<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=1653" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-12-12T21:00:14+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=1653</id>
<entry>
<author><name><![CDATA[darco]]></name></author>
<updated>2014-12-12T21:00:14+01:00</updated>
<published>2014-12-12T21:00:14+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6500#p6500</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6500#p6500"/>
<title type="html"><![CDATA[Re: OTP on NEO vs OTP on Yubico Standard Key]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6500#p6500"><![CDATA[
I believe you can also set the moving factor seed (if you happen to know approximately what the counter it in your other yubikey) in the yubikey personalization tool if you don't want to manually press the OTP button a crazy number of times.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3288">darco</a> — Fri Dec 12, 2014 9:00 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2014-12-12T10:39:49+01:00</updated>
<published>2014-12-12T10:39:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6493#p6493</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6493#p6493"/>
<title type="html"><![CDATA[Re: OTP on NEO vs OTP on Yubico Standard Key]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6493#p6493"><![CDATA[
Use one Yubikey, and submit OTP until the counter is synced again<br /><br />stop using the other key<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Fri Dec 12, 2014 10:39 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[riverrat]]></name></author>
<updated>2014-12-12T04:57:42+01:00</updated>
<published>2014-12-12T04:57:42+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6491#p6491</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6491#p6491"/>
<title type="html"><![CDATA[Re: OTP on NEO vs OTP on Yubico Standard Key]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6491#p6491"><![CDATA[
Ahhh thank you for the reference.  Thinking this is specifically what you are referring to:<br /><br />The non-volatile counter is compared with the previously received<br />value. If lower than or equal to the stored value, the received OTP is<br />rejected as a replay.<br /><br />That is likely exactly what is happening.<br /><br />So what should be done to my account in this case ?  Does the account get &quot;reset&quot; somehow to reset the server's expectation of my counter value ?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3177">riverrat</a> — Fri Dec 12, 2014 4:57 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2014-12-10T10:08:57+01:00</updated>
<published>2014-12-10T10:08:57+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6484#p6484</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6484#p6484"/>
<title type="html"><![CDATA[Re: OTP on NEO vs OTP on Yubico Standard Key]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6484#p6484"><![CDATA[
Counters will fail if you use two keys at the same time, please read how the Yubico OTP protocol works here:<br /><!-- m --><a class="postlink" href="https://www.yubico.com/wp-content/uploads/2014/10/YubiKey-Manual-v3.3.pdf">https://www.yubico.com/wp-content/uploa ... l-v3.3.pdf</a><!-- m --><br /><br />You can find an implementation of Yubico OTP generation in this repository:<br /><!-- m --><a class="postlink" href="https://github.com/Yubico/yubico-c">https://github.com/Yubico/yubico-c</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Wed Dec 10, 2014 10:08 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[riverrat]]></name></author>
<updated>2014-12-09T20:25:00+01:00</updated>
<published>2014-12-09T20:25:00+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6482#p6482</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6482#p6482"/>
<title type="html"><![CDATA[OTP on NEO vs OTP on Yubico Standard Key]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1653&amp;p=6482#p6482"><![CDATA[
I have a Yubico Standard Key that my company has setup for VPN access using OTP.  <br /><br />I recently got a Yubico NEO to use with Google.  I'm starting with looking to replace my existing Standard Yubico with the NEO.  I've received the Yubico OTP parameters my original standard key was programmed with and I've duplicated that onto the Neo ... but it fails to work with the VPN. <br /><br />So we have a Yubico OTP Test web site at our company.  The original Standard Yubico USB key I have says it verified fine.  The NEO which is supposedly programmed with the same configuration details fails.<br /><br />If the two keys are (supposedly) using identical configuration parameters for OTP, should the NEO both verify on the OTP test side as well as work in our VPN ?<br /><br />If there anything else related to the NEO that would cause it to fail even though its programmed like my Standard Key ?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3177">riverrat</a> — Tue Dec 09, 2014 8:25 pm</p><hr />
]]></content>
</entry>
</feed>