<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=771" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2014-05-07T08:50:08+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=771</id>
<entry>
<author><name><![CDATA[fredericve]]></name></author>
<updated>2014-05-07T08:50:08+01:00</updated>
<published>2014-05-07T08:50:08+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=771&amp;p=5248#p5248</id>
<link href="https://forum.yubico.com/viewtopic.php?t=771&amp;p=5248#p5248"/>
<title type="html"><![CDATA[Re: Status of Yubikey and Kerberos]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=771&amp;p=5248#p5248"><![CDATA[
Hello Brian,<br /><br />Were you able to get something up and running? We are evaluating the use of yubikeys in our organization and would like to be able to use it as a 2nd factor to obtain kerberos tickets. I don't seem to find much resources on how to do this, apart from using PAM, but in that case, the pam_yubico module is providing the OTP validation and I would prefer that this is handled by the kerberos infrastructure.<br /><br />Thanks for any response,<br /><br />Frederic<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2903">fredericve</a> — Wed May 07, 2014 8:50 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brian_sm]]></name></author>
<updated>2012-03-20T13:25:37+01:00</updated>
<published>2012-03-20T13:25:37+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=771&amp;p=2972#p2972</id>
<link href="https://forum.yubico.com/viewtopic.php?t=771&amp;p=2972#p2972"/>
<title type="html"><![CDATA[Re: Status of Yubikey and Kerberos]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=771&amp;p=2972#p2972"><![CDATA[
I read it again and I see that the OTP plugin can use ykclient to authenticate, which uses the cloud service. ykclient is available in ubuntu in the &quot;libykclient-dev&quot; package and works fine.<br /><br />(Aside: ykclient requires me to provide a client ID but not a secret key. So it seems anyone can make an (unencrypted) auth request using anyone else's client ID. Also: if ykclient has a way to use the API secret key, I can't find it)<br /><br />Anyway... it looks like the bits are available, but now I need to work out what all this FAST armor stuff is about and how to use it to wrap the requests, probably using anonymous PKINIT:<br /><!-- m --><a class="postlink" href="http://k5wiki.kerberos.org/wiki/Pkinit_configuration">http://k5wiki.kerberos.org/wiki/Pkinit_configuration</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1987">brian_sm</a> — Tue Mar 20, 2012 1:25 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brian_sm]]></name></author>
<updated>2012-03-19T13:59:05+01:00</updated>
<published>2012-03-19T13:59:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=771&amp;p=2969#p2969</id>
<link href="https://forum.yubico.com/viewtopic.php?t=771&amp;p=2969#p2969"/>
<title type="html"><![CDATA[Status of Yubikey and Kerberos]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=771&amp;p=2969#p2969"><![CDATA[
What is the status of being able to use a Yubikey + cloud auth protocol for authentication with Kerberos?<br /><br />I don't mind having to run a patched KDC and/or a patched kinit. I'd rather not have patched libkrb5 on the servers being logged into, but I don't think it would be needed anyway (i.e. a Kerberos ticket is just a Kerberos ticket, regardless of how you obtained it)<br /><br />I found<br /><!-- m --><a class="postlink" href="http://wiki.yubico.com/wiki/index.php/YubiKeyIdeas#Simplified_Yubikey_for_Kerberos">http://wiki.yubico.com/wiki/index.php/Y ... r_Kerberos</a><!-- m --><br />which suggests that the draft for OTP authentication &quot;is not implemented at this time and will require client modifications&quot;<br /><br />However I also found something which suggests it's possible using an otp preauth plugin for Kerberos:<br /><!-- m --><a class="postlink" href="http://www.kerberos.org/events/2011conf-interop/2011slides/2011kerberos_linus_nordberg.pdf">http://www.kerberos.org/events/2011conf ... rdberg.pdf</a><!-- m --><br /><!-- m --><a class="postlink" href="https://www.nordu.net/~linus/INSTALL-krb5-fast-otp.html">https://www.nordu.net/~linus/INSTALL-krb5-fast-otp.html</a><!-- m --><br />This tells you to use ykpersonalize to wipe your yubikey. I would prefer to use the cloud auth service, as it makes the token useful across a wider range of services.<br /><br />There's also<br /><!-- m --><a class="postlink" href="https://twiki.cern.ch/twiki/bin/view/Main/Yubikeys">https://twiki.cern.ch/twiki/bin/view/Main/Yubikeys</a><!-- m --><br />but it seems to imply that you ssh into a machine, use Yubikey+pam to authenticate, and somehow get your kerberos ticket out of sshd.  I can't see how it works, and in any case I'd prefer to kinit with yubikey and then ssh using my kerberos ticket.<br /><br />So I'd be grateful for an overview of what's possible today, and any info on how to do it.<br /><br />Thanks,<br /><br />Brian.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1987">brian_sm</a> — Mon Mar 19, 2012 1:59 pm</p><hr />
]]></content>
</entry>
</feed>