<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=5&amp;t=492" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2012-05-03T15:57:28+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=5&amp;t=492</id>
<entry>
<author><name><![CDATA[jamespo]]></name></author>
<updated>2012-05-03T15:57:28+01:00</updated>
<published>2012-05-03T15:57:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=3031#p3031</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=3031#p3031"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=3031#p3031"><![CDATA[
<div class="quotetitle">asq wrote:</div><div class="quotecontent"><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent">Nonetheless, Yubico regards the security of our customers as our highest priority and we are reviewing our processes and procedures for possible security issues.<br /></div><br /><br />simply doesn't seem to be true, at least in regard to this thread.</div><br /><br />Are you really a security professional, your posts in this thread indicate not?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1873">jamespo</a> — Thu May 03, 2012 3:57 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-05-05T15:44:45+01:00</updated>
<published>2010-05-05T15:44:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2192#p2192</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2192#p2192"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2192#p2192"><![CDATA[
<div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />Nonetheless, Yubico regards the security of our customers as our highest priority and we are reviewing our processes and procedures for possible security issues.<br /></div><br /><br />simply doesn't seem to be true, at least in regard to this thread.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Wed May 05, 2010 3:44 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[samir]]></name></author>
<updated>2010-05-05T15:40:40+01:00</updated>
<published>2010-05-05T15:40:40+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2191#p2191</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2191#p2191"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2191#p2191"><![CDATA[
This is an old issue. Yubico's official response to this can be found at the following link:<br /><br /><!-- l --><a class="postlink-local" href="http://forum.yubico.com/viewtopic.php?f=4&amp;t=396">viewtopic.php?f=4&amp;t=396</a><!-- l --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1076">samir</a> — Wed May 05, 2010 3:40 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-05-03T20:06:46+01:00</updated>
<published>2010-05-03T20:06:46+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2188#p2188</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2188#p2188"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2188#p2188"><![CDATA[
i think that i've found where the stable validation server has gone: <!-- m --><a class="postlink" href="http://maymay.net/blog/2008/09/01/yubikey-and-openid-two-great-tastes-that-taste-better-together/#comment-165583">http://maymay.net/blog/2008/09/01/yubik ... ent-165583</a><!-- m --><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Mon May 03, 2010 8:06 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-03-30T20:08:06+01:00</updated>
<published>2010-03-30T20:08:06+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2151#p2151</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2151#p2151"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2151#p2151"><![CDATA[
ok, maybe to clear it up a bit: i am not a coder. what is my role here (in my organization) is to evaluate your infrastructure and decide if - from the security perspective - it's suitable for us to use (ie. leverage our systems and overall security). what i came up with for now is that yubico could be trusted as yubikey token vendor (as algorithm is well documented and hardware attacks are not very feasible) and as a hosting-based provider (as long as non-SLA operation is not an issue) but as a server side solution it does not work so well - to paraphrase your words - it's a mess, and doesn't promise prompt and convincing enough security response if any other security concerns/issues will come up along the road.<br /><br />what we're going to do now, as a software company, is probably implementing our own framework around yubikeys that we can review internally and ultimately trust (or we go and patch your code if i couldn't get a budget to run another software project). however i guess that this is not the thing that we expected while buying a batch of yubikeys. of course the opensource nature of your infrastructure makes things a lots easier, but i wouldn't ever say that opensource in yubico should be considered synomous of DIY (but if it actually is, it should be fairly and clearly stated). after all - it's security infrastructure, in many ways critical to your customers. and there ARE opensource security products that you can trust, ie. openssl - stable and transparent enough that are able to survive any code/infrastructure audit and generate well feedback if there are issues.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Tue Mar 30, 2010 8:08 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2010-03-29T14:59:59+01:00</updated>
<published>2010-03-29T14:59:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2149#p2149</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2149#p2149"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2149#p2149"><![CDATA[
<div class="quotetitle">asq wrote:</div><div class="quotecontent"><br />i think that your thoughts/documentation might exceed what is actually existing within a code - in particular:<br /><br />- i cannot find a way to force HMAC for VAL =&gt; KSM communication<br /></div><br /><br />For VAL-&gt;KSM communication, I would recommend an encrypted+authenticated virtual network connection (TLS, SSH port forwarding, IPSEC, OpenVPN or similar).<br /><br /><div class="quotetitle">asq wrote:</div><div class="quotecontent"><br />- i cannot find a way to enforce HMAC between auth-client and VAL server (if i omit a key in request, VAL is *not* refusing to reply)<br /></div><br /><br />You are right that HMAC keying is optional.  If there is a need, this could easily be changed in the server code, so that HMAC is always required.<br /><br /><div class="quotetitle">asq wrote:</div><div class="quotecontent"><br />- i cannot find a way to make php-curl (used by VAL server) verify certs, thus i'm unable to secure VAL =&gt; KSM communication - no visible trace of <em>curl_setopt(..., CURLOPT_CAINFO, ...)</em> definition in project (i've been using this version: yubikey-val-2.1-0.5). actually it's even worse - the whole verification is deliberately turned off with: <em>ykval-synclib.php:      curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);</em><br /></div><br /><br />You could use any of the ideas above (TLS, SSH, etc), or help us improve the code here.<br /><br /><div class="quotetitle">asq wrote:</div><div class="quotecontent"><br />- i cannot find a way to make yubico-c-client (used ie. by pam_yubico module) verify certs, again - no trace of CURLOPT_CAINFO in ykclient library (versions used: ykclient-2.3 and pam_yubico-2.1)<br /></div><br /><br />It supports HMAC though.  Making it support HTTPS would be a very useful addition.<br /><br /><div class="quotetitle">asq wrote:</div><div class="quotecontent"><br />should i fork your code?<br /></div><br /><br />Please send a patch instead!  Most of our code is developed as a google code project, so you can easily find bug reports and even provide patches to implement some missing features.<br /><br /><div class="quotetitle">asq wrote:</div><div class="quotecontent"><br />i think hacking organization's dns is currently sufficient to break whole yubico infrastructure trust.<br /></div><br /><br />Hacking DNS will lead to a Denial-of-service, but to really do harm against properly configured clients I believe you need the server certificate private key or HMAC shared secrets.<br /><br />I hope these answers help a small bit.  We are aware that not all projects are in perfect condition (or, rather, I think you can find things to improve on all of our projects), but we hope that you and others will help us get things right in the long run.<br /><br />/Simon<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Mon Mar 29, 2010 2:59 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-03-29T10:00:45+01:00</updated>
<published>2010-03-29T10:00:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2147#p2147</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2147#p2147"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2147#p2147"><![CDATA[
i guess that it means &quot;no&quot;.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Mon Mar 29, 2010 10:00 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-03-23T16:42:03+01:00</updated>
<published>2010-03-23T16:42:03+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2137#p2137</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2137#p2137"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2137#p2137"><![CDATA[
what i'd like to know is if you're willing to address those issues. if yes - please state some time estimate. if no - fair enough, we'll just fork your code and get it working on our own.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Tue Mar 23, 2010 4:42 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-03-18T11:54:30+01:00</updated>
<published>2010-03-18T11:54:30+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2133#p2133</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2133#p2133"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2133#p2133"><![CDATA[
anyone?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Thu Mar 18, 2010 11:54 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-03-17T15:52:55+01:00</updated>
<published>2010-03-17T15:52:55+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2131#p2131</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2131#p2131"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2131#p2131"><![CDATA[
i think that your thoughts/documentation might exceed what is actually existing within a code - in particular:<br /><br />- i cannot find a way to force HMAC for VAL =&gt; KSM communication<br />- i cannot find a way to enforce HMAC between auth-client and VAL server (if i omit a key in request, VAL is *not* refusing to reply)<br />- i cannot find a way to make php-curl (used by VAL server) verify certs, thus i'm unable to secure VAL =&gt; KSM communication - no visible trace of <em>curl_setopt(..., CURLOPT_CAINFO, ...)</em> definition in project (i've been using this version: yubikey-val-2.1-0.5). actually it's even worse - the whole verification is deliberately turned off with: <em>ykval-synclib.php:      curl_setopt($ch, CURLOPT_SSL_VERIFYPEER, 0);</em><br />- i cannot find a way to make yubico-c-client (used ie. by pam_yubico module) verify certs, again - no trace of CURLOPT_CAINFO in ykclient library (versions used: ykclient-2.3 and pam_yubico-2.1)<br /><br />should i fork your code?<br /><br />i think hacking organization's dns is currently sufficient to break whole yubico infrastructure trust.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Wed Mar 17, 2010 3:52 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Simon]]></name></author>
<updated>2010-03-04T15:58:37+01:00</updated>
<published>2010-03-04T15:58:37+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2092#p2092</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2092#p2092"/>
<title type="html"><![CDATA[Re: API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2092#p2092"><![CDATA[
Either you provide the https URL and let curl handle X.509 server certification verification, or you use the HMAC approach.  The HMAC approach authenticates the client to the server and vice versa, assuming the HMAC key is kept secret.<br /><br />/Simon<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2">Simon</a> — Thu Mar 04, 2010 3:58 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[asq]]></name></author>
<updated>2010-03-03T18:45:19+01:00</updated>
<published>2010-03-03T18:45:19+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=492&amp;p=2091#p2091</id>
<link href="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2091#p2091"/>
<title type="html"><![CDATA[API SSL MITM attack]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=492&amp;p=2091#p2091"><![CDATA[
in API docs I can see:<br /><br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />If you use HTTPS to access Yubico's validation web service and you validate the Yubico server SSL certificate, you don't need to use the shared key to further authenticate response signatures from Yubico.<br /></div><br /><br />however when i look at (ie.) <div class="codetitle"><b>Code:</b></div><div class="codecontent">ykclient.c</div> code i cannot see any code responsible for certificate validation/verification and thus it makes it vulnerable to SSL MITM attack. <br /><br />alternatively i cannot see a way to make mutual HMAC authentication in API protocol.<br /><br />how do we avoid MITM then? should we use stunnel on all clients that connect to API?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=689">asq</a> — Wed Mar 03, 2010 6:45 pm</p><hr />
]]></content>
</entry>
</feed>