Yubikeys are now supported
mmcgrath at redhat.com
Fri Oct 8 13:25:31 UTC 2010
On Fri, 8 Oct 2010, Maxim Burgerhout wrote:
> I am the maintainer for ykpers and libyubikey for Fedora. It's great
> to see Fedora starting to use these nifty devices!
> If there is anything I can do to help out and make the use of
> Yubikey's in the Fedora project into a success, just holler. It might
> be interesting to add a README.Fedora to the ykpers package explaining
> how to configure it for both Fedora and Yubico's servers like on the
> page Toshio linked to. I'll look into that later.
> One question I don't think has been asked before:
> Can we eventually make FAS' (beta) OpenID provider functionality work
> with this? If so, there will be little use for uploading an AES key to
> Yubico. Because when I use my Yubikeys to authenticate myself, I most
> often do this through OpenID and there is at least one free OpenID
> provider with support for Yubikeys (clavid.com). This OpenID provider
> authenticates me against Yubico's servers. If we can have an OpenID
> provider service in FAS that authenticates against the AES keys in
> Fedora's database, I wouldn't need other providers like Clavid or even
> Yubico's own servers anymore.
Actually the only thing blocking the OpenID functionality is that we never
got it fully working, it still fails on some sites. If anyone out there
knows openid and python, please let us know.
> There would be no more need to use the same AES key for multiple
> services *and* it would only require one AES key for OTP on my
> Yubikey, leaving the second slot for a strong static password for e.g.
> LUKS disk encryption.
The attack Paul is talking about is only possible if people are going out
of their way to bypass the process we have in place. The key generation
is done on the server and sent to the client, that transaction is
transient and not stored on disk. Any multiple service authentication all
goes through the single yubikey server.
More information about the devel