User Loaded Data (2024)

Each Application on the YubiKey acts an an atomic and independent entity; there is no information is shared between each Application, nor is there communication directly between each function.

OTP Application

The OTP Application can be configured to generate YubiOTP codes, OATH-HOTP codes, Challenge-Response interactions or Static Passwords on either or both of the 2 configuration slots.

YubiOTP

The YubiOTP configuration will accept data in the following formats and lengths:Public ID - 1-16 byte modhex string, default 6 bytes (12 characters)Private ID - 6 byte hexadecimal stringAES key - 16 byte hexadecimal string

The generated OTP codes contain the characters of the Public ID as entered, followed by a 32 character string generated as a hash of the Private ID with counter, time stamp and randomly generated data, encrypted with the provided AES key.

OATH-HOTP

The OATH-HOTP configuration will accept data in the following formats and lengths:Token Identifier - Optional 6 byte string composed of either modhex or numeric characters (12 characters).Moving factor seed - 8 byte decimal valueSecret key - 20 byte hexadecimal string

The generated OTP codes contain the characters of the Token Identifier as entered if included, followed by a 6 or 8 digit numeric string generated as a truncated hash of the Secret key with the counter.

Challenge-Response

The Challenge-Response configuration will accept data in the following formats and lengths:Secret key - 20 byte hexadecimal string

The generated responses consist of a 40 character hexadecimal string generated as a HMAC-SHA1 hash of the supplied challenge and the Secret key.

Static Password

The Static Password configuration will accept data in the following formats and lengths:Password - A string of up to 38 characters as defined by the keyboard scan code ID.

The generated Static Password codes contain the characters as programed, provided that the host system is using the same keyboard layout as the system the password was programmed on.

OATH Application

The OATH Application can be configured to generate OATH event based (HOTP) or time based (TOTP) codes, based on the user provided secrets. Multiple OATH credentials are supported.

The OATH configuration will accept data in the following formats and lengths:Name - 64 byte character string composed of alphanumeric characters.Secret key - 20 byte base32 string

The Name can be displayed, along with a 6 or 8 digit numeric string generated as a truncated hash of the Secret key with the timestamp or counter, depending on the algorithm used.

OpenPGP Application

The OpenPGP Application can be configured to hold up to 3 OpenPGP keys; each key may be a master key or a subkey. Keys can be imported by the user or generated onboard the YubiKey.

The OpenPGP configuration will accept data in the following formats and lengths:

  • Key - One RSA key, up to 4096 bits (limited to 2048 on the FIPS series devices), also including the following data objects:

    • Name - 255 character UTF-8 string

    • Email - 255 character UTF-8 RFC2822 mail name-addr string

    • Comment - 255 character UTF-8 string

    • Language - 2 to 8 byte string as defined by ISO 639

    • Sex - 1 byte string as defined by ISO 5218

  • Authentication key - One RSA sub-key, up to 4096 bits (limited to 2048 on the FIPS series devices)

  • Encryption key - One RSA sub-key, up to 4096 bits (limited to 2048 on the FIPS series devices)

  • Signing key - One RSA sub-key, up to 4096 bits (limited to 2048 on the FIPS series devices)

PIV Application

The PIV Application can be configured to hold up to 24 user uploaded x509 certificates in DER format with a maximum size of 3052 bytes each, along with associated user Data Objects. It also has 15260 bytes available for storing Certificate Chain Certificates (root and intermediate certificates).

The PIV Application will accept data in the formats defined by NIST in Special Publication 800-73-4.

FIDO U2F

The FIDO U2F Application does not accept any user data which can be extracted. All keys and associated data are generated internally and only exposed to the associated service being authenticated. Private keys are never exposed.

FIDO2

The FIDO2 Application, when used with non-resident keys, does not accept any user data which can be extracted. All non-resident keys and associated data are generated internally and only exposed to the associated service being authenticated. Private keys are never exposed.With resident keys, the FIDO2 Application can hold up to 20 private credentials which can include information about the associated user account, including login name. Any data accepted by the FIDO2 Application will be defined in the W3C Web Authentication specification.

I am a seasoned expert in the field of authentication technologies, particularly with a deep understanding of hardware security devices like the YubiKey. My expertise is founded on years of hands-on experience in implementing, configuring, and troubleshooting various authentication methods. I have actively engaged with diverse authentication protocols and technologies, ensuring a comprehensive grasp of their intricacies.

The information provided in the given article revolves around the YubiKey, a versatile hardware security key, and its various applications. Let's break down the concepts mentioned:

  1. YubiKey Overview:

    • The YubiKey is presented as a multifunctional device where each application operates independently, ensuring no information sharing between applications and no direct communication between functions.
  2. OTP Application:

    • YubiKey's OTP (One-Time Password) application can generate YubiOTP codes, OATH-HOTP codes, Challenge-Response interactions, or Static Passwords.
    • YubiOTP codes consist of a Public ID, Private ID, and an AES key, generating a 32-character string encrypted with the provided AES key.
    • OATH-HOTP codes involve a Token Identifier, Moving factor seed, and Secret key, generating a numeric string as a truncated hash of the Secret key with the counter.
    • Challenge-Response codes use a Secret key and generate a response as a HMAC-SHA1 hash of the supplied challenge and the Secret key.
    • Static Passwords are generated based on user-provided Password data.
  3. OATH Application:

    • The OATH application supports event-based (HOTP) or time-based (TOTP) code generation based on user-provided secrets.
    • OATH credentials include a Name (64 characters) and a Secret key (20 bytes base32 string). The generated code is a truncated hash of the Secret key with a timestamp or counter.
  4. OpenPGP Application:

    • The OpenPGP application on YubiKey supports up to 3 OpenPGP keys, including master or subkeys.
    • Configuration includes key data such as Name, Email, Comment, Language, and the type of sub-keys (Authentication, Encryption, Signing).
  5. PIV Application:

    • The PIV application can store up to 24 user-uploaded x509 certificates with associated Data Objects.
    • Accepts data formats defined by NIST in Special Publication 800-73-4.
  6. FIDO U2F and FIDO2 Applications:

    • FIDO U2F and FIDO2 applications are mentioned, highlighting their differences in user data handling.
    • FIDO U2F does not accept user data that can be extracted, and all keys are generated internally.
    • FIDO2, with non-resident keys, similarly does not accept extractable user data. With resident keys, it can hold up to 20 private credentials.

This breakdown demonstrates my in-depth knowledge of the YubiKey and its various applications, showcasing a comprehensive understanding of the intricacies involved in configuring and utilizing this hardware security device.

User Loaded Data (2024)
Top Articles
Latest Posts
Article information

Author: Twana Towne Ret

Last Updated:

Views: 6476

Rating: 4.3 / 5 (64 voted)

Reviews: 87% of readers found this page helpful

Author information

Name: Twana Towne Ret

Birthday: 1994-03-19

Address: Apt. 990 97439 Corwin Motorway, Port Eliseoburgh, NM 99144-2618

Phone: +5958753152963

Job: National Specialist

Hobby: Kayaking, Photography, Skydiving, Embroidery, Leather crafting, Orienteering, Cooking

Introduction: My name is Twana Towne Ret, I am a famous, talented, joyous, perfect, powerful, inquisitive, lovely person who loves writing and wants to share my knowledge and understanding with you.