Yubico Forum

...visit our web-store at store.yubico.com
It is currently Tue Jan 30, 2018 3:37 pm

All times are UTC + 1 hour




Post new topic Reply to topic  [ 10 posts ] 
Author Message
PostPosted: Mon Jun 16, 2008 11:52 pm 
Offline
Site Admin
Site Admin

Joined: Tue May 06, 2008 7:22 pm
Posts: 151
I've created a new C library that uses curl to validate OTPs. It will be used by the PAM module in the future. It contains a nifty command line tool 'ykclient' that can be used to validate OTPs easily. More info at the google code project:

http://code.google.com/p/yubico-c-client/

Have fun,
Simon


Top
 Profile  
Reply with quote  

Share On:

Share on Facebook FacebookShare on Twitter TwitterShare on Tumblr TumblrShare on Google+ Google+

PostPosted: Thu Jul 24, 2008 4:14 am 
Offline

Joined: Wed Jul 23, 2008 2:53 am
Posts: 3
Hi Simon --

Do you have any plans to add request signature and reply signature validation to this library?

-- Justin


Top
 Profile  
Reply with quote  
PostPosted: Thu Jul 24, 2008 12:30 pm 
Offline
Site Admin
Site Admin

Joined: Tue May 06, 2008 7:22 pm
Posts: 151
jkbauer24 wrote:
Hi Simon --

Do you have any plans to add request signature and reply signature validation to this library?


I don't have patches ready to do it yet, but the library certainly should support that.

Patches welcome. :)

/Simon


Top
 Profile  
Reply with quote  
PostPosted: Thu Aug 07, 2008 1:12 pm 
Offline

Joined: Thu Aug 07, 2008 12:41 pm
Posts: 1
بسم الله الرحمن الرحيم

It is good library,
Could you tell us how to use this library ?
Could you send us a simple test code that use this library ?


Top
 Profile  
Reply with quote  
PostPosted: Thu Aug 07, 2008 2:16 pm 
Offline

Joined: Wed Jun 18, 2008 6:51 pm
Posts: 19
Can you please tell me why you use a client id to identify the Yubikey? Isn't this what the 6 byte public id at the beginning of every OTP is for? Or am I getting completely mixed up here.


Top
 Profile  
Reply with quote  
PostPosted: Tue Aug 19, 2008 2:28 pm 
Offline
Site Admin
Site Admin

Joined: Tue May 06, 2008 7:22 pm
Posts: 151
owidat wrote:
بسم الله الرحمن الرحيم

It is good library,
Could you tell us how to use this library ?
Could you send us a simple test code that use this library ?


Hi! There are some instructions at:

http://code.google.com/p/yubico-c-client/wiki/ReadMe

As for code-examples, please see the included self test:

http://code.google.com/p/yubico-c-clien ... selftest.c

And the command line tool:

http://code.google.com/p/yubico-c-clien ... ykclient.c

/Simon


Top
 Profile  
Reply with quote  
PostPosted: Tue Aug 19, 2008 2:29 pm 
Offline
Site Admin
Site Admin

Joined: Tue May 06, 2008 7:22 pm
Posts: 151
PatrickN wrote:
Can you please tell me why you use a client id to identify the Yubikey? Isn't this what the 6 byte public id at the beginning of every OTP is for? Or am I getting completely mixed up here.


Yup, sort of. :)

There are two identities:

* The 6 byte (12 modhex characters) public id in the prefix of the OTP.

* The id # for a client that connects to api.yubico.com.

The second identity is needed to retrieve and use the proper HMAC key when signing and verifying requests.

/Simon


Top
 Profile  
Reply with quote  
PostPosted: Tue Aug 19, 2008 3:06 pm 
Offline

Joined: Wed Jun 18, 2008 6:51 pm
Posts: 19
Simon wrote:
There are two identities:

* The 6 byte (12 modhex characters) public id in the prefix of the OTP.

* The id # for a client that connects to api.yubico.com.

The second identity is needed to retrieve and use the proper HMAC key when signing and verifying requests.


And why can't you use the 6 byte public id to identify the HMAC key?


Top
 Profile  
Reply with quote  
PostPosted: Tue Aug 19, 2008 3:21 pm 
Offline
Site Admin
Site Admin

Joined: Tue May 06, 2008 7:22 pm
Posts: 151
PatrickN wrote:
Simon wrote:
There are two identities:

* The 6 byte (12 modhex characters) public id in the prefix of the OTP.

* The id # for a client that connects to api.yubico.com.

The second identity is needed to retrieve and use the proper HMAC key when signing and verifying requests.


And why can't you use the 6 byte public id to identify the HMAC key?


Because the client id doesn't strictly speaking have anything to do with any particular yubikey -- a client can validate OTPs from any yubikey. The client id is the identity of the relationship between api.yubico.com and clients.

/Simon


Top
 Profile  
Reply with quote  
PostPosted: Tue Aug 19, 2008 3:34 pm 
Offline

Joined: Wed Jun 18, 2008 6:51 pm
Posts: 19
Simon wrote:
Because the client id doesn't strictly speaking have anything to do with any particular yubikey -- a client can validate OTPs from any yubikey. The client id is the identity of the relationship between api.yubico.com and clients.
/Simon


Of course, I see. thanks for setting me straight.


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 10 posts ] 

All times are UTC + 1 hour


Who is online

Users browsing this forum: No registered users and 0 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group