<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=633" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2011-02-16T13:16:39+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=633</id>
<entry>
<author><name><![CDATA[Redhatter]]></name></author>
<updated>2011-02-16T13:16:39+01:00</updated>
<published>2011-02-16T13:16:39+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=633&amp;p=2573#p2573</id>
<link href="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2573#p2573"/>
<title type="html"><![CDATA[Re: HUGE security vulnerability with Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2573#p2573"><![CDATA[
Yep, simple solution.  I did this with my OpenID server, the patch for it has been sent to the Community-ID bug tracker.<br /><br />Basically when you register for Community-ID, you initially do it using password authentication.  Then, when you've activated the account you have the option of enabling YubiKey authentication (single-factor).  I extended this to provide two-factor... the prefix of the key for each user is in the database, it takes the length of this, adds 32 to it, and feeds that into substr a couple of times to split user password from OTP.<br /><br />I'll probably look into doing this with YubiPAM if I can't get challenge-response auth going, as this will allow two-factor authentication with slightly-broken PAM clients such as KDM.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1526">Redhatter</a> — Wed Feb 16, 2011 1:16 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jafo_Jeeper]]></name></author>
<updated>2011-02-05T19:06:09+01:00</updated>
<published>2011-02-05T19:06:09+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=633&amp;p=2557#p2557</id>
<link href="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2557#p2557"/>
<title type="html"><![CDATA[Re: HUGE security vulnerability with Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2557#p2557"><![CDATA[
Excellent idea, why didn't I think of this- we do it at work with our Verisign keys.<br /><br />Yep, huge brainfart there. Thanks!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1528">Jafo_Jeeper</a> — Sat Feb 05, 2011 7:06 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ferrix]]></name></author>
<updated>2011-02-05T17:14:02+01:00</updated>
<published>2011-02-05T17:14:02+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=633&amp;p=2556#p2556</id>
<link href="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2556#p2556"/>
<title type="html"><![CDATA[Re: HUGE security vulnerability with Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2556#p2556"><![CDATA[
To add a cheap second factor in cases like truecrypt that need a static password, there is a very easy way.<br /><br />Type in a PIN code first before tapping the yubikey.  Now each part (PIN, yubikey) is useless without the other, because the real truecrypt password is a combination of them.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=162">ferrix</a> — Sat Feb 05, 2011 5:14 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jafo_Jeeper]]></name></author>
<updated>2011-02-05T16:55:34+01:00</updated>
<published>2011-02-05T16:55:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=633&amp;p=2555#p2555</id>
<link href="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2555#p2555"/>
<title type="html"><![CDATA[Re: HUGE security vulnerability with Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2555#p2555"><![CDATA[
I know security engineering, thank you very much... not all of it, but none of us know everything. <br /><br />Here's the thing- with Truecrypt, to use the Yubikey as the pass to an encrypted volume, it can store and submit a 64-digit static password.<br /><br />That static password is, hello, static.<br /><br />There is nothing else required to decrypt the system partition in the case of an encrypted system partition- no username, other password, nothing.<br /><br />therefore, anyone that can lay hands on that yubikey and insert it in the USB slot on that machine can decrypt the volume.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1528">Jafo_Jeeper</a> — Sat Feb 05, 2011 4:55 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[andlil]]></name></author>
<updated>2011-02-05T09:44:59+01:00</updated>
<published>2011-02-05T09:44:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=633&amp;p=2551#p2551</id>
<link href="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2551#p2551"/>
<title type="html"><![CDATA[Re: HUGE security vulnerability with Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2551#p2551"><![CDATA[
<div class="quotetitle">Jafo_Jeeper wrote:</div><div class="quotecontent"><br />OK, I am brand-new to Yubikey...<br /><br />I thought it used the user's scanned fingerprint as part of the hash to create the OTP and so on...<br /><br />However, I am seeing that is apparently not correct.<br /><br />So it seems that if someone has my Yubikey, they can effectively own me. Truecrypt (the reason I bought the key in the first place) is actually LESS secure with yubikey use, then.<br /><br />Am I wrong? What am I not understanding? I want to use Yubikey in Windows and Linux environs as a boot-level authentication device to unlock my truecrypt-encrypted hard drive.<br /></div><br /><br />It is not a security issue because nowhere does it say that it scans your fingerprint. It is meant to be used together with a username and a password i.e. something you know and something you have. You better read up on security engineering...<br />//A<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=805">andlil</a> — Sat Feb 05, 2011 9:44 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Jafo_Jeeper]]></name></author>
<updated>2011-02-05T01:41:12+01:00</updated>
<published>2011-02-05T01:41:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=633&amp;p=2549#p2549</id>
<link href="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2549#p2549"/>
<title type="html"><![CDATA[HUGE security vulnerability with Yubikey?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=633&amp;p=2549#p2549"><![CDATA[
OK, I am brand-new to Yubikey...<br /><br />I thought it used the user's scanned fingerprint as part of the hash to create the OTP and so on...<br /><br />However, I am seeing that is apparently not correct.<br /><br />So it seems that if someone has my Yubikey, they can effectively own me. Truecrypt (the reason I bought the key in the first place) is actually LESS secure with yubikey use, then.<br /><br />Am I wrong? What am I not understanding? I want to use Yubikey in Windows and Linux environs as a boot-level authentication device to unlock my truecrypt-encrypted hard drive.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1528">Jafo_Jeeper</a> — Sat Feb 05, 2011 1:41 am</p><hr />
]]></content>
</entry>
</feed>