Greg Woods wrote:
From reading the source code, it appears that it is not possible to do anything to the token without also writing an AES key, which requires that you either have access to the existing key, or generate a new key, which then would not allow the token to be used to log in as that user any more unless you also have access to the authentication server. If this is the case, it removes the concern about the trigger flag being set and then triggered as a way to break into the user's account.
The auto-login does remain a concern. It is a risk that we may or may not be willing to assume, but it would certainly be better from the security standpoint if this function could be disabled.
You are correct that I haven't looked at the Linux programming tool. I'm afraid that I don't know much about Linux. I guess the nature of community projects such as this leads to different paths with inconsistent capabilities.
I agree that the need to enter the AES key in order to program the YK would effectively preclude the trigger from being used to enter the user's account. I was originally thinking that the trigger in combination with the auto-login seemed particularly problematic, but on further thought I realized that the auto-login only occurs when the YK is first plugged in so I don't think the trigger would have any interaction with the auto-login. That, together with your observation, would seem to pretty much resolve my concern with the trigger. I'm still uneasy about the auto-login, but perhaps on further reflection will realize that my concern there is also unjustified.
Regards,
Dick