<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=4&amp;t=632" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2011-02-18T14:55:39+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=4&amp;t=632</id>
<entry>
<author><name><![CDATA[Redhatter]]></name></author>
<updated>2011-02-18T14:55:39+01:00</updated>
<published>2011-02-18T14:55:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=632&amp;p=2580#p2580</id>
<link href="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2580#p2580"/>
<title type="html"><![CDATA[Re: Challenge-response mode - FAQ]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2580#p2580"><![CDATA[
Ahh coolness, much appreciated. <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":-)" title="Smile" /><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1526">Redhatter</a> — Fri Feb 18, 2011 2:55 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Anonymous]]></name></author>
<updated>2011-02-17T08:46:16+01:00</updated>
<published>2011-02-17T08:46:16+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=632&amp;p=2577#p2577</id>
<link href="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2577#p2577"/>
<title type="html"><![CDATA[Re: Challenge-response mode - FAQ]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2577#p2577"><![CDATA[
The Python framework was announced in the yubico-devel Google group a couple of days ago :<br /><br />  <!-- m --><a class="postlink" href="http://groups.google.com/group/yubico-devel/browse_thread/thread/6731269c2686bb24">http://groups.google.com/group/yubico-d ... 9c2686bb24</a><!-- m --><br /><br />/Fredrik<p>Statistics: Posted by Guest — Thu Feb 17, 2011 8:46 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Redhatter]]></name></author>
<updated>2011-02-16T13:29:40+01:00</updated>
<published>2011-02-16T13:29:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=632&amp;p=2574#p2574</id>
<link href="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2574#p2574"/>
<title type="html"><![CDATA[Re: Challenge-response mode - FAQ]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2574#p2574"><![CDATA[
Another question for the list... Is there some documentation that describes how to trigger the challenge-response mode of the key?<br /><br />It's reassuring that a Python example is upcoming, but it'd be nice to be able to have a stab at implementing it myself in the meantime as a learning exercise. My intent is to extend or create a PAM module that can make use of the key without needing a second password field.  And no, a Windows-only library won't do when three of the computers I intend to run it on physically can't run Windows (due to them being non-x86 RISC architecture).<br /><br />So far though, loving these keys.  It's not something I would have directly sought myself, but seeing as one pretty much landed in my lap (everyone who attended linux.conf.au this year was given one) I've been seeing what I can do with them.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1526">Redhatter</a> — Wed Feb 16, 2011 1:29 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jakob]]></name></author>
<updated>2011-02-04T00:29:38+01:00</updated>
<published>2011-02-04T00:29:38+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=632&amp;p=2546#p2546</id>
<link href="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2546#p2546"/>
<title type="html"><![CDATA[Challenge-response mode - FAQ]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=632&amp;p=2546#p2546"><![CDATA[
We've got quite a few questions regarding the challenge-response mode which was introduced with Yubikey firmware 2.2. This gives a clue that our documentation on this subject is not up to what it should be. We'll see what we can do in this matter.<br /><br /><strong>What is it for ?</strong><br />We also call this &quot;unattended mode&quot; or &quot;dongle mode&quot;. With challenge-response mode, you can programmatically send a challenge to the Yubikey and then programmatically read a response from it. This allows a client application to interact with the Yubikey without user interaction and also allow for a background continous check if a token is present. This is useful in software- or service licensing settings among others.<br /><br /><strong>How does it work technically ?</strong><br />It works by the means that a client application sends out a challenge or a nonce. This challenge is cryptographically processed by the Yubikey and a response is sent back as a result fo this challenge.<br /><br /><strong>Okay, what &quot;cryptographic process&quot; is this ?</strong><br />It can be selected as either Yubico OTP compatible mode or HMAC-SHA1.<br /><br /><strong>How does the Yubico OTP compatible mode work ?</strong><br />A 6 byte challenge is sent to the Yubikey, which is exclusive-ORed with the current private ID. The Yubico OTP algorithm is then executed and the response being sent back is the 128-bit OTP.<br /><br /><strong>How does the HMAC-SHA1 mode work ?</strong><br />It takes a challenge block of 1-64 bytes and calculates a HMAC-SHA1 on this using the 160-bit secret stored in the Yubikey. The resulting 160-bit hash is sent back as a response. <br /><br /><strong>Why implement both algorithms ? Is one better than the other ?</strong><br />Depending on the setting, both have different benefits. The Yubico OTP generates a unique OTP even if the challenge vaires as the counters and random field is generate internally in the Yubikey. The HMAC-SHA1 operation by nature generates the same response every time for a given challenge. Software applications that repeatlvely verifies the presence of the Yubikey should use the HMAC-SHA1 operation with a counter or a random number as challenge as this gives unlimited usage time. With the Yubico OTP algorithm, there is a chance that a programmatic application could cause the counters to wrap, which is not practically possible in normal OTP usage.<br /><br /><strong>This means that an application can &quot;sneak in&quot; and exhcnage data with the the Yubikey without me noticing it ?</strong><br />Yes. If the setting finds it more appropriate, there is a configurable option to require a button confirmation in order for the response to be sent.<br /><br /><strong>Can I use this feature together with normal Yubico OTP or OATH-HOTP ?</strong>Yes - this is configured on a per-configuration basis. Normal setting when enabled is to use configuration #1 for a standard button generated OTP and configuration #2 for challenge-response.<br /><br /><strong>I don't want this stuff - can I turn this off ?</strong><br />It is off by default. You configure it to be enabled if you want this feature.<br /><br /><strong>Does this means that the Yubikey 2.2 now requires a driver to work ?</strong><br />No - the client needs the driver only if the challenge-response mode is used.<br /><br /><strong>You say &quot;driver&quot; - does this mean that I need to install a low-level driver, i.e WDM/ring 0 driver?</strong><br />It's a user-mode interface shim that communicates with the HID stack. No privilegied driver install is therefore needed. <br /><br /><strong>Ok, how can I try out this stuff before I make up my mind if this is useful ?</strong><br />We have a Windows COM/ActiveX-component that is provided with some programming examples and a test containter. <br />Download installer at <!-- m --><a class="postlink" href="http://static.yubico.com/var/uploads/files/Yubikey%20Client%20API%20Installer.msi">http://static.yubico.com/var/uploads/fi ... taller.msi</a><!-- m --><br />Separate documentation can be downloaded at <!-- m --><a class="postlink" href="http://static.yubico.com/var/uploads/pdfs/Yubikey%20Client%20COM%20API.pdf">http://static.yubico.com/var/uploads/pd ... %20API.pdf</a><!-- m --><br /><br /><strong>No version for Linux ?</strong><br />We have a Python library in the making which will be anounced shortly.<br /><br /><strong>How is this supported on the server side ?</strong><br />We have provided a server API library that can be used in conjunction with the client API. This library contains some other useful functions for OTP validation.<br />Download installer at <!-- m --><a class="postlink" href="http://static.yubico.com/var/uploads/files/Yubikey%20Server%20API%20Installer.msi">http://static.yubico.com/var/uploads/fi ... taller.msi</a><!-- m --><br />Separate documentation can be downloaded at <!-- m --><a class="postlink" href="http://static.yubico.com/var/uploads/pdfs/Yubikey%20Server%20COM%20API.pdf">http://static.yubico.com/var/uploads/pd ... %20API.pdf</a><!-- m --><br /><br /><br />With the best regards,<br /><br />JakobE<br />Hardware- and firmware guy @ Yubico<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=83">Jakob</a> — Fri Feb 04, 2011 12:29 am</p><hr />
]]></content>
</entry>
</feed>