<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=12&amp;t=2359" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2016-07-05T19:51:50+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=12&amp;t=2359</id>
<entry>
<author><name><![CDATA[colliewob]]></name></author>
<updated>2016-07-05T19:51:50+01:00</updated>
<published>2016-07-05T19:51:50+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8769#p8769</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8769#p8769"/>
<title type="html"><![CDATA[Re: [Q?] Using CAPTCHA to protect yubico.com website?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8769#p8769"><![CDATA[
Yes, I see that in this instance there is a bootstrap problem with using OTP for captcha.<br /><br />Also, after the AES key is replaced with a non-factory one, presumably Yubico can no longer vouch that the OTPs were made by hardware?  And therefore it's open to flooding from multiple ids, in software.<br /><br />On U2F, I wondered if it is better value for captcha.  Older keys don't have it, so maybe it's not good for OTP AES key replacement.  But it can be verified as hardware even by third parties, so maybe it's useful for blog posts?<br /><br /><div class="quotetitle">ChrisHalos wrote:</div><div class="quotecontent"><br />For some reason, a decent amount of customers receive their YubiKey and decide it's a good idea to wipe the default credential in slot 1 and<br /></div><br /><br />If I were doing that, it could be either ineptness or some ill-defined fear of other people's secrets.  Or I just needed two slots for a while..? (I'm n00b)<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4390">colliewob</a> — Tue Jul 05, 2016 7:51 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[ChrisHalos]]></name></author>
<updated>2016-07-05T16:06:32+01:00</updated>
<published>2016-07-05T16:06:32+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8766#p8766</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8766#p8766"/>
<title type="html"><![CDATA[Re: [Q?] Using CAPTCHA to protect yubico.com website?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8766#p8766"><![CDATA[
The AES key upload is only for the Yubico OTP credential you're programming - nothing else. It has nothing to do with U2F. <br /><br />The CAPTCHA is there because we can't require a Yubico OTP there - since this page is used for uploading the Yubico OTP credential that was just programmed, the service has no knowledge of your credential.<br /><br />For some reason, a decent amount of customers receive their YubiKey and decide it's a good idea to wipe the default credential in slot 1 and generate a new one (in this use case, the OTP credential has been deleted, so there is no way we could require an OTP here).<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=3140">ChrisHalos</a> — Tue Jul 05, 2016 4:06 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[colliewob]]></name></author>
<updated>2016-07-04T20:55:34+01:00</updated>
<published>2016-07-04T20:55:34+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8763#p8763</id>
<link href="https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8763#p8763"/>
<title type="html"><![CDATA[[Q?] Using CAPTCHA to protect yubico.com website?]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=2359&amp;p=8763#p8763"><![CDATA[
While reading <!-- m --><a class="postlink" href="http://www.yubico.com/wp-content/uploads/2016/06/YubiKey_for_YubiCloud_ConfigGuide_en.pdf">http://www.yubico.com/wp-content/upload ... ide_en.pdf</a><!-- m --> I saw<br /><div class="quotetitle"><b>Quote:</b></div><div class="quotecontent"><br />9 b.  In the Yubico AES Key Upload window, compare YubiKey prefix with the results from the text editor. <br /><strong>Type the CAPTCHA</strong>, and click Upload AES key<br /></div><br />I guess the captcha is preventing some service abuse or overload, but...  isn't an OTP stronger protection?<br /><br />Hence a suggestion: a useful captcha-like service asserting that <em>OTP key $foo has issued no more than $n tokens in the last $t hours</em>.<br /><br />Maybe I have 500 keys on a carousel doing a plug, dab and move cycle...  but this limited resource doesn't look farmable or botnettable.<br /><br />If the assertion service was rogue, it would have a stream of fresh OTPs it could try elsewhere.  How big is the risk to the key owner here?<br /><br />Have I misunderstood the need for registering the key before use?  Does attestation (hence u2f not otp) help here?  Can the service usefully use one u2f keyhandle against many not previously registered keys?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4390">colliewob</a> — Mon Jul 04, 2016 8:55 pm</p><hr />
]]></content>
</entry>
</feed>