<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=1846" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-04-24T14:58:48+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=1846</id>
<entry>
<author><name><![CDATA[noko]]></name></author>
<updated>2015-04-24T14:58:48+01:00</updated>
<published>2015-04-24T14:58:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7244#p7244</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7244#p7244"/>
<title type="html"><![CDATA[Re: openpgp applet vulnerability : how to update ?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7244#p7244"><![CDATA[
DELETED<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3675">noko</a> — Fri Apr 24, 2015 2:58 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2015-04-24T13:16:45+01:00</updated>
<published>2015-04-24T13:16:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7243#p7243</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7243#p7243"/>
<title type="html"><![CDATA[Re: openpgp applet vulnerability : how to update ?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7243#p7243"><![CDATA[
<div class="quotetitle">zviratko wrote:</div><div class="quotecontent"><br />WTH!<br /><br />This makes the applet completely worthless - anyone with physical access to the token can sign on my behalf, this completely defeats the purpose (which is NOT only to make the key unextractable, but to block the card if someone tries to break the PIN and make it worthless without it).<br /><br />I will demand either an upgrade path or a token replacement.<br /></div><br /><br />Sounds like token replacement is the way to go. If you provide the information needed, Yubico will do a swap:<br /><br /><!-- l --><a class="postlink-local" href="http://forum.yubico.com/viewtopic.php?f=26&amp;t=1852&amp;view=unread#p7240">viewtopic.php?f=26&amp;t=1852&amp;view=unread#p7240</a><!-- l --><br /><br />B<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Fri Apr 24, 2015 1:16 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[zviratko]]></name></author>
<updated>2015-04-24T08:35:10+01:00</updated>
<published>2015-04-24T08:35:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7241#p7241</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7241#p7241"/>
<title type="html"><![CDATA[Re: openpgp applet vulnerability : how to update ?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7241#p7241"><![CDATA[
WTH!<br /><br />This makes the applet completely worthless - anyone with physical access to the token can sign on my behalf, this completely defeats the purpose (which is NOT only to make the key unextractable, but to block the card if someone tries to break the PIN and make it worthless without it).<br /><br />I will demand either an upgrade path or a token replacement.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3463">zviratko</a> — Fri Apr 24, 2015 8:35 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[testic]]></name></author>
<updated>2015-04-22T12:13:35+01:00</updated>
<published>2015-04-22T12:13:35+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7224#p7224</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7224#p7224"/>
<title type="html"><![CDATA[Re: openpgp applet vulnerability : how to update ?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7224#p7224"><![CDATA[
and by the way, the security implication analysis in the security advisory severely downplays the impact :<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />In particular, any attacker with access to the local host must be assumed to be able to learn the user’s PIN code, simply by intercepting communication with the OpenPGP card hardware or through key logging.<br /></div><br />this is very misleading, as it implies the attacker would need a full compromise of the host to be able to exploid the vulnerability. A shared computer with unpriviledged users is _also_ a possible scenario.<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />Alternatively, if the attacker has physical proximity to the card, it could wait for the device to be used normally over NFC and then learn the PIN code wirelessly and perform the attack at a later point.<br /></div><br />This is clearly bad faith ! Someone could easily &quot;borrow&quot; a (seldom used) vulnerable yubikey and use it (for example) to sign a message and return it...<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />If an attacker has gone through the trouble of obtaining physical access to a key, the conservative approach is to regard it is possible that the attacker were able to learn the PIN earlier since the PIN is often unprotected.<br /></div><br />Same problem, it completely misses the &quot;borrowing&quot; attack.<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />However its practical consequences are relatively small as a successful attack requires other privileged operations (such as local root access) that are normally not available to an attacker, and would have undermined the security anyway.<br /></div><br /><br />I really think you're trying to downplay the vulnerability to avoid updates. Please explain us how we can fix it.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3668">testic</a> — Wed Apr 22, 2015 12:13 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[testic]]></name></author>
<updated>2015-04-22T12:03:31+01:00</updated>
<published>2015-04-22T12:03:31+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7222#p7222</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7222#p7222"/>
<title type="html"><![CDATA[openpgp applet vulnerability : how to update ?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1846&amp;p=7222#p7222"><![CDATA[
<!-- m --><a class="postlink" href="https://developers.yubico.com/ykneo-openpgp/SecurityAdvisory%202015-04-14.html">https://developers.yubico.com/ykneo-ope ... 04-14.html</a><!-- m --><br /><br />details the vulnerability in detail.<br /><br />I would like to fix my yubikey neo. Unfortunately, the applet keys are not known since I don't have a developer yubikey.<br /><br />How can I update ? And, most importantly, how will you manage updates in the future if a more serious vulnerability is discovered ?<br /><br />PS: how am I supposed to access the forum if I personalized my yubikey and removed the original keys ? I was lucky to have one untouched...<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3668">testic</a> — Wed Apr 22, 2015 12:03 pm</p><hr />
]]></content>
</entry>
</feed>