Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Yubikey support #36

Closed
cyli opened this issue Apr 7, 2014 · 13 comments
Closed

Yubikey support #36

cyli opened this issue Apr 7, 2014 · 13 comments
Milestone

Comments

@cyli
Copy link

cyli commented Apr 7, 2014

Hi! I just want to thank you for your work on this! It's pretty amazing. I was wondering if Yubikey support would be added at any point, since django-otp also supports Yubikeys?

@Bouke
Copy link
Collaborator

Bouke commented Apr 7, 2014

HI @cyli, thank you! And without help from the community, the project wouldn't be in it's current shape :). I'm not familiar with Yubikeys, but if they are already supported by django-otp, then supporting them shouldn't be so hard. Currently it is hard-wired to use certain devices, but with some code Yubikeys could be added. Maybe you could do some looking into how support would be possible? What the correct UX would be, and how this project could support other otp devices as well?

@cyli
Copy link
Author

cyli commented Apr 7, 2014

Hi @Bouke! I'd definitely love to help with this, as well as with the email notification! This project has been really helpful to me for learning how to integrate 2FA with Django - I'm giving a pycon talk about multifactor auth, and pretty much my section on Django is "look at this awesome project which does stuff for you and has an awesome demo teaching you how to integrate everything!"

But I noticed these two points in the last few days, and I wanted to raise them with you and see if they were actual useful things you think would be useful features for django-two-factor-auth before mentioning them in the talk.

@Bouke
Copy link
Collaborator

Bouke commented Apr 8, 2014

It's great to hear that you'll be talking about security in general and including this package in your session is fantastic. If you could share a recording, or otherwise your slides, I would be very honored!

@Bashar
Copy link

Bashar commented Apr 13, 2014

@cyli all kind of yubico's keys work or just the standard? I wish to order few for testing and implementing it with django two factor auth too :)

@cyli
Copy link
Author

cyli commented Apr 14, 2014

@cyli
Copy link
Author

cyli commented Apr 14, 2014

@Bashar: I think just any device supporting the Yubikey algorithm? https://bitbucket.org/psagers/django-otp/src/efb4dccaf25017bb7ada293fbc62f9a8995039c2/django-otp-yubikey/

The Yubikey's Yubikey specific algorithm parts work, but I don't think it supports Symantic Security Credentials, which the Yubikey VIP also supports. But the Nano, Neo, and Standard should all work, and the Yubikey part of the VIP should work I think. :)

@Bouke
Copy link
Collaborator

Bouke commented May 6, 2014

@cyli congrats on the nice talk, I've enjoyed the analogy you used. How was your talk received?

My YubiKey has been delivered and I've started hacking with it. There is a proof of concept in the branch features/yubikey which you're invited to try out. There are probably some rough edges to it, but in the basics it works. Update: also see the unfinished pull request.

@cyli
Copy link
Author

cyli commented May 7, 2014

@Bouke Thanks! People seemed to like it in general. :)

Oh wow, thanks so much for ordering one and working on this! Looking at it now.

@Bouke Bouke added this to the 1.0.0 milestone May 10, 2014
@Bouke Bouke closed this as completed in 99e0808 May 10, 2014
Bouke added a commit that referenced this issue May 10, 2014
YubiKeys offer a OTP, similar to token generator application. The key is
generated by a hardware device, generating a 44 character OTP, which is to be
by YubiCloud (or locally if needed be).
@Bouke
Copy link
Collaborator

Bouke commented May 10, 2014

I've merged the support into master. Have a look at the example app for a demo.

@cyli
Copy link
Author

cyli commented May 11, 2014

This is awesome, thanks so much!

@pckapps
Copy link

pckapps commented Aug 26, 2017

Is the Yubikey option still working on the demo site? I bought this Yubikey, but can't get it loaded. What should I fill in, in the Yubikey field?

@Bouke
Copy link
Collaborator

Bouke commented Aug 30, 2017

I believe that the current Yubikey support is for an older device (Yubico OTP?), not the Yubikey's that implement U2F. We have #86 and #215 for that.

@Wolf480pl
Copy link
Contributor

@pckapps for me the demo does work with my Yubikey NEO, but the demo uses Yubico OTP and not U2F. AFAIK all newer Yubikeys other than the blue U2F-only one, support both U2F and Yubico OTP. You need to have one of your OTP slots configured in YubiOTP mode and loaded with a key thattap th is accepted by yubico servers. Then you focus the text field and tap your yubikey, it should type a one-time password for you.

Still, U2F support would be nicer.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

5 participants