YubiKey
The YubiKey is a hardware authentication device manufactured by Yubico that supports one-time passwords, public key encryption and authentication, and the Universal 2nd Factor (U2F) protocol[1] developed by the FIDO Alliance (FIDO U2F). It allows users to securely log into their accounts by emitting one-time passwords or using a FIDO-based public/private key pair generated by the device. YubiKey also allows for storing static passwords for use at sites that do not support one-time passwords.[2] Facebook uses YubiKey for employee credentials,[3] and Google supports it for both employees and users.[4][5] Some password managers support YubiKey.[6][7]
The Yubikey implements the HMAC-based One-time Password Algorithm (HOTP) and the Time-based One-time Password Algorithm (TOTP), and identifies itself as a keyboard that delivers the one-time password over the USB HID protocol. The YubiKey NEO and YubiKey 4 include protocols such as OpenPGP card using 2048-bit RSA and elliptical curve cryptography (ECC) p256 and p384, Near Field Communication (NFC), and FIDO U2F. The YubiKey allows users to sign, encrypt and decrypt messages without exposing the private keys to the outside world. The 4th generation YubiKey launched on November 16, 2015. It has support for OpenPGP with 4096-bit RSA keys, and PKCS#11 support for PIV smart cards, a feature that allows for code signing of Docker images.[8][9]
Founded in 2007 by CEO Stina Ehrensvärd, Yubico is a private company with offices in Palo Alto, Seattle, and Stockholm.[10] Yubico CTO, Jakob Ehrensvärd, is the lead author of the original strong authentication specification that became known as Universal 2nd Factor (U2F).[11]
ModHex
The YubiKey emits passwords in a modified hexadecimal alphabet, which is designed to be as independent of system keyboard settings as possible. This alphabet, referred to as ModHex or Modified Hexadecimal, consists of the characters cbdefghijklnrtuv, corresponding to the hexadecimal digits 0123456789abcdef.[12]
Security-concerns YubiKey 4 (closed-source code)
Yubico has replaced all open-source components in YubiKey 4 with closed-source code, which can no longer be independently reviewed for security flaws.[13] Yubico states that internal and external review of their code is done. Yubikey NEOs are still using open-source code.[14] On May 16, 2016, Yubico CTO Jakob Ehrensvärd responded to the open-source community's concerns with a blog post [15] affirming the company's strong open source support and addressing the reasons and benefits of updates to the YubiKey 4.
List of supported services/platforms
- Bitbucket
- Compose
- Dashlane
- Digidentity/GOV.UK Verify
- Dropbox
- Facebook (Chrome and Opera only)
- Fastmail
- Google (Chrome only)
- GitLab
- GitHub (Chrome and Opera only)
- Kraken (bitcoin exchange)
- LastPass
- macOS 10.12 Sierra (and beyond)
- Mailbox.org
- Micro Focus
- Nextcloud
- Okta
- Password Safe
- Salesforce
- Sentry
- Thexyz
- Vanguard
- Pluggable Authentication Modules (PAM)
- Posteo
- Microsoft Windows Server 2008 R2 and later servers, and Microsoft Windows 7 and later clients.
- KeePass
- * KeePassXC
See also
References
- ↑ "Specifications Overview". FIDO Alliance. Retrieved 4 December 2015.
- ↑ "What Is A Yubikey". Yubico. Retrieved 7 November 2014.
- ↑ McMillan (3 October 2013). "Facebook Pushes Passwords One Step Closer to Death". Wired. Retrieved 7 November 2014.
- ↑ Diallo, Amadou (30 November 2013). "Google Wants To Make Your Passwords Obsolete". Forbes. Retrieved 15 November 2014.
- ↑ Blackman, Andrew (15 September 2013). "Say Goodbye to the Password". The Wall Street Journal. Retrieved 15 November 2014.
- ↑ "YubiKey Authentication". LastPass. Retrieved 15 November 2014.
- ↑ "KeePass & YubiKey". KeePass. Retrieved 15 November 2014.
- ↑ "Launching The 4th Generation YubiKey". Yubico. Retrieved 20 November 2015.
- ↑ "With a Touch, Yubico, Docker Revolutionize Code Signing". Yubico. Retrieved 20 November 2015.
- ↑ "The Team". Yubico. Retrieved 12 September 2015.
- ↑ "History of FIDO". FIDO Alliance. Retrieved 16 March 2017.
- ↑ E, Jakob (12 June 2008). "Modhex - why and what is it?". Yubico. Retrieved 6 November 2016.
- ↑ Ryabitsev, Konstantin. "I must, sadly, withdraw my endorsement of yubikey 4 devices (and perhaps all ...". Google+. Retrieved 12 November 2016.
- ↑ "dainnilsson commented on 11 May". Github. Retrieved 12 November 2016.
- ↑ "Secure Hardware vs. Open Source". Yubico.com. Retrieved 16 March 2017.