Yubico Forum
https://forum.yubico.com/

HUGE security vulnerability with Yubikey?
https://forum.yubico.com/viewtopic.php?f=16&t=633
Page 1 of 1

Author:  Jafo_Jeeper [ Sat Feb 05, 2011 1:41 am ]
Post subject:  HUGE security vulnerability with Yubikey?

OK, I am brand-new to Yubikey...

I thought it used the user's scanned fingerprint as part of the hash to create the OTP and so on...

However, I am seeing that is apparently not correct.

So it seems that if someone has my Yubikey, they can effectively own me. Truecrypt (the reason I bought the key in the first place) is actually LESS secure with yubikey use, then.

Am I wrong? What am I not understanding? I want to use Yubikey in Windows and Linux environs as a boot-level authentication device to unlock my truecrypt-encrypted hard drive.

Author:  andlil [ Sat Feb 05, 2011 9:44 am ]
Post subject:  Re: HUGE security vulnerability with Yubikey?

Jafo_Jeeper wrote:
OK, I am brand-new to Yubikey...

I thought it used the user's scanned fingerprint as part of the hash to create the OTP and so on...

However, I am seeing that is apparently not correct.

So it seems that if someone has my Yubikey, they can effectively own me. Truecrypt (the reason I bought the key in the first place) is actually LESS secure with yubikey use, then.

Am I wrong? What am I not understanding? I want to use Yubikey in Windows and Linux environs as a boot-level authentication device to unlock my truecrypt-encrypted hard drive.


It is not a security issue because nowhere does it say that it scans your fingerprint. It is meant to be used together with a username and a password i.e. something you know and something you have. You better read up on security engineering...
//A

Author:  Jafo_Jeeper [ Sat Feb 05, 2011 4:55 pm ]
Post subject:  Re: HUGE security vulnerability with Yubikey?

I know security engineering, thank you very much... not all of it, but none of us know everything.

Here's the thing- with Truecrypt, to use the Yubikey as the pass to an encrypted volume, it can store and submit a 64-digit static password.

That static password is, hello, static.

There is nothing else required to decrypt the system partition in the case of an encrypted system partition- no username, other password, nothing.

therefore, anyone that can lay hands on that yubikey and insert it in the USB slot on that machine can decrypt the volume.

Author:  ferrix [ Sat Feb 05, 2011 5:14 pm ]
Post subject:  Re: HUGE security vulnerability with Yubikey?

To add a cheap second factor in cases like truecrypt that need a static password, there is a very easy way.

Type in a PIN code first before tapping the yubikey. Now each part (PIN, yubikey) is useless without the other, because the real truecrypt password is a combination of them.

Author:  Jafo_Jeeper [ Sat Feb 05, 2011 7:06 pm ]
Post subject:  Re: HUGE security vulnerability with Yubikey?

Excellent idea, why didn't I think of this- we do it at work with our Verisign keys.

Yep, huge brainfart there. Thanks!

Author:  Redhatter [ Wed Feb 16, 2011 1:16 pm ]
Post subject:  Re: HUGE security vulnerability with Yubikey?

Yep, simple solution. I did this with my OpenID server, the patch for it has been sent to the Community-ID bug tracker.

Basically when you register for Community-ID, you initially do it using password authentication. Then, when you've activated the account you have the option of enabling YubiKey authentication (single-factor). I extended this to provide two-factor... the prefix of the key for each user is in the database, it takes the length of this, adds 32 to it, and feeds that into substr a couple of times to split user password from OTP.

I'll probably look into doing this with YubiPAM if I can't get challenge-response auth going, as this will allow two-factor authentication with slightly-broken PAM clients such as KDM.

Page 1 of 1 All times are UTC + 1 hour
Powered by phpBB® Forum Software © phpBB Group
https://www.phpbb.com/