

With the other 32 bytes, they are decrypted using the shared AES key, and then all the values are checked to make sure they are valid (eg counters are all higher than their previous values, checksum is valid, etc). The first 12 chars normally let you work out who's key it is (we still need to ask for your login name, because we you allow you to associate your Yubikey with multiple different accounts if you want). So at the receiving side, you get the 44 char value. Timer field (an internal 8hz counter value).Machine, or generate a new key, internal non-volatile counters are A number of counter fields (each time you plug the key into a.The internal values that are joined and encrypted include:

It then encrypts that data using a symmetric cipher with the sharedĪES key that's stored in the Yubikey, and also on the Yubico server.It takes some internal values and joins them together.The way it generates the one-time value is like this: That encrypted with that key, that's the other 32 characters Each time you press the button, it generates a new one-time value.Each device has an internal "shared secret" AES encryption key.Each device has a unique id, that's the first 12 chars.This prevents replay attacks if someone captures any of your logins (eg keylogger, tcp dump, malware root kit, etc). You can't re-enter an already used one-time password, or copy and paste an existing one-time password. The main advantage of a Yubikey login over a regular static password login is that to login, you must have the physical Yubikey token plugged into your machine, and you must press the button on it to generate a new one-time password. It has one button on it, that when you press it, it generates a new one-time 44 character password. You just plug it into a USB port and it acts like a USB keyboard that most OS's automatically support. The Yubikey doesn't need any client software. The Yubikey is a small USB authentication device that you can use to login to your FastMail account (beta web interface only at the moment) instead of your regular password. Currently these logins only work on the beta server web interface. For the Base Password, just touch your Yubikey button to generate a new one-time code to allow us to associate your particular Yubikey with your account. To enable this, just login and go to Options -> Alternate Logins, and create a new Yubikey login set. We're currently running a trial of Yubikey authentication on our beta server.
