Yubico Forum

...visit our web-store at store.yubico.com
It is currently Tue Jan 30, 2018 8:29 pm

All times are UTC + 1 hour




Post new topic Reply to topic  [ 12 posts ]  Go to page Previous  1, 2
Author Message
PostPosted: Tue Nov 10, 2015 7:01 pm 
Offline

Joined: Tue Oct 27, 2015 12:34 pm
Posts: 4
brendanhoar wrote:
dain wrote:
Full specification of the applet (as well as the source code) and the protocol it implements is available online already. I have also written code which is capable of extracting OTPs for all credentials stored on the YubiKey, it's called Yubico Authenticator and is available for major desktop OSes as well as Android.


Hah! Dain...do I detect a wee bit of snark? :)

---

I understand the threat model that OTPs are meant to mitigate: remote reuse of login credentials from a machine not under the control of the rightful account holder. Man-in-the-middle and/or Man-in-the-browser threats/attacks are generally out-of-scope for OTPs, but may become in-scope for certain OTP-enabled applications that require additional safeguards.

That being said, because a) the yubikeys (esp. nano/-n models) are often left in the USB port for long periods of time *and* b) because the desktop version of Yubico Authenticator will continuously generate TOTP codes for all accounts *and* c) because desktop systems can get compromised pretty easily...sum all three items together results in my opinion that leaving the code generation going on for hours/days by default is not the best default choice.


Having to remember to explicitly quit the authenticator (esp. because alt-f4 puts it in the windows system tray, continuing to generate codes) or pull out the key (which will interfere with PIV or PGP operations) seems to require a bit too much active mitigation on the part of the end user. It's not "default safe", it's "default convenient".

Relating to the issue ticket I put into github: the safest behavior would be an optional touch-required mode w/ the flag configured in the authenticator but stored and enforced by the applet. This would likely require applet changes and therefore new hardware - so it would be safest but not really optimal to solve the issue today. A second choice mitigation would be hard-coding a small number of consecutive code generations before the password is discarded and re-prompted for. A third choice mitigation would be a local setting for number of consecutive code generations (with 0 for continuous). I also understand that a single-code-before-relock is also not optimal due to bad-luck timing, so that being hardcoded would probably not work well.

In the short term for current users that really need a physical lock on the code generation...

Since the two classic slots already support touch-required and can now be utilized for TOTP codes with the desktop authenticator: if there's a particular account that is very sensitive, then store that account's TOTP secret in one of the two classic slots and configure that slot to require touch.

Just some thoughts.

Thanks,
Brendan


I would call it a wee bit of arrogance.

Thank you, this clarifies the issue a bit although it doesn't fix it.


Top
 Profile  
Reply with quote  

Share On:

Share on Facebook FacebookShare on Twitter TwitterShare on Tumblr TumblrShare on Google+ Google+

PostPosted: Wed Nov 11, 2015 4:20 pm 
Offline
Site Admin
Site Admin

Joined: Mon Mar 02, 2009 9:51 pm
Posts: 83
I'm sorry if you took offence, let me instead address your complaint and why I don't see it as a very serious issue.

The YubiKey NEO has never claimed to protect usage on a malware infected computer, because doing so is practically impossible. Say we add a button press requirement to generate an OTP. If you cannot trust the machine you are using due to malware, how can you know that the button you're pressing will unlock the intended credential, and provide it to the intended recipient, for the intended purpose? If you encrypt or decrypt something on a compromised computer, then malware can steal the plain text and key. If you sign anything you cannot know what is being signed. At this point you've already lost.

Claiming that something is useless because it can be circumvented is a fallacy, akin to saying that all locks are useless since the attacker might steal your key. The password protects you from unauthorized usage if someone gains physical access to your YubiKey.

Could you quote the exact page and section of the website that you feel is misleading? That's obviously not our intent, so hopefully we can word it better. Please be as specific as possible.


Top
 Profile  
Reply with quote  
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 12 posts ]  Go to page Previous  1, 2

All times are UTC + 1 hour


Who is online

Users browsing this forum: Heise IT-Markt [Crawler] and 11 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB® Forum Software © phpBB Group