On Sun, Nov 04, 2012 at 02:46:55PM -0600, Aaron Poffenberger wrote:
> Theo de Raadt <dera...@cvs.openbsd.org> writes:
> 
> >> Well I moved to position that booting with a passphrase and then
> >> concatenate strong passphrase from an Yubikey configured with
> >> static passphrase would be better solution than keydisk and
> >> passphrase.
> >> 
> >> Although I don't have an Yubikey token now but as an Yubikey
> >> token is simulatin usb keyboard it should work. Has anybody
> >> tested Yubikey with new boot(8) asking for passphrase?
> >
> > Then you had better start work on the usb stack for the bootcode.
> 
> The Yubikey presents itself to the system as a standard USB keyboard. It
> has two "slots" for passwords. You can program either slot (or both) to
> hold a static value or as an OTP generator. When you touch the button on
> the Yubikey it types out slot one's value. If you touch and hold for 2-3
> seconds it types out slot two's value.
> 
> I just tried mine. At the /boot prompt I plugged it in and touched the
> "type" button and it typed out my OTP. I also tried the static password.
> No problem.
> 
> Obviously the OTP wouldn't be useful since it requires custom code in
> the receiver but the static password seems like a viable option. I was
> thinking the same as Jiri except I'd prepend the system-specific value
> before letting the Yubikey type the password since it types a carriage
> return at the end.

OTP would be nice but probably one would not get anything as it would need
access to something like /var/db/yubikey which could not be secured enough
for boot(8)...

This was exactly was I meant with '...then concatenate strong passphrase
from an Yubikey...'.

Thanks for info!

jirib

Reply via email to