<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=16&amp;t=1968" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2015-07-21T19:17:17+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=16&amp;t=1968</id>
<entry>
<author><name><![CDATA[ferrix]]></name></author>
<updated>2015-07-21T19:17:17+01:00</updated>
<published>2015-07-21T19:17:17+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1968&amp;p=7625#p7625</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1968&amp;p=7625#p7625"/>
<title type="html"><![CDATA[Re: yubipam + authlite with same yubikey profile possible?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1968&amp;p=7625#p7625"><![CDATA[
I see you also opened a support request at our site, so I'll continue with you over there.  I just wanted to post this here in case someone else had the same question.<br /><br />Your assumption about the AES key is wrong.  We encrypt that value for export, mostly for historical reasons.<br /><br />Anyway, you super should not do the thing you are trying to do.  Sharing a single yubikey across more than one authority makes you vulnerable to cross authority replay attacks.  If you want to use AD as the central store for your users, AuthLite can do everything and you don't need any of the Yubico software.<br /><br />If you need to have separate authorities, then you should use separate yubikeys.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=162">ferrix</a> — Tue Jul 21, 2015 7:17 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[adrian]]></name></author>
<updated>2015-07-20T15:44:53+01:00</updated>
<published>2015-07-20T15:44:53+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1968&amp;p=7612#p7612</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1968&amp;p=7612#p7612"/>
<title type="html"><![CDATA[yubipam + authlite with same yubikey profile possible?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1968&amp;p=7612#p7612"><![CDATA[
Hi, I hope this is not the totally wrong forum for this question.<br />I want to use a yubikey to authenticate on Linux against an radius server. This already works.<br />We also want to authenticate our Windows machines against AD using AuthLite. Unfortunately I was not able to do so using the same profile on the yubikey.<br />I am configuring my yubikey this way on Linux and insert it into the yubipam configuration:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent"># yubikey configuration<br />uid=$(openssl rand -hex 6)<br />fixed=$(openssl rand -hex 16 | tr “0-9a-f” “cbdefghijklnrtuv”)<br />access=$(openssl rand -hex 6 )<br />ykpersonalize -1 -z<br />ykpersonalize -1 -oaccess=$access -ofixed=$fixed -ouid=$uid -oappend-cr -o-strong-pw1 -o-strong-pw2 -o-man-update<br /><br /># yubipam configuration<br />ykpasswd -a -u $username -k $AES-FROM-ykpersonalize -o $OTP-from-token<br /><br /># check token<br />ykvalidate -u $username $OTP-from-token<br /><br /></div><br /><br />This works without a problem.<br />I got some xml files from the workmate that is responsible for the AuthLite/AD integration.<br />My idea was to extract the data from the xml file and configure it into yubipam.<br />The xml file looks like this:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">&lt;?xml version=&quot;1.0&quot; encoding=&quot;utf-8&quot;?&gt;<br />&lt;AuthLiteData xmlns:xsd=&quot;http://www.w3.org/2001/XMLSchema&quot; xmlns:xsi=&quot;http://www.w3.org/2001/XMLSchema-instance&quot; xmlns=&quot;http://schema.collectivesoftware.com/products/authlite/databucket/1.0&quot;&gt;<br />  &lt;Keys&gt;<br />    &lt;AuthLiteKey&gt;<br />      &lt;PublicId&gt;65d2a1ce80d50ad8a67b0d705c0acd40&lt;/PublicId&gt;<br />      &lt;PublicIdReadable&gt;2b6858c208d04cb0e7a9f1cea451c120&lt;/PublicIdReadable&gt;<br />      &lt;AesKey&gt;276649e34a78c802975636c0faf9c76f&lt;/AesKey&gt;<br />      &lt;OtpCounter&gt;0&lt;/OtpCounter&gt;<br />      &lt;Timestamp&gt;0&lt;/Timestamp&gt;<br />      &lt;SecretId&gt;89768ac03843&lt;/SecretId&gt;<br />      &lt;SerialNumber&gt;3971014&lt;/SerialNumber&gt;<br />      &lt;OathInterval xsi:nil=&quot;true&quot; /&gt;<br />      &lt;OathDrift xsi:nil=&quot;true&quot; /&gt;<br />      &lt;CounterUpdateTimestamp&gt;0001-01-01T00:00:00&lt;/CounterUpdateTimestamp&gt;<br />    &lt;/AuthLiteKey&gt;<br />  &lt;/Keys&gt;<br />&lt;/AuthLiteData&gt;<br /></div><br /><br />I simply assumes AES-key = AES-key and tried to reuse the aes key in yubipam:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">ykpasswd -a -u $username -k $AES-FROM-XMLFILE -o $OTP-from-token<br /></div><br />Unfortunately this does not work:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">Adding Yubikey entry for $username<br />Invalid OTP specified!<br /></div><br />The OTP has the same length. The PublicIdReadable from the xml file is the hex representation of the modhex from the key.<br />This can be checked this way:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">echo $PublicIdReadable-from-xml | tr “0-9a-f” “cbdefghijklnrtuv”<br /></div><br /><br />Using the same profile in two authentication systems should work. At least I had no problems authentication against freeradius/yubipam at work and yubipam at home with the same yubikey and same profile.<br /><br />Please help me.<br />Best regards.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3830">adrian</a> — Mon Jul 20, 2015 3:44 pm</p><hr />
]]></content>
</entry>
</feed>