Bug 2162909 - I'm prompted to touch the Yubikey twice.
Summary: I'm prompted to touch the Yubikey twice.
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Fedora
Classification: Fedora
Component: ykocli
Version: 37
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: ---
Assignee: Gerald Cox
QA Contact:
URL:
Whiteboard:
: 2162898 (view as bug list)
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-01-21 23:30 UTC by Björn Persson
Modified: 2023-01-31 01:57 UTC (History)
1 user (show)

Fixed In Version: ykocli-1.2.0-1.fc38 ykocli-1.3.1-1.fc37
Clone Of:
Environment:
Last Closed: 2023-01-23 15:21:55 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Björn Persson 2023-01-21 23:30:17 UTC
Description of problem:
When I specify an account on the command line, I have to touch the Yubikey twice before a one-time passcode is generated. Once is enough, thanks.

Version-Release number of selected component:
1.1.1-1.fc37

How reproducible:
seems deterministic so far

Steps to Reproduce:
1: ykocli totp foo
The prompt "Touch your YubiKey..." is displayed and the Yubikey blinks.
2: Touch the Yubikey.
The prompt "Touch your YubiKey..." is displayed a second time and the Yubikey blinks.
3: Touch the Yubikey again.

Actual results:
After the second time I touch the Yubikey, a one-time passcode is generated:

Entry Foo has been selected
TOTP token 123456 is now in the clipboard

Expected results:
It should be enough to touch the Yubikey once. Yubioath-desktop never asked me to do it twice.

Comment 1 Gerald Cox 2023-01-22 00:58:05 UTC
I'll take a look at that.  I have never configured my yubikeys to require a touch for a totp code. Curious, why you would configure your yubikey to require a touch for that....

Comment 2 Gerald Cox 2023-01-22 01:37:17 UTC
*** Bug 2162898 has been marked as a duplicate of this bug. ***

Comment 3 Björn Persson 2023-01-22 17:02:18 UTC
(In reply to Gerald Cox from comment #1)
> Curious, why you would configure your yubikey to
> require a touch for that....

To prevent malware from generating codes at will, of course.

If I wouldn't require touch, then there would be no practical difference from storing the secret on an ordinary disk, SSD, USB memory or whatever. Then I could just as well use Pass-OTP or some simple script around Oathtool, and not bother with the Yubikey.

Comment 4 Fedora Update System 2023-01-23 15:19:34 UTC
FEDORA-2023-d27c76f394 has been submitted as an update to Fedora 38. https://bodhi.fedoraproject.org/updates/FEDORA-2023-d27c76f394

Comment 5 Fedora Update System 2023-01-23 15:21:55 UTC
FEDORA-2023-d27c76f394 has been pushed to the Fedora 38 stable repository.
If problem still persists, please make note of it in this bug report.

Comment 6 Gerald Cox 2023-01-23 15:26:38 UTC
According to yubico, once your secret is on the key, it's safe.  It can't 
be extracted. So that's a big difference.  As far as the touch option itself,
the default is "no touch".  I suppose an attack is theoretically possible, 
but IMO for the vast majority of users, the convenience of no-touch outweighs
the risk of not having it - and apparently yubico believes the same since
that is the default.

That said, I agree it's a good capability to add. Thanks for recommending.

Comment 7 Fedora Update System 2023-01-23 15:31:11 UTC
FEDORA-2023-e2e6e622af has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2023-e2e6e622af

Comment 8 Fedora Update System 2023-01-23 17:38:19 UTC
FEDORA-2023-208b0260aa has been submitted as an update to Fedora 37. https://bodhi.fedoraproject.org/updates/FEDORA-2023-208b0260aa

Comment 9 Fedora Update System 2023-01-25 03:18:12 UTC
FEDORA-2023-208b0260aa has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-208b0260aa`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-208b0260aa

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 10 Fedora Update System 2023-01-27 17:23:22 UTC
FEDORA-2023-cdf5d80cbb has been pushed to the Fedora 37 testing repository.
Soon you'll be able to install the update with the following command:
`sudo dnf upgrade --enablerepo=updates-testing --refresh --advisory=FEDORA-2023-cdf5d80cbb`
You can provide feedback for this update here: https://bodhi.fedoraproject.org/updates/FEDORA-2023-cdf5d80cbb

See also https://fedoraproject.org/wiki/QA:Updates_Testing for more information on how to test updates.

Comment 11 Fedora Update System 2023-01-31 01:57:06 UTC
FEDORA-2023-cdf5d80cbb has been pushed to the Fedora 37 stable repository.
If problem still persists, please make note of it in this bug report.


Note You need to log in before you can comment on or make changes to this bug.