<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=3&amp;t=251" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2009-02-15T08:44:00+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=3&amp;t=251</id>
<entry>
<author><name><![CDATA[zzap]]></name></author>
<updated>2009-02-15T08:44:00+01:00</updated>
<published>2009-02-15T08:44:00+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1109#p1109</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1109#p1109"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1109#p1109"><![CDATA[
<div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />I'm not from yubico, but I read and don't understand your concerns exactly. They check in repo changes as they are made.. I don't think that the source code repository is intended as a product of commercial quality, but rather a tool for the community.<br /><br />I could be wrong.<br /></div><br /><br />The Yubico public validation server runs off the key subsystem code in the public repository. The changes to the source that concerned me were made by a Yubico employee. <br /><br />It's not unreasonable to expect the proper handling of tokens and OTPs in source that is created by the company selling the tokens. It's pretty hard to imagine any other token vendor exposing such borderline cavalier behavior to code correctness.<br /><br />If you don't understand why the way Yubico deals with this bug -- its initial introduction by quick-and-dirty untested code changes and its subsequent attempt to fix by equally untested code change and complete silence on these facts when challenged -- is very dangerous, then I'm sorry but you don't understand enough about security and should be looking for a different solution.  <br /><br />Unless the Yubikey is just a toy, in which case shame on me for thinking otherwise.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=435">zzap</a> — Sun Feb 15, 2009 8:44 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ferrix]]></name></author>
<updated>2009-02-10T20:51:43+01:00</updated>
<published>2009-02-10T20:51:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1074#p1074</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1074#p1074"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1074#p1074"><![CDATA[
<div class="quotetitle">zzap wrote:</div><div class="quotecontent"><br />Not to harp on this, but I am concerned no one from Yubico bothers to address my concerns. Is there really no interest from Yubico's side in explaining why the source code changes were made in the way they were?<br /></div><br /><br />I'm not from yubico, but I read and don't understand your concerns exactly.  They check in repo changes as they are made.. I don't think that the source code repository is intended as a product of commercial quality, but rather a tool for the community.<br /><br />I could be wrong.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=162">ferrix</a> — Tue Feb 10, 2009 8:51 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[zzap]]></name></author>
<updated>2009-02-10T16:44:40+01:00</updated>
<published>2009-02-10T16:44:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1073#p1073</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1073#p1073"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1073#p1073"><![CDATA[
Not to harp on this, but I am concerned no one from Yubico bothers to address my concerns. Is there really no interest from Yubico's side in explaining why the source code changes were made in the way they were?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=435">zzap</a> — Tue Feb 10, 2009 4:44 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ferrix]]></name></author>
<updated>2009-02-08T22:21:39+01:00</updated>
<published>2009-02-08T22:21:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1067#p1067</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1067#p1067"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1067#p1067"><![CDATA[
<div class="quotetitle">zzap wrote:</div><div class="quotecontent"><br />But for an attacker it doesn't matter if the token is present, of course.<br /></div><br /><br />Yubico people: The way you described this bug causes a lot of confusion because of this counter intuitive notion about sessions.  You should clarify and remember that your users do not begin with an understanding of the internal details of your algorithms!<br /><br />I am going to try re-stating the bug cases in a different way to see if it is any easier to understand.  Please correct me if I'm wrong:<br /><br />This bug has nothing to do with whether the key is plugged in at the time of attack.  A more clear way to state it is: if you always follow the behavior to only generate one OTP at a time and then unplug your key, the OTPs you generate will never trigger the bug case in the service.  Therefore, an attacker who has access to all those OTP strings will not find them at all useful, since they cannot cause the server bug.<br /><br />But any time you generate more than one OTP while still leaving the key plugged in, then those OTPs are of a kind that could trigger the bug.  An attacker who collects those OTPs could use one or more of them as valid in the future.  Once you plug in and validate the real key again, that last attack window closes.  It causes the replayable OTPs &quot;expire&quot; so to speak.<br /><br />Anyway, all this will be moot with the fixed server code.  I am only trying to help increase understanding about the nature and scope of the found bug.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=162">ferrix</a> — Sun Feb 08, 2009 10:21 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[zzap]]></name></author>
<updated>2009-02-08T19:03:18+01:00</updated>
<published>2009-02-08T19:03:18+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1066#p1066</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1066#p1066"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1066#p1066"><![CDATA[
But for an attacker it doesn't matter if the token is present, of course.<br /><br />The original error seems to be the odd commenting out of OTP checking code in<br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubikey-server-j/source/diff?path=/trunk/src/com/yubico/wsapi/KeySubsystem.java&amp;format=side&amp;r=32">http://code.google.com/p/yubikey-server ... =side&amp;r=32</a><!-- m --><br /><br />Any comments on that?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=435">zzap</a> — Sun Feb 08, 2009 7:03 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Kurt]]></name></author>
<updated>2009-02-08T08:09:17+01:00</updated>
<published>2009-02-08T08:09:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1063#p1063</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1063#p1063"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1063#p1063"><![CDATA[
Update on the fix that was applied.<br /><br />The problem<br />The previous version did not properly detect OTPs generated within that same session where the Yubikey remains inserted in the USB slot. If the Yubikey was removed and then reinserted again and a new OTP is generated (most common use case) then OTPs from previous session were invalidated correctly and detected as replay attacks. However, for OTPs that were generated while the key remained inserted then OTPs within that session could be replayed without detection until next removal and insertion of the Yubikey. The reason was that the Yubikey counter for “session use” was not checked by the server. <br /><br />The fix<br />A SessionUse variable was added and is now checked by the server in order to properly detect replays of OTPs within the same session where the Yubikey remains inserted while generating OTPs during the session. <br /><br />The changes to the code can be reviewed following the links below.<br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubikey-server-j/source/detail?r=33#">http://code.google.com/p/yubikey-server ... tail?r=33#</a><!-- m --><br /><!-- m --><a class="postlink" href="http://code.google.com/p/yubikey-server-j/source/detail?r=34#">http://code.google.com/p/yubikey-server ... tail?r=34#</a><!-- m --><br /><br />Kurt L - Yubico Support<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=433">Kurt</a> — Sun Feb 08, 2009 8:09 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mgrennan]]></name></author>
<updated>2009-02-08T05:40:39+01:00</updated>
<published>2009-02-08T05:40:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1062#p1062</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1062#p1062"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1062#p1062"><![CDATA[
I can confirm this issue.  In January I posted these same findings to the Gibson Research Corporation NetNews system.  I have been concerned is issue is fixed.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=394">mgrennan</a> — Sun Feb 08, 2009 5:40 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ferrix]]></name></author>
<updated>2009-02-07T22:59:34+01:00</updated>
<published>2009-02-07T22:59:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1061#p1061</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1061#p1061"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1061#p1061"><![CDATA[
I agree this is a big deal.  But it ends up being a fast fix, so good.  I hope yubico goes into detail about how similar issues will be prevented.<br /><br />The yubikey hardware design is pretty outstanding and has proven very robust, and any applications that don't rely on the yubico internet server (or software) wouldn't even be affected by this issue.<br /><br />So the sky isn't totally falling here, even though it's certainly true that this is a big and embarrassing issue to be found.  Perhaps based on this 'unexpected success' of the service as described by Jakob, it would be time to institute some formal QA or some sort of validation process.  But at least the problem is handled with grace, openness and expedience.  An open source community can forgive a lot as long as the vendor continues to be an honest partner with us and diligently address concerns.<br /><br />(Edited to reflect new info evening of Feb 7)<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=162">ferrix</a> — Sat Feb 07, 2009 10:59 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ryan]]></name></author>
<updated>2009-02-07T21:25:40+01:00</updated>
<published>2009-02-07T21:25:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1060#p1060</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1060#p1060"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1060#p1060"><![CDATA[
The Yubikey idea is really great, I wouldn't be here otherwise. I love that its not costly and it is something even my wife could use. The fact that the software is open-source also gives you an advantage over other OTP products. That said, I would like to see the software side of things managed better and with more structure. I'm sure your resources are limited, but if we could have a mailing list or forum board dedicated to the development of the authentication server that would be great. If you setup a QA/test server I would be willing to help test fixes (and I'm sure others would as well). One benefit of your quick growth is that you will have a bigger community to help with fixes, testing, etc. Of course we will also find bugs and scrutinize as well. This is all good and can and should lead to a better product if you let it.<br /><br />Again, my concern is not so much about the software, I can fix that. My concern is the stability of Yubico as a company. How is the company doing? Will you be around in 2,5,10 years? I could potentially be purchasing quite a few Yubikeys for clients, but I need to know I am not leading them down the wrong path. If Yubico is ever in danger it would be nice to have the hardware specifications for the Yubikey released openly. Anyway, these questions probably belong in the &quot;Other Questions&quot; board.<br /><br />Thanks for looking into the issue. If we decide to go with Yubikeys I will make sure to contribute whatever I can to the software.<br /><br />Thanks.<br />Ryan<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=425">ryan</a> — Sat Feb 07, 2009 9:25 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[zzap]]></name></author>
<updated>2009-02-07T17:55:53+01:00</updated>
<published>2009-02-07T17:55:53+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1058#p1058</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1058#p1058"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1058#p1058"><![CDATA[
And the fix is just slapped in there, with no regression testing at all. And no new test cases. (See <!-- m --><a class="postlink" href="http://code.google.com/p/yubikey-server-j/source/diff?spec=svn33&amp;r=33&amp;format=side&amp;path=/trunk/test/VerifyTests.java">http://code.google.com/p/yubikey-server ... Tests.java</a><!-- m -->)<br /><br />How do you know that you're not opening up another can of worms? How do you have *any* idea that you've fully fixed the problem?<br /><br />Looking at how changes are made, for example, <br />in <!-- m --><a class="postlink" href="http://code.google.com/p/yubikey-server-j/source/detail?spec=svn34&amp;r=32">http://code.google.com/p/yubikey-server ... svn34&amp;r=32</a><!-- m -->, with its commenting out of code to support new firmware while disintegrating older firmware + total absence of testing of the fix doesn't exactly inject a lot of confidence going forward.<br /><br />Come on, you can do better!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=435">zzap</a> — Sat Feb 07, 2009 5:55 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2009-02-07T11:22:10+01:00</updated>
<published>2009-02-07T11:22:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1056#p1056</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1056#p1056"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1056#p1056"><![CDATA[
This is a serious issue indeed and it is being fixed right now. It is certainly embarrassing and I understand everyone who gets upset that such a thing could happen.<br /><br />I feel it is important to say that the current sever was initially designed as a &quot;proof of concept&quot; for trials and evaluation only. We were actually taken a bit by surprise that the service quickly became popular and that several people and organizations wanted to use it right away. <br /><br />We have got several questions about availability/uptime, redundancy, security, physical protection, QA, auditing etc. and have therefore initiated the &quot;next generation server&quot; development project where we'll offer a premium service rather than just a &quot;best effort&quot; service. This service is targeted for launch at March 1st.<br /><br />So we kindly ask everyone for a bit of patience. We'll ensure that this bug gets fixed now and keep your eyes open for the new service.<br /><br />With the best regards,<br /><br />Jakob E<br />Hardware- and firmware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Sat Feb 07, 2009 11:22 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Kurt]]></name></author>
<updated>2009-02-07T09:14:00+01:00</updated>
<published>2009-02-07T09:14:00+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1055#p1055</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1055#p1055"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1055#p1055"><![CDATA[
The bug has been isolated…<br /><br />This is a description of what occurs. <br />OTP replays are currently not detected within the same session when a YubiKey is inserted in the USB port. But if the key is removed and reinserted between OTP generations (as with most normal usage), then any old OTPs generated during earlier sessions cannot be replayed .<br /><br />Example: If a user inserts a YubiKey, and generates OTP 1, OTP 2, OTP 3 and again replays OTP 1 and/or OTP 2 in the same key insertion session (i.e. without removing and reinserting the Yubikey) the replay is not detected and a positive authentication response is generated. However, if the user removes and reinserts the YubiKey in the USB port (most normal usage) and generates OTP4 and then try to replay any of OTP 1 through OTP 3, they will be detected as replay and a negative authentication response will be generated.<br /><br />Key inserted first time<br />OTP1 (Accepted in any order within same key insertion)<br />OTP2 (Accepted in any order within same key insertion)<br />OTP3 (Accepted in any order within same key insertion)<br />Key removed <br /><br />Key Inserted the second time<br />OTP4 (Once OTP4 is used - then any of the OTP 1 though 3 are detected as replay attacks)<br />Key removed<br /><br />Key Inserted the third time<br />OTP5 (Once OTP5 is used - then any of the OTP 1 through 4 are detected as replay attacks)<br />Key removed<br /><br />A fix has been identified and is currently being tested. More info to come after testing is complete.<br /><br />Kurt L. Yubico Support.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=433">Kurt</a> — Sat Feb 07, 2009 9:14 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[JohnK]]></name></author>
<updated>2009-02-07T09:00:21+01:00</updated>
<published>2009-02-07T09:00:21+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1054#p1054</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1054#p1054"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1054#p1054"><![CDATA[
<div class="quotetitle">ryan wrote:</div><div class="quotecontent"><br />Any word on this issue? Do you guys have a formal test/QA process? Do you run the latest opensourced version of the server?<br /><br />.........<br /><br />I understand that Yubico is a startup, but these are the questions my management will be asking me and I need to be able to justify our use of yubikeys.<br /><br />Thanks<br />Ryan<br /></div><br /><br />Guys, be patient! This is the nature of open source and start-ups. Especially in Yubico everyone is working part-time (I met them in the Identity conference). Staff seems to be in India as I just found (<!-- m --><a class="postlink" href="http://www.networkmarvels.com/contact.html">http://www.networkmarvels.com/contact.html</a><!-- m -->).<br /><br />Everyone is doing their best with their part-time effort. But just like MySQL, it takes time to mature.<br /><br />Good job<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=434">JohnK</a> — Sat Feb 07, 2009 9:00 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Dick]]></name></author>
<updated>2009-02-07T07:27:51+01:00</updated>
<published>2009-02-07T07:27:51+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1053#p1053</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1053#p1053"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1053#p1053"><![CDATA[
By my calculations, it was the middle of the night in Sweden when JakobE posted his message in this thread.  I'd be very surprised if we don't see a prompt response.<br /><br />Dick<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=359">Dick</a> — Sat Feb 07, 2009 7:27 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ryan]]></name></author>
<updated>2009-02-07T06:41:49+01:00</updated>
<published>2009-02-07T06:41:49+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=251&amp;p=1052#p1052</id>
<link href="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1052#p1052"/>
<title type="html"><![CDATA[Re: Reusing OTP passwords]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=251&amp;p=1052#p1052"><![CDATA[
Any word on this issue? Do you guys have a formal test/QA process? Do you run the latest opensourced version of the server?<br /><br />The company I work for is trying to find good solutions for 2 factor authentication and I recommended we try Yubikeys. We will run our own authentication server, but it is still important to us that Yubico act responsibly and securely. It would be a shame to ask our customers to use Yubikeys only to see Yubico have major issues or go out of business. I understand the occasional bug, but this is fairly significant issue and it does not seem to be high-priority.<br /><br />I understand that Yubico is a startup, but these are the questions my management will be asking me and I need to be able to justify our use of yubikeys.<br /><br />Thanks<br />Ryan<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=425">ryan</a> — Sat Feb 07, 2009 6:41 am</p><hr />
]]></content>
</entry>
</feed>