-
Notifications
You must be signed in to change notification settings - Fork 30
Solo2 Key OATH HOTP unable to register with Secrets from Keepass #53
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I think I only implemented standard TOTP on CLI side, might be that. |
Sorry to ask, but what does that mean exactly? I would also be happy to use Challenge-Response (https://richardbenjaminrush.com/keechallenge/) with my Solo2 Key, but i have no idea how to set this up using the CLI at all. |
The following command sequence works for me on Linux (with dev-builds of firmware + CLI):
Regarding challenge-response, we will not implement Yubico's HMAC-SHA1 functionality. The reason is that a) it's proprietary, b) SHA1 is deprecated, and c) FIDO has HMAC-SHA256 functionality built-in via the |
Yes it works, but only with the example secret you used as well. Which wonders me, because there must be a way to generate a usable secret here. How can i generate one? I will not use the example secret for it obviously. And the secrets generated by keepass are not accepted. |
You can take any secret you like and base32-encode it.
However, note that your counterparty will need this secret too; typically that party gives you the secret, base32-encoded. What is an example from keypass? Have you seen https://github.com/google/google-authenticator/wiki/Key-Uri-Format? |
Oh. so the secret has to be Base32 encoded? Still confused. But thanks anyway. will try it that way. |
It is. You can omit the trailing equal signs. |
hmmm, sorry I'm adding myself here, but I do have some strange problem:
Any idea what could be wrong? solo2 app admin version MacOS 12.6, M1 |
Hey running into the same issue as @theerror |
Just getting back, to let you know that on Ventura it's working fine as far as I can say.
|
I was experiencing the |
Thanks for the discussion. I wanted to mention that the issue I ran into was that
Either of these should display |
Uh oh!
There was an error while loading. Please reload this page.
Hello. I am trying to secure my keepass database with OATH HOTP.
So in keepass it lets me generate a random 128-Bit Secret Key or an 256-Bit Secret Key.
Since the example from the CLI is 128-Bit i went with that, but for some reason i am unable to get the CLI to accept the generated Key.
I am always getting
Error: invalid symbol at 4
etc. number always changing when generating a new Secret Key.Since i haven't found to let the CLI generate the Secret, i am a bit lost and the error is not really helpful what is wrong with the key.
I tried to delete and replace the symbols at the mentioned locations but only got to
Error: invalid symbol at 0
And no matter what i change the first number/letter to, it stays at location 0.
Any idea or solution how this is supposed to work?
btw. using the example secret like this:
solo2-v0.1.1-x86_64-pc-windows-msvc.exe app oath register -c 20 -k hotp -d 8 keepass JBSWY3DPEHPK3PXPJBSWY3DPEHPK3PXP
it works, but i don't want to use a secret everybody knows.
The text was updated successfully, but these errors were encountered: