You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When using LUKS with the default compiled-in key and passphrase parameters, the password length is limited to 512 bits. According to cryptsetup --help, the maximum keyfile size is 8192kB and the maximum interactive passphrase length is 512 characters.
Additionally, we must consider the possibility that the external hardware key may not be trustworthy. It could have security flaws or might store all input values.
Furthermore, the user always enters a password with a maximum length of 512 bits or longer.
Yubico limits the maximum input of its HMAC-SHA1 challenge-response to a 64-bit input value
Here is the proposed process, an idea of mine:
Hash the password using SHA-512, then hash the resulting output again using CRC64 to generate a 64-bit input value for the challenge-response.
The challenge-response mechanism returns a "6-10 digit HOTP as the response code" ( as written on Yubico Doc it only uses 6-10 digit Code for HOTP, but is there a differnt response for Challenge-response ?? .
Concatenate the password with the response code.
Hash the resulting value with SHA-512.
The resulting hash is now the final passphrase to be used for LUKS.
The text was updated successfully, but these errors were encountered:
The challenge-response mechanism returns a "6-10 digit HOTP as the response code" ( as written on Yubico Doc it only uses 6-10 digit Code for HOTP, but is there a differnt response for Challenge-response ?? .
The default yubikey response is HMAC-SHA1 (not to be confused with insecure plain SHA1). if it was initialized correctly There is option to get HOTP digit code instead but that's not for this usecase, see ykchalresp manual.
When using LUKS with the default compiled-in key and passphrase parameters, the password length is limited to 512 bits. According to cryptsetup --help, the maximum keyfile size is 8192kB and the maximum interactive passphrase length is 512 characters.
Additionally, we must consider the possibility that the external hardware key may not be trustworthy. It could have security flaws or might store all input values.
Furthermore, the user always enters a password with a maximum length of 512 bits or longer.
Yubico limits the maximum input of its HMAC-SHA1 challenge-response to a 64-bit input value
Here is the proposed process, an idea of mine:
Hash the password using SHA-512, then hash the resulting output again using CRC64 to generate a 64-bit input value for the challenge-response.
The challenge-response mechanism returns a "6-10 digit HOTP as the response code" ( as written on Yubico Doc it only uses 6-10 digit Code for HOTP, but is there a differnt response for Challenge-response ?? .
Concatenate the password with the response code.
Hash the resulting value with SHA-512.
The resulting hash is now the final passphrase to be used for LUKS.
The text was updated successfully, but these errors were encountered: