<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=26&amp;t=2077" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-11-11T16:20:12+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=26&amp;t=2077</id>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2015-11-11T16:20:12+01:00</updated>
<published>2015-11-11T16:20:12+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7968#p7968</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7968#p7968"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7968#p7968"><![CDATA[
I'm sorry if you took offence, let me instead address your complaint and why I don't see it as a very serious issue.<br /><br />The YubiKey NEO has never claimed to protect usage on a malware infected computer, because doing so is practically impossible. Say we add a button press requirement to generate an OTP. If you cannot trust the machine you are using due to malware, how can you know that the button you're pressing will unlock the intended credential, and provide it to the intended recipient, for the intended purpose? If you encrypt or decrypt something on a compromised computer, then malware can steal the plain text and key. If you sign anything you cannot know what is being signed. At this point you've already lost.<br /><br />Claiming that something is useless because it can be circumvented is a fallacy, akin to saying that all locks are useless since the attacker might steal your key. The password protects you from unauthorized usage if someone gains physical access to your YubiKey.<br /><br />Could you quote the exact page and section of the website that you feel is misleading? That's obviously not our intent, so hopefully we can word it better. Please be as specific as possible.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Wed Nov 11, 2015 4:20 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dunkel]]></name></author>
<updated>2015-11-10T19:01:06+01:00</updated>
<published>2015-11-10T19:01:06+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7966#p7966</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7966#p7966"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7966#p7966"><![CDATA[
<div class="quotetitle">brendanhoar wrote:</div><div class="quotecontent"><br /><div class="quotetitle">dain wrote:</div><div class="quotecontent">Full specification of the applet (as well as the source code) and the protocol it implements is available online already. I have also written code which is capable of extracting OTPs for all credentials stored on the YubiKey, it's called Yubico Authenticator and is available for major desktop OSes as well as Android.<br /></div><br /><br />Hah! Dain...do I detect a wee bit of snark? <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br />---<br /><br />I understand the threat model that OTPs are meant to mitigate: remote reuse of login credentials from a machine not under the control of the rightful account holder. Man-in-the-middle and/or Man-in-the-browser threats/attacks are generally out-of-scope for OTPs, but may become in-scope for certain OTP-enabled applications that require additional safeguards.<br /><br />That being said, because a) the yubikeys (esp. nano/-n models) are often left in the USB port for long periods of time *and* b) because the desktop version of Yubico Authenticator will continuously generate TOTP codes for all accounts *and* c) because desktop systems can get compromised pretty easily...sum all three items together results in my opinion that leaving the code generation going on for hours/days by default is not the best default choice.<br /><br /><br />Having to remember to explicitly quit the authenticator (esp. because alt-f4 puts it in the windows system tray, continuing to generate codes) or pull out the key (which will interfere with PIV or PGP operations) seems to require a bit too much active mitigation on the part of the end user. It's not &quot;default safe&quot;, it's &quot;default convenient&quot;.<br /><br />Relating to the issue ticket I put into github: the safest behavior would be an optional touch-required mode w/ the flag configured in the authenticator but stored and enforced by the applet. This would likely require applet changes and therefore new hardware - so it would be safest but not really optimal to solve the issue today. A second choice mitigation would be hard-coding a small number of consecutive code generations before the password is discarded and re-prompted for. A third choice mitigation would be a local setting for number of consecutive code generations (with 0 for continuous). I also understand that a single-code-before-relock is also not optimal due to bad-luck timing, so that being hardcoded would probably not work well.<br /><br />In the short term for current users that really need a physical lock on the code generation...<br /><br />Since the two classic slots already support touch-required and can now be utilized for TOTP codes with the desktop authenticator: if there's a particular account that is very sensitive, then store that account's TOTP secret in one of the two classic slots and configure that slot to require touch. <br /><br />Just some thoughts.<br /><br />Thanks,<br />Brendan</div><br /><br />I would call it a wee bit of arrogance.<br /><br />Thank you, this clarifies the issue a bit although it doesn't fix it.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4002">dunkel</a> — Tue Nov 10, 2015 7:01 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dunkel]]></name></author>
<updated>2015-11-10T18:56:37+01:00</updated>
<published>2015-11-10T18:56:37+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7965#p7965</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7965#p7965"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7965#p7965"><![CDATA[
<div class="quotetitle">dain wrote:</div><div class="quotecontent"><br />Full specification of the applet (as well as the source code) and the protocol it implements is available online already. I have also written code which is capable of extracting OTPs for all credentials stored on the YubiKey, it's called Yubico Authenticator and is available for major desktop OSes as well as Android.<br /></div><br /><br />Full specifications are available, main website specs are misleading as these suggest as a requirement &quot;touching&quot; the device in order to allow password reveal.<br />My code doesn't have a name and can be available for major desktop without the user realizing it, on Android is not so effective as most users will use NFC and only one pass will be shown whenever the user needs it.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4002">dunkel</a> — Tue Nov 10, 2015 6:56 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2015-11-09T17:33:55+01:00</updated>
<published>2015-11-09T17:33:55+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7961#p7961</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7961#p7961"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7961#p7961"><![CDATA[
<div class="quotetitle">dain wrote:</div><div class="quotecontent"><br />I think that makes a lot of sense. Having the desktop app &quot;forget&quot; the passphrase after a set time (or number of calculations) makes sense, and could be implemented while still being compatible with existing devices. Would you mind opening another Github issue for that? As you've mentioned, the touch-to-generate ticket you've already opened will require updates to the applet itself, so it's not a backwards compatible solution (which doesn't mean that we're not going to implement it, just that it won't solve the issue for existing users).<br /></div><br /><br />Will do. Thanks, Dain.<br /><br />Brendan<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Mon Nov 09, 2015 5:33 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2015-11-09T15:32:46+01:00</updated>
<published>2015-11-09T15:32:46+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7960#p7960</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7960#p7960"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7960#p7960"><![CDATA[
<div class="quotetitle">brendanhoar wrote:</div><div class="quotecontent"><br />Hah! Dain...do I detect a wee bit of snark? <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /></div><br /><br />Perhaps just a bit. Monday mornings and all that <img src="https://forum.yubico.com/images/smilies/icon_e_wink.gif" alt=";)" title="Wink" /><br /><br /><br /><div class="quotetitle">brendanhoar wrote:</div><div class="quotecontent"><br />I understand the threat model that OTPs are meant to mitigate: remote reuse of login credentials from a machine not under the control of the rightful account holder. Man-in-the-middle and/or Man-in-the-browser threats/attacks are generally out-of-scope for OTPs, but may become in-scope for certain OTP-enabled applications that require additional safeguards.<br /><br />That being said, because a) the yubikeys (esp. nano/-n models) are often left in the USB port for long periods of time *and* b) because the desktop version of Yubico Authenticator will continuously generate TOTP codes for all accounts *and* c) because desktop systems can get compromised pretty easily...sum all three items together results in my opinion that leaving the code generation going on for hours/days by default is not the best default choice.<br /><br /><br />Having to remember to explicitly quit the authenticator (esp. because alt-f4 puts it in the windows system tray, continuing to generate codes) or pull out the key (which will interfere with PIV or PGP operations) seems to require a bit too much active mitigation on the part of the end user. It's not &quot;default safe&quot;, it's &quot;default convenient&quot;.<br /><br />Relating to the issue ticket I put into github: the safest behavior would be an optional touch-required mode w/ the flag configured in the authenticator but stored and enforced by the applet. This would likely require applet changes and therefore new hardware - so it would be safest but not really optimal to solve the issue today. A second choice mitigation would be hard-coding a small number of consecutive code generations before the password is discarded and re-prompted for. A third choice mitigation would be a local setting for number of consecutive code generations (with 0 for continuous). I also understand that a single-code-before-relock is also not optimal due to bad-luck timing, so that being hardcoded would probably not work well.<br /><br />In the short term for current users that really need a physical lock on the code generation...<br /></div><br /><br />I think that makes a lot of sense. Having the desktop app &quot;forget&quot; the passphrase after a set time (or number of calculations) makes sense, and could be implemented while still being compatible with existing devices. Would you mind opening another Github issue for that? As you've mentioned, the touch-to-generate ticket you've already opened will require updates to the applet itself, so it's not a backwards compatible solution (which doesn't mean that we're not going to implement it, just that it won't solve the issue for existing users).<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Mon Nov 09, 2015 3:32 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2015-11-09T15:15:16+01:00</updated>
<published>2015-11-09T15:15:16+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7959#p7959</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7959#p7959"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7959#p7959"><![CDATA[
<div class="quotetitle">dain wrote:</div><div class="quotecontent"><br />Full specification of the applet (as well as the source code) and the protocol it implements is available online already. I have also written code which is capable of extracting OTPs for all credentials stored on the YubiKey, it's called Yubico Authenticator and is available for major desktop OSes as well as Android.<br /></div><br /><br />Hah! Dain...do I detect a wee bit of snark? <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br />---<br /><br />I understand the threat model that OTPs are meant to mitigate: remote reuse of login credentials from a machine not under the control of the rightful account holder. Man-in-the-middle and/or Man-in-the-browser threats/attacks are generally out-of-scope for OTPs, but may become in-scope for certain OTP-enabled applications that require additional safeguards.<br /><br />That being said, because a) the yubikeys (esp. nano/-n models) are often left in the USB port for long periods of time *and* b) because the desktop version of Yubico Authenticator will continuously generate TOTP codes for all accounts *and* c) because desktop systems can get compromised pretty easily...sum all three items together results in my opinion that leaving the code generation going on for hours/days by default is not the best default choice.<br /><br /><br />Having to remember to explicitly quit the authenticator (esp. because alt-f4 puts it in the windows system tray, continuing to generate codes) or pull out the key (which will interfere with PIV or PGP operations) seems to require a bit too much active mitigation on the part of the end user. It's not &quot;default safe&quot;, it's &quot;default convenient&quot;.<br /><br />Relating to the issue ticket I put into github: the safest behavior would be an optional touch-required mode w/ the flag configured in the authenticator but stored and enforced by the applet. This would likely require applet changes and therefore new hardware - so it would be safest but not really optimal to solve the issue today. A second choice mitigation would be hard-coding a small number of consecutive code generations before the password is discarded and re-prompted for. A third choice mitigation would be a local setting for number of consecutive code generations (with 0 for continuous). I also understand that a single-code-before-relock is also not optimal due to bad-luck timing, so that being hardcoded would probably not work well.<br /><br />In the short term for current users that really need a physical lock on the code generation...<br /><br />Since the two classic slots already support touch-required and can now be utilized for TOTP codes with the desktop authenticator: if there's a particular account that is very sensitive, then store that account's TOTP secret in one of the two classic slots and configure that slot to require touch. <br /><br />Just some thoughts.<br /><br />Thanks,<br />Brendan<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Mon Nov 09, 2015 3:15 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dain]]></name></author>
<updated>2015-11-09T09:52:19+01:00</updated>
<published>2015-11-09T09:52:19+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7958#p7958</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7958#p7958"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7958#p7958"><![CDATA[
Full specification of the applet (as well as the source code) and the protocol it implements is available online already. I have also written code which is capable of extracting OTPs for all credentials stored on the YubiKey, it's called Yubico Authenticator and is available for major desktop OSes as well as Android.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=504">dain</a> — Mon Nov 09, 2015 9:52 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dunkel]]></name></author>
<updated>2015-11-07T13:24:48+01:00</updated>
<published>2015-11-07T13:24:48+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7957#p7957</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7957#p7957"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7957#p7957"><![CDATA[
Hi, <br /><br />This is a very serious concern. <br />You should advise your clients that while their yubikey NEO (in the case of NEO-n you even claim to be designed to be &quot;always&quot; plugged) is plugged, the applet-based OTP is continuously streaming all the OTC passwords.<br />We have wrote a code that can now gain access to all the users yubikey neo applet-based OTP while their yubikey is plugged (if it the applet-based OTC is protected with a password we can intercept it with a keylogger so this protection is useless).<br /><br />I am very disappointed and I think you should clarify this in the product specifications.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4002">dunkel</a> — Sat Nov 07, 2015 1:24 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2015-11-04T16:20:06+01:00</updated>
<published>2015-11-04T16:20:06+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7951#p7951</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7951#p7951"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7951#p7951"><![CDATA[
<div class="quotetitle">Tom2 wrote:</div><div class="quotecontent"><br />What you describe is correct mr brendanhoar.<br /></div><br /><br />Thanks.<br /><br />FYI, I added an issue to the github page with three alternate proposals, basically:<br /><br />1. Support a touch feature for applet-based OTPs. This might be hard because it may require new applet code (and therefore wouldn't be supported on older keys).<br />2. Easier: add a user-settable maximum retry counter that discards the password and re-prompts after nn generations.<br />3. Easier: add a user-settable maximum retry counter that discards the password and minimizes or exits after nn generations.<br /><br /><!-- m --><a class="postlink" href="https://github.com/Yubico/yubioath-desktop/issues/57">https://github.com/Yubico/yubioath-desktop/issues/57</a><!-- m --><br /><br />Brendan<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Wed Nov 04, 2015 4:20 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom2]]></name></author>
<updated>2015-11-04T14:58:28+01:00</updated>
<published>2015-11-04T14:58:28+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7949#p7949</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7949#p7949"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7949#p7949"><![CDATA[
What you describe is correct mr brendanhoar.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3364">Tom2</a> — Wed Nov 04, 2015 2:58 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[brendanhoar]]></name></author>
<updated>2015-11-04T13:56:42+01:00</updated>
<published>2015-11-04T13:56:42+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7948#p7948</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7948#p7948"/>
<title type="html"><![CDATA[Re: Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7948#p7948"><![CDATA[
My recollection is that this is normal behavior for authenticator: <br />1. for the applet-based OATH codes, you can set a password (optional?), but you <strong>cannot</strong> currently configure &quot;touch required&quot; (I put an issue into github asking for this feature a while back).<br />2. for the two slot-based OATH codes, however, you can configure &quot;touch required&quot; (but you cannot configure a password).<br /><br />Brendan<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3142">brendanhoar</a> — Wed Nov 04, 2015 1:56 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[dunkel]]></name></author>
<updated>2015-10-27T12:48:43+01:00</updated>
<published>2015-10-27T12:48:43+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7926#p7926</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7926#p7926"/>
<title type="html"><![CDATA[Yubico Authenticator in OSX]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2077&amp;p=7926#p7926"><![CDATA[
When I open Yubico Authenticator in OSX it shows my OTP passwords without touching my yubikey neo.<br /><br />Is this the normal behaviour? A malicious script installed in my computer could have access to all my OTP passwords as long as my Yubikey neo is plugged in?<br /><br />Thank you<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4002">dunkel</a> — Tue Oct 27, 2015 12:48 pm</p><hr />
]]></content>
</entry>
</feed>