ykchalresp(1) General Commands Manual ykchalresp(1)NAME
ykchalresp - Perform challenge-response operation with YubiKey
SYNOPSIS
ykchalresp [-1 | -2] [-H] [-Y] [-N] [-x] [-v] [-h]
OPTIONS
Send a challenge to a YubiKey, and read the response. The YubiKey can be configured with two different C/R modes -- the standard one is a
160 bits HMAC-SHA1, and the other is a YubiKey OTP mimicing mode, meaning two subsequent calls with the same challenge will result in dif-
ferent responses.
-1 send the challenge to slot 1. This is the default.
-2 send the challenge to slot 2.
-H send a 64 byte HMAC challenge. This is the default.
-Y send a 6 byte Yubico OTP challenge.
-N non-blocking mode -- abort if the YubiKey is configured to require a key press before sending the response.
-x challenge is hex encoded.
-v enable verbose mode.
EXAMPLE
The YubiKey challenge-response operation can be demonstrated using the NIST PUB 198 A.2 test vector.
First, program a YubiKey with the test vector :
$ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -a 303132333435363738393a3b3c3d3e3f40414243
...
Commit? (y/n) [n]: y
$
Now, send the NIST test challenge to the YubiKey and verify the result matches the expected :
$ ykchalresp -2 'Sample #2'
0922d3405faa3d194f82a45830737d5cc6c75d24
$
BUGS
Report ykchalresp bugs in the issue tracker <https://github.com/Yubico/yubikey-personalization/issues>
SEE ALSO
The ykpersonalize home page <http://code.google.com/p/yubikey-personalization/>
YubiKeys can be obtained from Yubico <http://www.yubico.com/>.
yubikey-personalization Febuary 2011 ykchalresp(1)
Check Out this Related Man Page
yhsm-yubikey-ksm(1) General Commands Manual yhsm-yubikey-ksm(1)NAME
yhsm-yubikey-ksm - Decrypt YubiKey OTPs using an attached YubiHSM
SYNOPSIS
yhsm-yubikey-ksm --key-handles ... [options]
DESCRIPTION
This is a small network server with a REST-like API that decodes YubiKey OTPs.
It can be used as a decryption backend (Key Storage Module) to a validation service such as the YubiCloud.
The AES keys of the YubiKeys must be present as AEAD files decryptable to the attached YubiHSM. Such AEADs can for example be created using
yhsm-import-keys(1).
Note that this daemon is single threaded - it will only handle a single request at once. A request timeout is therefor most important.
OPTIONS -D, --device
device file name (default: /dev/ttyACM0)
-v, --verbose
enable verbose operation
--debug
enable debug printout, including all data sent to/from YubiHSM
--U, --serve-url base
base of URL for decrypt web service (default: /yhsm/validate?)
--port num
port to listen on (default: 8002)
--addr addr
address to bind to (default: 127.0.0.1)
--key-handles kh, --key-handle kh
key handles to use for decoding OTPs. Examples : "1", "0xabcd".
--aead-dir dir, -B dir
base directory for AEADs (default: /var/cache/yubikey-ksm/aeads)
--reqtimeout num
number of seconds before a request times out (default: 5)
--pid-file fn
write process id of server to this file
BUGS
Report python-pyhsm/yhsm-yubikey-ksm bugs in the issue tracker <https://github.com/Yubico/python-pyhsm/issues/>
SEE ALSO
The python-yubico home page <https://github.com/Yubico/python-pyhsm/>
YubiHSMs can be obtained from Yubico <http://www.yubico.com/>.
python-pyhsm December 2011 yhsm-yubikey-ksm(1)
i finally got around to splicing a din-8 to db-9 cable that falls under the sgi specs.
however, i can't find anything in the challenge s user manual that gives the needed for hyperterminal to make the serial output come on screen.
can anyone help me out with what i should be? (3 Replies)
Hello everyone. I am new to these forums and also new to Unix. And by saying "new to Unix" I mean I have never used it and 10 minutes ago was asked to start learning. So here I am.
I was wondering if anyone could help me find out how long it would take to write code in Unix that will do the... (1 Reply)
Hi, there are some servers here at work which issue a Safeword challenge after I login. Can anyone tell me exactly how the challenge/response system works? In particular, how are the valid keys decided? (2 Replies)
Hello all,
I have this question, hope to get some guidance...
Fora simple password-based challenge-response protocol between a user A
and a server S, where Pa is A's password, n is a random nonce generated
by the server, and h is a known cryptographic hash function.
1. S -> A:... (1 Reply)
Here's a challenge for you wizards...
I have a file formatted as follows;
$
What I need to output is;
87654321 Bobby One
12345678 Bobby One
09876543 Bobby One
1107338 Bobby! Two
Any Ideas how I can do this? I've tried sed but I'm not sure if perl might be a better way to... (2 Replies)
send byte=10 ,
I test two target, A and B different os.
The TCP_STREAM' s result is higher than B
but TCP_RR result is lower than B
why? please help me (0 Replies)
Ok then i Have a challenge for you :
Give me PS1 so that it always display the least 2 levels of directory
(except if i am above of course)
I want it this way :
so if i go to
/
/home/
/home/user
/home/user/whatever
/home/user/whatever1/whatever2
my PS1 should respectively... (12 Replies)
Experts,
Im struggling with something for the past hour or so and here is the challenge.
File1:
DO93948388 LDCNND 343 48848 -- Row1
DKKDF9933433 DKK 3384774 DLLFLFD -- Row2
DKKFJ38383734 DJF934988 REPFD FD -- Row3
File2:
LDCNNDDKJF --- Row1... (5 Replies)
Hi guys,
I will need some help with a to automate a challenge/response sequence when I try to SCP files from a server to another.
The scenario is like this :
After selecting in a script the option to send files via scp (case switch):
I get this output from linux term:
The... (4 Replies)
Hello there!
I'm wondering if anyone can help me with this little (big) challenge!
I have a file, with about 30 blocks, each one with the same structure as the following:
Timestamp: 14:52:50
+++++ STCP DEVICE METERS +++++
netstat -interface #sdlmux.m5.13.1.0
MAC Type : CSMA/CD... (7 Replies)
Hello,
Trying to challenge myself with C++ STL.
I want to read in data from file and do some calculation, adapted from an exercise of a book (C++ for engineers and scientist, 3rd Ed, Gary Bronson).
infile is like:
ID Name Course Credit Grade
2333021 Bokow,R. NS201 3 A
2333021 Bokow,R.... (19 Replies)
I have searched through google, and this forum to try and find the answer, but alas, nothing quite hits the whole answer.
I am trying to read the last line (or lines) of some log files. I do this often.
The files are named sequentially, using the date as part of the file name, and appending... (18 Replies)
Hi, I would like to change my CSV file by adding " and : and moving some of the information around. the CSV file looks as follows:
501254424;500440257;PE PACKS;300467279;PREP;;276476070;655031001867176;Two Block;Olga;25/12/2015 00:00:00;Olga
I would like to move the field 7 to the front "... (13 Replies)
hi,
Hope you are doing good.
During my coding yesterday i got this challenge, actually not a challenge it like to optimize the code.
I am printing some statement to monitor the file progress in the log file an also to display it in the screen. so i ended up in the below statements.
... (6 Replies)