2009 8:35 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Dick]]></name></author>
<updated>2009-03-27T19:52:31+01:00</updated>
<published>2009-03-27T19:52:31+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1349#p1349</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1349#p1349"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1349#p1349"><![CDATA[
Greg,<br /><br />Perhaps the script that Ferrix provided for reprogramming to a static password will be helpful as a basis for creating a Linux script to do what needs to be done.  It's at<br /><br /><a href="http://s3.collectivesoftware.com/statickey.wsf" class="postlink">http://s3.collectivesoftware.com/statickey.wsf</a><br /><br />Also I assume that you've seen the stuff at<br /><br /><a href="http://www.yubico.com/developers/personalization/" class="postlink">http://www.yubico.com/developers/personalization/</a><br /><br />Dick<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=359">Dick</a> — Fri Mar 27, 2009 7:52 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Greg Woods]]></name></author>
<updated>2009-03-27T17:45:17+01:00</updated>
<published>2009-03-27T17:45:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1347#p1347</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1347#p1347"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1347#p1347"><![CDATA[
JakobE wrote:<br /><br />&gt; If there is a concern that an attacker/saboteur would reconfigure the Yubikey, set the configuration access code. <br /><br />The problem here is that this is settable, as far as I have been able to find, only using a GUI under WIndows. This is OK for testing with a small handful of users, but it isn't going to work for us for thousands of users in production. The Linux software I have been able to find on Google could be scripted, but it does not allow the programming access code to be set, or even for the token to be programmed if the access code is already set. Requiring every token to go through a Windows GUI is a non-starter for us.<br /><br />I would like to modify the Linux code so that it can set the password, but I haven't found the source code for the Windows version yet so I don't have enough information to do this.<br /><br />&gt; The automatic navigation was previously seen as a gizmo that has been used for test and &quot;playing around&quot;. It was a design parameter that this function should be configurable <br />&gt; independently of the OTP configuration. Therefore, there is no password on it. Given that this has been seen as a potential risk, we've made a firmware change that locks the<br />&gt; auto navigation configuration if the configuration access code is set. <br /><br />How can I tell what version of the firmware I have and whether or not that version of the firmware has the protection?<br /><br />&gt; Therefore, if you don't like the automatic navigation feature, just leave it blank and set the configuration access code and the function will remain dead.<br /><br />Same problem with inability to set the access code without using a Windows GUI.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=356">Greg Woods</a> — Fri Mar 27, 2009 5:45 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2009-03-27T15:21:48+01:00</updated>
<published>2009-03-27T15:21:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1340#p1340</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1340#p1340"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1340#p1340"><![CDATA[
I think most have been said already, but just to summarize I would like to make the following points:<br /><br />The HID trigger feature is configurable and this means you leave it off if you don't accept the potential vulnerability of a Trojan sending a fake trigger request. These flags cannot be changed without a complete reconfiguration. This means that an attacker that flips this flag to on will kill the current AES key and thereby simply making the key useless to the service it is intended for. If there is a concern that an attacker/saboteur would reconfigure the Yubikey, set the configuration access code. This effectively prevents reconfiguration.<br /><br />The automatic navigation was previously seen as a gizmo that has been used for test and &quot;playing around&quot;. It was a design parameter that this function should be configurable independently of the OTP configuration. Therefore, there is no password on it. Given that this has been seen as a potential risk, we've made a firmware change that locks the auto navigation configuration if the configuration access code is set. Therefore, if you don't like the automatic navigation feature, just leave it blank and set the configuration access code and the function will remain dead.<br /><br />Hope this answers and addresses all concerns.<br /><br />Regards,<br /><br />JakobE<br />Hardware- and firmware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Fri Mar 27, 2009 3:21 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2009-03-27T10:06:56+01:00</updated>
<published>2009-03-27T10:06:56+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1336#p1336</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1336#p1336"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1336#p1336"><![CDATA[
<div class="quotetitle">Dick wrote:</div><div class="quotecontent"><br />Good point.  I guess the bottom line is that it would make sense that any changes in the operation of the YK should require entry of the programming password to minimize these potential problems and, perhaps, others yet unimagined as well.<br /></div><br /><br />Yes, that is definitely the case, and we are in the process of making this change.<br /><br />It isn't unlikely that we'll drop the auto-login feature altogether, it doesn't work well (keyboard language dependent) and adds complexity and opens up for concerns like this.<br /><br />/Simon<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Fri Mar 27, 2009 10:06 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Dick]]></name></author>
<updated>2009-03-26T07:01:47+01:00</updated>
<published>2009-03-26T07:01:47+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1332#p1332</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1332#p1332"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1332#p1332"><![CDATA[
Good point.  I guess the bottom line is that it would make sense that any changes in the operation of the YK should require entry of the programming password to minimize these potential problems and, perhaps, others yet unimagined as well.<br /><br />Thanks for sharing the thinking on this.<br /><br />Dick<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=359">Dick</a> — Thu Mar 26, 2009 7:01 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Greg Woods]]></name></author>
<updated>2009-03-26T05:09:11+01:00</updated>
<published>2009-03-26T05:09:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1331#p1331</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1331#p1331"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1331#p1331"><![CDATA[
It is probably possible for an attacker  to cause the USB bus to be reset, which might temporarily interrupt power to the token and cause it to power up again, thus going into auto-login if that has been set. Since auto-login can apparently be turned on by the user (or the attacker), without knowing the programming password, this is definitely a concern if everything I think I know about it is correct.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=356">Greg Woods</a> — Thu Mar 26, 2009 5:09 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Dick]]></name></author>
<updated>2009-03-26T01:49:36+01:00</updated>
<published>2009-03-26T01:49:36+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1330#p1330</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1330#p1330"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1330#p1330"><![CDATA[
<div class="quotetitle">Greg Woods wrote:</div><div class="quotecontent"><br />From reading the source code, it appears that it is not possible to do anything to the token without also writing an AES key, which requires that you either have access to the existing key, or generate a new key, which then would not allow the token to be used to log in as that user any more unless you also have access to the authentication server.  If this is the case, it removes the concern about the trigger flag being set and then triggered as a way to break into the user's account.<br /><br />The auto-login does remain a concern. It is a risk that we may or may not be willing to assume, but it would certainly be better from the security standpoint if this function could be disabled.<br /></div><br /><br />You are correct that I haven't looked at the Linux programming tool.  I'm afraid that I don't know much about Linux.  I guess the nature of community projects such as this leads to different paths with inconsistent capabilities.<br /><br />I agree that the need to enter the AES key in order to program the YK would effectively preclude the trigger from being used to enter the user's account.  I was originally thinking that the trigger in combination with the auto-login seemed particularly problematic, but on further thought I realized that the auto-login only occurs when the YK is first plugged in so I don't think the trigger would have any interaction with the auto-login.  That, together with your observation, would seem to pretty much resolve my concern with the trigger.  I'm still uneasy about the auto-login, but perhaps on further reflection will realize that my concern there is also unjustified.<br /><br />Regards,<br /><br />Dick<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=359">Dick</a> — Thu Mar 26, 2009 1:49 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Greg Woods]]></name></author>
<updated>2009-03-25T23:26:11+01:00</updated>
<published>2009-03-25T23:26:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1329#p1329</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1329#p1329"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1329#p1329"><![CDATA[
Looks like you have only seen the Windows version of the personalization software. On the Linux side, I don't see any way to set the programming password, or to program a token if it already has a password set. It does, however, include the ability to set the ALLOW_HIDTRIG flag. Conversely, the Windows software allows setting and specifying a password, but doesn't let you set/clear the trigger flag. I expect we won't be able to deploy Yubikeys to a large number of users until the programming software is a little more developed, but I am still in the process of determining this.<br /><br />Also, I have determined that the Linux programming software will not work on any Red Hat derived system, such as Fedora or CentOS. This is because, apparently, Red Hat has compiled the usbhid driver into the kernel rather than providing it as a module. So there is no way to unload the driver and reload it with the quirk parameters, which is necessary in order to avoid the &quot;claimed by another driver&quot; problem.<br /><br />From reading the source code, it appears that it is not possible to do anything to the token without also writing an AES key, which requires that you either have access to the existing key, or generate a new key, which then would not allow the token to be used to log in as that user any more unless you also have access to the authentication server.  If this is the case, it removes the concern about the trigger flag being set and then triggered as a way to break into the user's account.<br /><br />The auto-login does remain a concern. It is a risk that we may or may not be willing to assume, but it would certainly be better from the security standpoint if this function could be disabled.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=356">Greg Woods</a> — Wed Mar 25, 2009 11:26 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Dick]]></name></author>
<updated>2009-03-25T22:39:09+01:00</updated>
<published>2009-03-25T22:39:09+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1328#p1328</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1328#p1328"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1328#p1328"><![CDATA[
One can set a programming password to prevent reprogramming of certain aspects of the YK.  Unfortunately, I believe that reprogramming the auto-login does not require that password.  I have previously suggested that this should be changed since the auto-login could be maliciously reprogrammed by malware and is a very powerful feature in that it utilizes the &quot;Run&quot; command.<br /><br />I don't know whether reprogramming the trigger function is controlled by the programming password or not since the personalization tool doesn't provide a means to change the trigger function and I haven't gone past that point in programming the YK.  I'd be interested in what you learn in that regard.<br /><br />Thanks.<br /><br />Dick<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=359">Dick</a> — Wed Mar 25, 2009 10:39 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Greg Woods]]></name></author>
<updated>2009-03-25T13:06:29+01:00</updated>
<published>2009-03-25T13:06:29+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1324#p1324</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1324#p1324"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1324#p1324"><![CDATA[
Thank you for the pointer. I will be playing around with the personalization software later today, and if I can verify that the trigger feature is off by default and can be turned on and off as described, it will alleviate that concern.<br /><br />This still leaves the concerns about the auto-login feature, and whether or not there is a way to protect the Yubikey from being reprogrammed by an attacker, without having to plug it into a Windows box.<br /><br />--Greg<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=356">Greg Woods</a> — Wed Mar 25, 2009 1:06 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Dick]]></name></author>
<updated>2009-03-25T05:26:01+01:00</updated>
<published>2009-03-25T05:26:01+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1323#p1323</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1323#p1323"/>
<title type="html"><![CDATA[Re: programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1323#p1323"><![CDATA[
Regarding the trigger function, see the following thread:<br /><br /><a href="http://forum.yubico.com/viewtopic.php?f=6&amp;t=291" class="postlink">http://forum.yubico.com/viewtopic.php?f=6&amp;t=291</a><br /><br />Dick<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=359">Dick</a> — Wed Mar 25, 2009 5:26 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Greg Woods]]></name></author>
<updated>2009-03-24T22:02:05+01:00</updated>
<published>2009-03-24T22:02:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=299&amp;p=1319#p1319</id>
<link href="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1319#p1319"/>
<title type="html"><![CDATA[programming the keys]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=299&amp;p=1319#p1319"><![CDATA[
We are looking to integrate Yubikeys into an existing Linux-based authentication system (which means software that is Windows-based is not an option).<br />We have the YubiPAM module working under freeradius, modified to use a 4-digit PIN for two-factor authentication.<br /><br />For programming the tokens:<br />Is there any way to set the password using the Linux software? If there is it isn't documented. Anybody have plans to implement this or already done it?<br /><br />I still have open questions about the level of security provided by<br />something which is actually connected to the PC. If the token could be<br />remotely activated, that's a huge potential security hole. I suspect<br />that might be possible in a couple of ways. One, there is this setting<br />which looks like it simply enables the feature. I don't know what the<br />trigger is though so I can't test:<br />[-]allow-hidtrig    set/clear the ALLOW_HIDTRIG configuration flag.<br /><br />Does anybody know what this flag actually does? Is there in fact a way to send commands to the token that will cause it to activate and spit out an OTP?<br /><br />Also, the auto-login feature is potentially dangerous. It seems likely<br />that a compromised workstation could be made to reset the USB bus and<br />trigger the function just the same as if the user had just plugged the<br />device in. The documentation also says that the auto-login can be<br />programmed without using the password, so users can update it. That<br />seems dangerous as well. We would like to get clarification<br />from Yubico about those two features.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=356">Greg Woods</a> — Tue Mar 24, 2009 10:02 pm</p><hr />
]]></content>
</entry>
</feed>