Visit Our UNIX and Linux User Community

Linux and UNIX Man Pages

Test Your Knowledge in Computers #997
Difficulty: Medium
The use of hypervisor technology by malware and rootkits installing themselves as a hypervisor below the operating system is known as hyperjacking.
True or False?
Linux & Unix Commands - Search Man Pages

ykchalresp(1) [debian man page]

ykchalresp(1)						      General Commands Manual						     ykchalresp(1)

NAME
ykchalresp - Perform challenge-response operation with YubiKey SYNOPSIS
ykchalresp [-1 | -2] [-H] [-Y] [-N] [-x] [-v] [-h] OPTIONS
Send a challenge to a YubiKey, and read the response. The YubiKey can be configured with two different C/R modes -- the standard one is a 160 bits HMAC-SHA1, and the other is a YubiKey OTP mimicing mode, meaning two subsequent calls with the same challenge will result in dif- ferent responses. -1 send the challenge to slot 1. This is the default. -2 send the challenge to slot 2. -H send a 64 byte HMAC challenge. This is the default. -Y send a 6 byte Yubico OTP challenge. -N non-blocking mode -- abort if the YubiKey is configured to require a key press before sending the response. -x challenge is hex encoded. -v enable verbose mode. EXAMPLE
The YubiKey challenge-response operation can be demonstrated using the NIST PUB 198 A.2 test vector. First, program a YubiKey with the test vector : $ ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -a 303132333435363738393a3b3c3d3e3f40414243 ... Commit? (y/n) [n]: y $ Now, send the NIST test challenge to the YubiKey and verify the result matches the expected : $ ykchalresp -2 'Sample #2' 0922d3405faa3d194f82a45830737d5cc6c75d24 $ BUGS
Report ykchalresp bugs in the issue tracker <https://github.com/Yubico/yubikey-personalization/issues> SEE ALSO
The ykpersonalize home page <http://code.google.com/p/yubikey-personalization/> YubiKeys can be obtained from Yubico <http://www.yubico.com/>. yubikey-personalization Febuary 2011 ykchalresp(1)

Check Out this Related Man Page

yhsm-yubikey-ksm(1)					      General Commands Manual					       yhsm-yubikey-ksm(1)

NAME
yhsm-yubikey-ksm - Decrypt YubiKey OTPs using an attached YubiHSM SYNOPSIS
yhsm-yubikey-ksm --key-handles ... [options] DESCRIPTION
This is a small network server with a REST-like API that decodes YubiKey OTPs. It can be used as a decryption backend (Key Storage Module) to a validation service such as the YubiCloud. The AES keys of the YubiKeys must be present as AEAD files decryptable to the attached YubiHSM. Such AEADs can for example be created using yhsm-import-keys(1). Note that this daemon is single threaded - it will only handle a single request at once. A request timeout is therefor most important. OPTIONS
-D, --device device file name (default: /dev/ttyACM0) -v, --verbose enable verbose operation --debug enable debug printout, including all data sent to/from YubiHSM --U, --serve-url base base of URL for decrypt web service (default: /yhsm/validate?) --port num port to listen on (default: 8002) --addr addr address to bind to (default: 127.0.0.1) --key-handles kh, --key-handle kh key handles to use for decoding OTPs. Examples : "1", "0xabcd". --aead-dir dir, -B dir base directory for AEADs (default: /var/cache/yubikey-ksm/aeads) --reqtimeout num number of seconds before a request times out (default: 5) --pid-file fn write process id of server to this file BUGS
Report python-pyhsm/yhsm-yubikey-ksm bugs in the issue tracker <https://github.com/Yubico/python-pyhsm/issues/> SEE ALSO
The python-yubico home page <https://github.com/Yubico/python-pyhsm/> YubiHSMs can be obtained from Yubico <http://www.yubico.com/>. python-pyhsm December 2011 yhsm-yubikey-ksm(1)

14 More Discussions You Might Find Interesting

1. UNIX for Dummies Questions & Answers

hyperterm settings for an sgi challenge s server?

i finally got around to splicing a din-8 to db-9 cable that falls under the sgi specs. however, i can't find anything in the challenge s user manual that gives the needed for hyperterminal to make the serial output come on screen. can anyone help me out with what i should be? (3 Replies)
Discussion started by: xyyz
3 Replies

2. UNIX for Dummies Questions & Answers

Loaded question - anyone up to the challenge?

Hello everyone. I am new to these forums and also new to Unix. And by saying "new to Unix" I mean I have never used it and 10 minutes ago was asked to start learning. So here I am. I was wondering if anyone could help me find out how long it would take to write code in Unix that will do the... (1 Reply)
Discussion started by: idesaj
1 Replies

3. UNIX for Advanced & Expert Users

safeword challenge

Hi, there are some servers here at work which issue a Safeword challenge after I login. Can anyone tell me exactly how the challenge/response system works? In particular, how are the valid keys decided? (2 Replies)
Discussion started by: blowtorch
2 Replies

4. Cybersecurity

Password-based challenge-response

Hello all, I have this question, hope to get some guidance... Fora simple password-based challenge-response protocol between a user A and a server S, where Pa is A's password, n is a random nonce generated by the server, and h is a known cryptographic hash function. 1. S -> A:... (1 Reply)
Discussion started by: heroine
1 Replies

5. UNIX for Dummies Questions & Answers

A challenge for you sed/awk wizards...

Here's a challenge for you wizards... I have a file formatted as follows; $ What I need to output is; 87654321 Bobby One 12345678 Bobby One 09876543 Bobby One 1107338 Bobby! Two Any Ideas how I can do this? I've tried sed but I'm not sure if perl might be a better way to... (2 Replies)
Discussion started by: th3g0bl1n
2 Replies

6. IP Networking

netperf reslt TCP_RR TCP_STREAM is stange,help me

send byte=10 , I test two target, A and B different os. The TCP_STREAM' s result is higher than B but TCP_RR result is lower than B why? please help me (0 Replies)
Discussion started by: yanglei_fage
0 Replies

7. Shell Programming and Scripting

PS1 challenge

Ok then i Have a challenge for you : Give me PS1 so that it always display the least 2 levels of directory (except if i am above of course) I want it this way : so if i go to / /home/ /home/user /home/user/whatever /home/user/whatever1/whatever2 my PS1 should respectively... (12 Replies)
Discussion started by: ctsgnb
12 Replies

8. Shell Programming and Scripting

Substring and Join

Experts, Im struggling with something for the past hour or so and here is the challenge. File1: DO93948388 LDCNND 343 48848 -- Row1 DKKDF9933433 DKK 3384774 DLLFLFD -- Row2 DKKFJ38383734 DJF934988 REPFD FD -- Row3 File2: LDCNNDDKJF --- Row1... (5 Replies)
Discussion started by: OMLEELA
5 Replies

9. Shell Programming and Scripting

Automating a Challenge/Response Method.

Hi guys, I will need some help with a to automate a challenge/response sequence when I try to SCP files from a server to another. The scenario is like this : After selecting in a script the option to send files via scp (case switch): I get this output from linux term: The... (4 Replies)
Discussion started by: REX:)
4 Replies

10. Shell Programming and Scripting

Help with AWK

Hello there! I'm wondering if anyone can help me with this little (big) challenge! I have a file, with about 30 blocks, each one with the same structure as the following: Timestamp: 14:52:50 +++++ STCP DEVICE METERS +++++ netstat -interface #sdlmux.m5.13.1.0 MAC Type : CSMA/CD... (7 Replies)
Discussion started by: psychosb
7 Replies

11. Programming

Map with struct as key and vector as value

Hello, Trying to challenge myself with C++ STL. I want to read in data from file and do some calculation, adapted from an exercise of a book (C++ for engineers and scientist, 3rd Ed, Gary Bronson). infile is like: ID Name Course Credit Grade 2333021 Bokow,R. NS201 3 A 2333021 Bokow,R.... (19 Replies)
Discussion started by: yifangt
19 Replies

12. Shell Programming and Scripting

Anyone like a challenge?

I have searched through google, and this forum to try and find the answer, but alas, nothing quite hits the whole answer. I am trying to read the last line (or lines) of some log files. I do this often. The files are named sequentially, using the date as part of the file name, and appending... (18 Replies)
Discussion started by: BatterBits
18 Replies

13. Shell Programming and Scripting

Modify CSV file

Hi, I would like to change my CSV file by adding " and : and moving some of the information around. the CSV file looks as follows: 501254424;500440257;PE PACKS;300467279;PREP;;276476070;655031001867176;Two Block;Olga;25/12/2015 00:00:00;Olga I would like to move the field 7 to the front "... (13 Replies)
Discussion started by: omuhans123
13 Replies

14. UNIX for Beginners Questions & Answers

How to write in multiple output files in perl?

hi, Hope you are doing good. During my coding yesterday i got this challenge, actually not a challenge it like to optimize the code. I am printing some statement to monitor the file progress in the log file an also to display it in the screen. so i ended up in the below statements. ... (6 Replies)
Discussion started by: mad man
6 Replies

Featured Tech Videos