<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=12&amp;t=1294" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-01-27T12:49:00+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=12&amp;t=1294</id>
<entry>
<author><name><![CDATA[argine99]]></name></author>
<updated>2014-01-27T12:49:00+01:00</updated>
<published>2014-01-27T12:49:00+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4885#p4885</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4885#p4885"/>
<title type="html"><![CDATA[Re: [SUGGESTION] relax size limit in Challenge-Response mode]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4885#p4885"><![CDATA[
Our use case would be to use a Yubikey for challenge/response authentication, similar to existing HMAC-SHA1, but with the OCRA standard, integrating with existing backends in such a way that yubikey can be used as a device to safely store the secret key used in the OCRA algorithm.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2774">argine99</a> — Mon Jan 27, 2014 12:49 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom]]></name></author>
<updated>2014-01-22T09:49:28+01:00</updated>
<published>2014-01-22T09:49:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4856#p4856</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4856#p4856"/>
<title type="html"><![CDATA[Re: [SUGGESTION] relax size limit in Challenge-Response mode]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4856#p4856"><![CDATA[
No, i don't think that would be possible however I will double check with our hardware guy.<br /><br />Anyway, what would be the use case, especially for the Yubikey?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2195">Tom</a> — Wed Jan 22, 2014 9:49 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[argine99]]></name></author>
<updated>2014-01-21T18:57:21+01:00</updated>
<published>2014-01-21T18:57:21+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4850#p4850</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4850#p4850"/>
<title type="html"><![CDATA[Re: [SUGGESTION] relax size limit in Challenge-Response mode]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4850#p4850"><![CDATA[
Thanks Tom,<br /><br />Thanks for your answer.<br />But wouldn't it be possible to provide an update function that would feed the hmac function with 64 bytes at a time?<br />Similar to the way you would program it in python, for instance:<br /><br />import hashlib<br />import hmac<br />msg='OCRA-1:HOTP-SHA1-6:QN08'<br />msg += '\0'<br />msg += 128*'\0'<br />h=hmac.new(&quot;12345678901234567890&quot;, msg[0:64], hashlib.sha1)<br />h.update(msg[64:128])<br />h.update(msg[128:192])<br />print h.hexdigest()<br /><br />Does the YubiHSM have a similar limit on its hmac-sha1 implementation?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2774">argine99</a> — Tue Jan 21, 2014 6:57 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom]]></name></author>
<updated>2014-01-20T08:15:10+01:00</updated>
<published>2014-01-20T08:15:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4832#p4832</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4832#p4832"/>
<title type="html"><![CDATA[Re: [SUGGESTION] relax size limit in Challenge-Response mode]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4832#p4832"><![CDATA[
Good Point. However, the current implementation of the HMAC-SHA1 would make it very difficult to expand beyond 64 bytes, as this is the input transaction buffer size.<br /><br />We might consider that at a later stage, but it is a substantial rework.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2195">Tom</a> — Mon Jan 20, 2014 8:15 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[argine99]]></name></author>
<updated>2014-01-17T14:40:24+01:00</updated>
<published>2014-01-17T14:40:24+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4827#p4827</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4827#p4827"/>
<title type="html"><![CDATA[[SUGGESTION] relax size limit in Challenge-Response mode]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1294&amp;p=4827#p4827"><![CDATA[
Why is there a 64 byte limit for challenges when using the yubikey in Challenge-Response mode?<br />I can understand that some limit is necessary, but the 64 byte restriction seems a bit arbitrary?<br /><br />I would like to use a yubikey for implementing an OCRA-based challenge response solution, as specified by the OATH initiative - see <!-- m --><a class="postlink" href="http://tools.ietf.org/rfc/rfc6287.txt">http://tools.ietf.org/rfc/rfc6287.txt</a><!-- m -->.<br />The OCRA algorithm is basically an HMAC-SHA1 over some input data (challenge).  See section 5.1 in RFC 6287.<br /><br />For instance, using the  first test vector from section C.1, if the secret key is the Standard 20Byte hex key: 3132333435363738393031323334353637383930 and the OCRA suite is &quot;OCRA-1:HOTP-SHA1-6:QN08&quot; (see section 6), the challenge question &quot;00000000&quot; will yield an input of 152 bytes:<br /><br />$ (echo -n OCRA-1:HOTP-SHA1-6:QN08; echo -ne '\0'; for i in {1..128}; do echo -ne &quot;\0&quot;; done) | wc -c<br />     152<br /><br />The response calculation would be:<br /><br />$ (echo -n OCRA-1:HOTP-SHA1-6:QN08; echo -ne '\0'; for i in {1..128}; do echo -ne &quot;\0&quot;; done) | openssl sha1 -hmac &quot;12345678901234567890&quot; -c<br />(stdin)= 34:1b:ce:d5:b6:aa:2e:b0:9f:34:d9:3a:06:3c:b5:77:f0:5e:b1:10<br /><br />where (in this particular case), the first 4 bytes are selected to arive at an OTP:<br /><br />$ printf &quot;%d&quot; 0x341bced5 | tail -c6<br />237653<br /><br />The HMAC-SHA1 calculation could perfectly be performed using a yubikey, if only the input size limit would be lifted a bit:<br /><br />$ (echo -n OCRA-1:HOTP-SHA1-6:QN08; echo -ne '\0'; for i in {1..128}; do echo -ne &quot;\0&quot;; done) | xxd -p -c256 | xargs ykchalresp -2<br />Yubikey core error: wrong size<br /><br />So, I'd like you to consider this a feature request <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":-)" title="Smile" /><br /><br />Cheers,<br /><br />- Joost<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2774">argine99</a> — Fri Jan 17, 2014 2:40 pm</p><hr />
]]></content>
</entry>
</feed>