<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=12&amp;t=2343" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-11-18T14:34:02+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=12&amp;t=2343</id>
<entry>
<author><name><![CDATA[My1]]></name></author>
<updated>2016-11-18T14:34:02+01:00</updated>
<published>2016-11-18T14:34:02+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2343&amp;p=9159#p9159</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2343&amp;p=9159#p9159"/>
<title type="html"><![CDATA[Re: [S!] Why use OTP or U2F with local password managers?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2343&amp;p=9159#p9159"><![CDATA[
The only problem is that using HOTP for crypto means you have a SERIOUS Problem if you desync.<br />and aside from that that's not how OTP normally works, although it is an intresting kind of system abuse.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4175">My1</a> — Fri Nov 18, 2016 2:34 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ausi]]></name></author>
<updated>2016-07-03T16:15:54+01:00</updated>
<published>2016-07-03T16:15:54+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2343&amp;p=8757#p8757</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2343&amp;p=8757#p8757"/>
<title type="html"><![CDATA[Re: [Q] Why use OTP or U2F with local password managers?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2343&amp;p=8757#p8757"><![CDATA[
If anybody else has the same question, I found the answer in the KeePass Forum<br /><!-- m --><a class="postlink" href="https://sourceforge.net/p/keepass/discussion/329220/thread/8b1d33f7/#af0d">https://sourceforge.net/p/keepass/discu ... 33f7/#af0d</a><!-- m --><br /><br />This applies at least for HOTP. I think, using U2F to secure a local password database is no good idea.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4368">ausi</a> — Sun Jul 03, 2016 4:15 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ausi]]></name></author>
<updated>2016-07-03T16:18:18+01:00</updated>
<published>2016-06-13T18:42:20+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2343&amp;p=8710#p8710</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2343&amp;p=8710#p8710"/>
<title type="html"><![CDATA[[S!] Why use OTP or U2F with local password managers?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2343&amp;p=8710#p8710"><![CDATA[
Hi all,<br /><br />there is something I do not understand regarding the usage of OTP (HOTP/TOTP) or U2F along with local password managers. With local I mean the program is running on your local machine and the database-file is also stored on your local machine.<br />A use-case with KeePass is described here: <!-- m --><a class="postlink" href="https://www.yubico.com/why-yubico/for-individuals/password-managers/keepass/">https://www.yubico.com/why-yubico/for-i ... s/keepass/</a><!-- m --><br /><br />As the database-file is stored encrypted on the local machine, the password manager needs to get information about the encryption key from somewhere. The key itself or some information it can derive the key from.<br />As the authentication through OTP or U2F does not bring in any information about the encryption key, I assume the password manager must store the encryption key also on the local machine. At least as long you do not specify a additional master password, what doesn't seems to be the case in the mentioned KeePass tutorial.<br />So an attacker would &quot;simply&quot; extract the encryption key from the local password manager program and decrypt the database-file.<br /><br />Even if you use a master password (from which probably the encryption key will be derived), OTP or U2F would not give you more security. With the master password and the data on the local machine all the information is there to do the encryption. An attacker could modify the password manager program to skip authentication. So, no need for the YubiKey to access the database.<br /><br />What am I missing?<br />Thanks in advance to help me understanding OTP or U2F authentication on local password managers.<br />Hans<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4368">ausi</a> — Mon Jun 13, 2016 6:42 pm</p><hr />
]]></content>
</entry>
</feed>