<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=6&amp;t=228" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2009-01-13T16:22:17+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=6&amp;t=228</id>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2009-01-13T16:22:17+01:00</updated>
<published>2009-01-13T16:22:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=228&amp;p=907#p907</id>
<link href="https://forum.yubico.com/viewtopic.php?t=228&amp;p=907#p907"/>
<title type="html"><![CDATA[Two-factor authentication with static OTP]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=228&amp;p=907#p907"><![CDATA[
I've got the question several times regarding the security of a static OTP Yubikey - what if someone finds my key and logs onto my service ?<br /><br />It is important to understand that the static OTP approach is a compromise and given that the code is static, it is suceptible to eavesdropping, phishing, keyloggers and such threats. However, as the code is long and awkward, it is &quot;by that very nature&quot; less susceptible to be &quot;told over the phone&quot;, being written down or being remembered by someone.<br /><br />The static OTP approach is designed with this security compromise in mind and the target applications are legacy- and off-line applications where dynamic codes won't work. <br /><br />One simple way to add a two-factor security is to prefix the OTP string with an ordinary password:<br /><br />1. Assume a static OTP Yubikey yielding the string lhrkgbdufthbhrgulhvlbfuicjgunjbrtntcbeivrkkj<br /><br />2. Select a password, let's say &quot;foobar&quot;<br /><br />3. In the enter password field, enter foobar and then emit the static OTP. The string is then foobarlhrkgbdufthbhrgulhvlbfuicjgunjbrtntcbeivrkkj<br /><br /><br />A variety of this is when it is desired to use the key for more than one service and one don't want to reuse the same password on two sites:<br /><br />1. Site A has password &quot;foobar&quot; - the password string becomes foobarlhrkgbdufthbhrgulhvlbfuicjgunjbrtntcbeivrkkj<br /><br />2. Site B has password &quot;barfoo&quot; - the password string becomes barfoolhrkgbdufthbhrgulhvlbfuicjgunjbrtntcbeivrkkj<br /><br /><br />Although the Yubico validation server does not support it [yet], the same scheme can be used for dynamic OTPs as well. Simply prefix the password with your PIN and you have a pretty good two factor setting.<br /><br /><br />One can of course add a bit of obfuscation by selecting a modhex-like password string <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br /><br />As a final and closing word - Please understand the strengths and limitations of the static scheme before using it. It is a compromise and in several cases a good one.<br /><br /><br />Regards,<br /><br />Jakob E<br />Hardware- and firmware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Tue Jan 13, 2009 4:22 pm</p><hr />
]]></content>
</entry>
</feed>