<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=35&amp;t=2422" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-09-15T16:30:19+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=35&amp;t=2422</id>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-09-15T16:30:19+01:00</updated>
<published>2016-09-15T16:30:19+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2422&amp;p=9005#p9005</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=9005#p9005"/>
<title type="html"><![CDATA[Re: Security risks with temporary access to a Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=9005#p9005"><![CDATA[
There is no way to determine if additional OTPs were generated between the last successful authentication<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Thu Sep 15, 2016 4:30 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[genealogyxie]]></name></author>
<updated>2016-09-15T01:58:34+01:00</updated>
<published>2016-09-15T01:58:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2422&amp;p=9002#p9002</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=9002#p9002"/>
<title type="html"><![CDATA[Re: Security risks with temporary access to a Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=9002#p9002"><![CDATA[
Would there be a way to find out if an OTP was generated without being used yet?<br /><br />I'm assuming that the OTP is only verified through a Yubico server or some central server on the Internet?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4302">genealogyxie</a> — Thu Sep 15, 2016 1:58 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-09-13T15:43:11+01:00</updated>
<published>2016-09-13T15:43:11+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2422&amp;p=8992#p8992</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=8992#p8992"/>
<title type="html"><![CDATA[Re: Security risks with temporary access to a Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=8992#p8992"><![CDATA[
I assume you're referring to...<br /><br />HMAC-SHA1 Challenge-Response (Windows Login) - No, Challenge-Response doesn't emit any text like OTP does, and the secrets can't be read off the YubiKey.<br /><br />Yubico OTP (LastPass) - Yes and no, depending on the use case. Yes, if someone gets your YubiKey and sends an OTP to to their e-mail (for example), they could use this later UNLESS you have validated again since the OTP was generated. Validating a newly generated OTP invalidates all previously generated OTP. <br /><br />So basically, if you believe someone might have grabbed an OTP, just go to demo.yubico.com as soon as possible and test single-factor. Running this test will invalidate any previously generated OTPs.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Tue Sep 13, 2016 3:43 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[genealogyxie]]></name></author>
<updated>2016-09-13T13:09:33+01:00</updated>
<published>2016-09-13T13:09:33+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2422&amp;p=8991#p8991</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=8991#p8991"/>
<title type="html"><![CDATA[Security risks with temporary access to a Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2422&amp;p=8991#p8991"><![CDATA[
Could a potential attacker be able to store the output from a Yubikey that he would temporarily have in his possession and then use that output to login into a Bitlocker-protected Windows 10 machine with the Yubikey login tool?<br /><br />What about storing an OTP for later use to authenticate other things like Lastpass?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4302">genealogyxie</a> — Tue Sep 13, 2016 1:09 pm</p><hr />
]]></content>
</entry>
</feed>