<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=35&amp;t=2386" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-08-29T02:43:38+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=35&amp;t=2386</id>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-08-29T02:43:38+01:00</updated>
<published>2016-08-29T02:43:38+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8919#p8919</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8919#p8919"/>
<title type="html"><![CDATA[Re: YubiKey 4 and yubico-piv-tool]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8919#p8919"><![CDATA[
<div class="quotetitle">ChrisHalos wrote:</div><div class="quotecontent"><br />Max RSA on PIV is still currently 2048 (covered in NIST Special Publication 800-53, believe the newest public version is revision 4).<br /></div><br />Even on YubiKey 4? It won't take/generate 3072-bit RSA keys? That's a pity. It's NIST SP 800-73, and yes - the latest revision is 4 (as I understand, YubiKey implements Rev 3).<br /><br /><div class="quotetitle">ChrisHalos wrote:</div><div class="quotecontent"><br />You're most likely correct on that front (CCC in OSX). I will chat with the developer who wrote the instructions and see about updating the steps.<br /></div><br />Thank you. But it's not &quot;most likely&quot; (verified by extensive testing against OpenSC.tokend, Thursby PKard, and Centrify Express), and it's not &quot;in OSX&quot; (as Windows-8 did not like this token at all until CCC was set up). Maybe you can squeak by on Linux with &quot;bare&quot; OpenSC, I haven't tried that.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Mon Aug 29, 2016 2:43 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-08-22T16:57:25+01:00</updated>
<published>2016-08-22T16:57:25+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8896#p8896</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8896#p8896"/>
<title type="html"><![CDATA[Re: YubiKey 4 and yubico-piv-tool]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8896#p8896"><![CDATA[
Max RSA on PIV is still currently 2048 (covered in NIST Special Publication 800-53, believe the newest public version is revision 4).<br /><br />You're most likely correct on that front (CCC in OSX). I will chat with the developer who wrote the instructions and see about updating the steps.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Mon Aug 22, 2016 4:57 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mouse008]]></name></author>
<updated>2016-08-21T04:47:56+01:00</updated>
<published>2016-08-21T04:47:56+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8893#p8893</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8893#p8893"/>
<title type="html"><![CDATA[Re: YubiKey 4 and yubico-piv-tool]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8893#p8893"><![CDATA[
<div class="quotetitle">ChrisHalos wrote:</div><div class="quotecontent"><br />(2) That's correct, the PIV specification doesn't list 4096 RSA as a supported algorithm, so the PIV Tool and PIV Manager do not support it either. If NIST adds this as a supported algorithm, we will update both tools to support it as well (obviously only on the YK4, the NEO cannot handle 4096).<br /></div><br />Could you clarify - what's the largest RSA key that YubiKey 4 can support <strong>now</strong>? And that PIV Manager supports too?<br /><br /><div class="quotetitle">ChrisHalos wrote:</div><div class="quotecontent"><br />(3) I'm not sure, but I can check with the development team. OS X code signing, for example, requires both 9a and 9c (<!-- m --><a class="postlink" href="https://developers.yubico.com/yubico-piv-tool/OS_X_code_signing.html">https://developers.yubico.com/yubico-pi ... gning.html</a><!-- m -->)<br /></div><br />Chris, the URL you referred to provides incomplete information. First, you need to add not only CHUID, but also CCC, which can be done with<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">yubico-piv-tool -a set-chuid -a set-ccc</div><br />Second, standard OpenSC tokend is not likely to work properly - you need an OpenSC fork <a href="https://github.com/mouse07410/OpenSC.tokend.git" class="postlink">https://github.com/mouse07410/OpenSC.tokend.git</a><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4029">mouse008</a> — Sun Aug 21, 2016 4:47 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rgurley]]></name></author>
<updated>2016-08-08T04:20:55+01:00</updated>
<published>2016-08-08T04:20:55+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8859#p8859</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8859#p8859"/>
<title type="html"><![CDATA[Re: YubiKey 4 and yubico-piv-tool]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8859#p8859"><![CDATA[
1) Okay, I tried again. I should clarify, the part where I fail is trying to extract the key for ssh once importing the certificate<br /><br />ssh-keygen -D /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so -e -v<br />debug1: manufacturerID &lt;OpenSC (<!-- w --><a class="postlink" href="http://www.opensc-project.org">www.opensc-project.org</a><!-- w -->)&gt; cryptokiVersion 2.20 libraryDescription &lt;Smart card PKCS#11 API&gt; libraryVersion 0.0<br />debug1: label &lt;PIV_II (PIV Card Holder pin)&gt; manufacturerID &lt;piv_II&gt; model &lt;PKCS#15 emulate&gt; serial &lt;my serial number?&gt; flags 0x40d<br />C_GetAttributeValue failed: 18<br />debug1: X509_get_pubkey failed or no rsa<br />no keys<br /><br />Looking at the man pages I see<br /><br />     -D pkcs11<br />             Download the RSA public keys provided by the PKCS#11 shared<br />             library pkcs11.  When used in combination with -s, this option<br />             indicates that a CA key resides in a PKCS#11 token (see the<br />             CERTIFICATES section for details).<br /><br />Based on that it seems ssh-keygen assumes RSA here. I'm going to dig around a bit more looking for a way to get eccp384 to work, but if that fails, I'll just use the rsa2048.<br /><br />2) Okay, that makes sense.<br /><br />3) Thanks, I look forward to clarification.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4411">rgurley</a> — Mon Aug 08, 2016 4:20 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-08-05T00:40:08+01:00</updated>
<published>2016-08-05T00:40:08+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8844#p8844</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8844#p8844"/>
<title type="html"><![CDATA[Re: YubiKey 4 and yubico-piv-tool]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8844#p8844"><![CDATA[
(1) OpenSSH 5.7 and should be able to accept ECC P-384 keys<br /><br />(2) That's correct, the PIV specification doesn't list 4096 RSA as a supported algorithm, so the PIV Tool and PIV Manager do not support it either. If NIST adds this as a supported algorithm, we will update both tools to support it as well (obviously only on the YK4, the NEO cannot handle 4096).<br /><br />(3) I'm not sure, but I can check with the development team. OS X code signing, for example, requires both 9a and 9c (<!-- m --><a class="postlink" href="https://developers.yubico.com/yubico-piv-tool/OS_X_code_signing.html">https://developers.yubico.com/yubico-pi ... gning.html</a><!-- m -->)<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Fri Aug 05, 2016 12:40 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[rgurley]]></name></author>
<updated>2016-08-04T16:41:09+01:00</updated>
<published>2016-08-04T16:41:09+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8836#p8836</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8836#p8836"/>
<title type="html"><![CDATA[YubiKey 4 and yubico-piv-tool]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2386&amp;p=8836#p8836"><![CDATA[
I have three questions related to setting up a YubiKey 4 with the yubico-piv-tool.<br /><br />1) I tried to use ECCP384 on my 9a slot, but ssh was not successful. Is it possible to configure openssh to accept ECCP384, or am I limited to RSA keys if I want to use the key for ssh authentication?<br /><br />2) The PIV tool seems unable to generate 4096 bit RSA keys. Are the piv slots limited to 2048 bit keys or is this a limitation of the yubico-piv-tool?<br /><br />3) In the instructions for configuring the key for Android code signing (<!-- m --><a class="postlink" href="https://developers.yubico.com/yubico-piv-tool/Android_code_signing.html">https://developers.yubico.com/yubico-pi ... gning.html</a><!-- m -->) indicate slot 9a is to be used. However, the information on certificate slots (<!-- m --><a class="postlink" href="https://developers.yubico.com/PIV/Introduction/Certificate_slots.html">https://developers.yubico.com/PIV/Intro ... slots.html</a><!-- m -->) indicate slot 9c is for &quot;signing files and executables.&quot; Is the slot used in the Android instructions incorrect?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4411">rgurley</a> — Thu Aug 04, 2016 4:41 pm</p><hr />
]]></content>
</entry>
</feed>