<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Smartphone &#8211; privacyID3A</title>
	<atom:link href="https://www.privacyidea.org/tag/smartphone/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.privacyidea.org</link>
	<description>flexible, Open Source Multi Factor Authentication (2FA)</description>
	<lastBuildDate>Wed, 20 Dec 2017 07:39:54 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.7.5</generator>

<image>
	<url>https://www.privacyidea.org/wp-content/uploads/2016/06/cropped-only-logo-white-background-32x32.png</url>
	<title>Smartphone &#8211; privacyID3A</title>
	<link>https://www.privacyidea.org</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>privacyIDEA 2.21  with a more secure smartphone enrollment</title>
		<link>https://www.privacyidea.org/privacyidea-2-21-with-a-more-secure-smartphone-enrollment/</link>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 20 Dec 2017 06:33:33 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Audit]]></category>
		<category><![CDATA[Enrollment]]></category>
		<category><![CDATA[Event Handler]]></category>
		<category><![CDATA[FOSDEM]]></category>
		<category><![CDATA[Smartphone]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=1306</guid>

					<description><![CDATA[Today we released privacyIDEA 2.21. It is available in the Ubuntu repositories for Ubuntu 16.04LTS and 14.04LTS. You can also update and install privacyIDEA on any distribution via the Python Package Index. Secure Rollout of a smartphone app The central new feature of privacyIDEA 2.21 is the possibility to enroll a smartphone token in a [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><a href="https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser.png"><img decoding="async" class="aligncenter wp-image-1310 size-full" src="https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser.png" alt="The privacyIDEA Authenticator allows secure enrollment of smartphones" width="480" height="400" srcset="https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser.png 480w, https://www.privacyidea.org/wp-content/uploads/2017/12/privacyidea-Authenticator-teaser-300x250.png 300w" sizes="(max-width: 480px) 100vw, 480px" /></a>Today we released privacyIDEA 2.21. It is available in the <a href="http://privacyidea.readthedocs.io/en/latest/installation/ubuntu.html" target="_blank" rel="noopener">Ubuntu repositories for Ubuntu 16.04LTS and 14.04LTS</a>. You can also update and install privacyIDEA <a href="http://privacyidea.readthedocs.io/en/latest/installation/index.html" target="_blank" rel="noopener">on any distribution via the Python Package Index</a>.</p>
<h2>Secure Rollout of a smartphone app</h2>
<p>The central new feature of privacyIDEA 2.21 is the possibility to enroll a smartphone token in a more secure way. privacyIDEA supported smartphone Apps like the Google Authenticator and FreeOTP right from the start. But you already might be aware of the <a href="https://netknights.it/en/the-problem-with-the-google-authenticator/" target="_blank" rel="noopener">problems with enrolling smartphone tokens</a>.</p>
<p>This is why we added a 2-step enrollment in privacyIDEA 2.21.</p>
<h3>2-Step enrollment in privacyIDEA 2.21</h3>
<p>Using privacyIDEA you have now the possibility to enroll a smartphone token in a much securer way. The sensitive secret key is created from a part generated on the server side and a second part generated on the phone side. This way an attacker can no longer easily copy the smartphone token during the enrollment process. You can find a more technical specification of the <a href="http://privacyidea.readthedocs.io/en/latest/workflows_and_tools/2step/index.html" target="_blank" rel="noopener">two step enrollment in the online documentation</a>.</p>
<figure id="attachment_1308" aria-describedby="caption-attachment-1308" style="width: 353px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640.jpg"><img decoding="async" class="wp-image-1308" src="https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640.jpg" alt="More secure enrollment of a smartphone app." width="353" height="202" srcset="https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640.jpg 640w, https://www.privacyidea.org/wp-content/uploads/2017/12/hands-1167612_640-300x172.jpg 300w" sizes="(max-width: 353px) 100vw, 353px" /></a><figcaption id="caption-attachment-1308" class="wp-caption-text">More secure enrollment of a smartphone app.</figcaption></figure>
<p>The new privacyIDEA Authenticator App will support this new two step enrollment and is also backward compatible to the normal Google Authenticator enrollment URI. <a href="https://netknights.it/en/privacyidea-authenticator-the-better-smartphone-factor/" target="_blank" rel="noopener">Ask the company NetKnights to be part of the beta testing phase of the privacyIDEA Authenticator App</a>.</p>
<h2>Easy administration</h2>
<p>Many enhancements will make the daily life easier for the token administrator. The root user can now export an encrypted PSKC file. The data can then be imported to another privacyIDEA instance or to any other RFC6030 complient applicantion. The event handlers were also improved: The Notification handler now has more tags to be used in the body and the Federation handler can forward administrative requests.</p>
<h2>Clean-up Audit log</h2>
<p>Audit Log can be rotated in a more sophisticated way. The administrator can specify retention times for different log entries.</p>
<h2>Better HSM support</h2>
<p>Hardware Securtiy Modules can now be used to generate random numbers at many different places within privacyIDEA:</p>
<p>You can view a complete <a href="https://github.com/privacyidea/privacyidea/blob/master/Changelog" target="_blank" rel="noopener">changelog at github</a>.</p>
<h2>Enterprise Edition</h2>
<p>If you are running large mission critical setups, privacyIDEA is also available as <a href="https://netknights.it/en/produkte/privacyidea/" target="_blank" rel="noopener">Enterprise Edition with support and warranty/liability</a>.</p>
<h2>privacyIDEA going FOSDEM</h2>
<p>The privacyIDEA project will be at FOSDEM 2018 on February 3rd and 4th. We have a stand in building H. <a href="https://www.privacyidea.org/privacyidea-going-fosdem/">Please join us there</a>!</p>
<p>&nbsp;</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>privacyIDEA 2.6 released. TiQR, 4-Eyes and Challenge Response</title>
		<link>https://www.privacyidea.org/privacyidea-2-6-released-tiqr-4-eyes-and-challenge-response/</link>
					<comments>https://www.privacyidea.org/privacyidea-2-6-released-tiqr-4-eyes-and-challenge-response/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Wed, 09 Sep 2015 07:10:01 +0000</pubDate>
				<category><![CDATA[release]]></category>
		<category><![CDATA[Whatsup]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[TiQR]]></category>
		<category><![CDATA[Token Types]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=733</guid>

					<description><![CDATA[Today privacyIDEA version 2.6 was released. This release eases the way of authentication by providing a new token TiQR. The TiQR token is based on the OCRA protocol, which is a challenge response protocol, that can be used to authenticate or to sign transaction data. The TiQR token is a smartphone app. Authentication is as [&#8230;]]]></description>
										<content:encoded><![CDATA[<figure id="attachment_734" aria-describedby="caption-attachment-734" style="width: 250px" class="wp-caption alignleft"><a href="https://www.privacyidea.org/wp-content/uploads/2015/09/Tiqr_400x400.jpg"><img loading="lazy" decoding="async" class="wp-image-734 " src="https://www.privacyidea.org/wp-content/uploads/2015/09/Tiqr_400x400-300x300.jpg" alt="Tiqr_400x400" width="250" height="250" srcset="https://www.privacyidea.org/wp-content/uploads/2015/09/Tiqr_400x400-300x300.jpg 300w, https://www.privacyidea.org/wp-content/uploads/2015/09/Tiqr_400x400-150x150.jpg 150w, https://www.privacyidea.org/wp-content/uploads/2015/09/Tiqr_400x400.jpg 400w" sizes="auto, (max-width: 250px) 100vw, 250px" /></a><figcaption id="caption-attachment-734" class="wp-caption-text">Image by SurfNet BV</figcaption></figure>
<p>Today privacyIDEA version 2.6 was released. This release eases the way of authentication by providing a new token <strong>TiQR</strong>. The <a href="http://tiqr.org" target="_blank">TiQR token</a> is based on the <a href="http://tools.ietf.org/html/rfc6287" target="_blank">OCRA</a> protocol, which is a challenge response protocol, that can be used to authenticate or to sign transaction data.</p>
<p>The TiQR token is a smartphone app. Authentication is as easy as scanning a QR code.</p>
<p>Furthermore you can now login to the privacyIDEA Web UI using challenge response. Each token, that supports c<strong>hallenge response,</strong> can be used to authenticate at the Web <strong>UI</strong>. This can be simple HOTP or TOTP tokens but also tokens like SMS or Email. Of course authenticating with the new TiQR token is also possible. See this <a href="https://www.youtube.com/watch?v=mBQG0WX4Rgo" target="_blank">screencast</a> to get an idea of the smooth authentication.</p>
<p>Another interesting new feature is the <strong>4-eyes token</strong>. This token is a meta token, that bundles two existing hardware token to one. This way you can require a two man rule for certain sensitive accounts. It was already introduced in <a href="https://www.privacyidea.org/4-eyes-principle-or-two-man-rule-with-privacyidea/">this blog post</a>.</p>
<p>This is the complete changelog:</p>
<h3>Features</h3>
<ul>
<li>Add OCRA base TiQR token to authenticate by scanning a QR code.</li>
<li>Add Challenge Response authentication to Web UI.</li>
<li>Add 4-Eyes token, to enable two man policy. Two tokens of two users are needed to authenticate.</li>
<li>&#8220;Revoke Token&#8221; lets you perform special action on token types. Tokens can be revoke, meaning they are blocked an can not be unblocked anymore.</li>
</ul>
<h3>Enhancements</h3>
<ul>
<li>Add HA information in the documentation.</li>
<li>Add OpenVPN documentation.</li>
<li>Add challenge response policy, to define if e.g. HOTP or TOTP are allowed to be used in challenge response mode.</li>
<li>Add hotkeys for easier use of Web Ui.</li>
<li>Remove wrong system wide PassOnNoUser and PassOnNoToken.</li>
<li>Set default language to &#8220;en&#8221; in Web UI.</li>
</ul>
<h3>Fixes</h3>
<ul>
<li>Fix <a href="https://www.privacyidea.org/bug-in-ldap-resolver-up-to-privacyidea-2-5/">LDAP bug #179</a>, which allows authentication with wrong password under certain conditions.</li>
<li>Small fixes in coverage tests.</li>
<li>Fix username in web UI during enrollment.</li>
<li>Fix link to privacyIDEA logo in Web UI.</li>
<li>Fixed bug, that user was not able to resync his own tokens.</li>
</ul>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/privacyidea-2-6-released-tiqr-4-eyes-and-challenge-response/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>f*** the smartphone</title>
		<link>https://www.privacyidea.org/f-the-smartphone/</link>
					<comments>https://www.privacyidea.org/f-the-smartphone/#respond</comments>
		
		<dc:creator><![CDATA[Cornelius Kölbel]]></dc:creator>
		<pubDate>Tue, 07 Jul 2015 19:13:44 +0000</pubDate>
				<category><![CDATA[opinions]]></category>
		<category><![CDATA[FreeOTP]]></category>
		<category><![CDATA[Google Authenticator]]></category>
		<category><![CDATA[rant]]></category>
		<category><![CDATA[Smartphone]]></category>
		<category><![CDATA[Token Security]]></category>
		<guid isPermaLink="false">https://www.privacyidea.org/?p=674</guid>

					<description><![CDATA[I am really puzzled and scared by many modern &#8220;security&#8221; consultants who claim the smartphone to be the next security device or even my identification object. Knowing that the smartphone has more cores than most desktop computers, is connected faster to the internet (thanks to LTE) than most land line bound computers and most older [&#8230;]]]></description>
										<content:encoded><![CDATA[<figure id="attachment_689" aria-describedby="caption-attachment-689" style="width: 121px" class="wp-caption alignright"><a href="https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280.png"><img loading="lazy" decoding="async" class=" wp-image-689" src="https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280-194x300.png" alt="by OpenClipartVectors @pixabay" width="121" height="187" srcset="https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280-194x300.png 194w, https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280-661x1024.png 661w, https://www.privacyidea.org/wp-content/uploads/2015/07/smartphone-153650_1280.png 826w" sizes="auto, (max-width: 121px) 100vw, 121px" /></a><figcaption id="caption-attachment-689" class="wp-caption-text">by OpenClipartVectors @pixabay</figcaption></figure>
<p>I am really puzzled and scared by many modern &#8220;security&#8221; consultants who claim the smartphone to be the next security device or even my identification object. Knowing that</p>
<ul>
<li>the smartphone has more cores than most desktop computers,</li>
<li>is connected faster to the internet (thanks to LTE) than most land line bound computers</li>
<li>and most older smartphones get no software updates fixing security issues,</li>
</ul>
<p>this is a really scary scenario.</p>
<p>And the scariest thing of all is, that most users are not aware of this and are installing third party applications (belittling it as &#8220;App&#8221;) by a blink of an eye or the touch of a finger tip. Waving through all rights and access grants such an &#8220;App&#8221; wants to get.</p>
<p>Knowing this I am getting sick reading sentences like that on a daily basis:</p>
<blockquote><p>We can achieve the same level of security as from a physical token using a simple app and a public algorithm to generate Time-based One-Time Passwords (TOTP), for example.</p></blockquote>
<p style="text-align: right;"><a href="http://www.businesscomputingworld.co.uk/the-end-of-the-password-as-we-know-it/">http://www.businesscomputingworld.co.uk/the-end-of-the-password-as-we-know-it/</a></p>
<p>This in fact is not true. A hardware token has NOT far as many attack vectors like a smartphone, from which you can steal the secret key, that is used to calculate the OTP values. TOTP (<a href="https://tools.ietf.org/html/rfc6238#section-1.2" target="_blank">RFC6238</a>) is based on HOTP (RFC4226) which relies on a secret shared key. This secret key is used to generate the OTP value. If the secret key is stolen from the smartphone either by</p>
<ul>
<li>physical access to the smartphone or</li>
<li>by remote access via a trojan</li>
</ul>
<p>the key is also known to the attacker.</p>
<p>And now comes the nasty part with TOTP: As TOTP only relies on the secret key and the time (which is known to everyone), an attacker can impersonate the user WITHOUT him NOTICING it. The OTP value an attacker generates will be a valid OTP value. The OTP value, the user generates a few minutes later, will also be a valid OTP value. The user will only experience a small &#8220;hickup&#8221; if he would try to authenticate within 29 seconds after the attacker did. Would the user care? Or would he just try a second time?</p>
<p>Don&#8217;t get me wrong. The smartphone with a Google Authenticator or FreeOTP is a great device to increase security in an easy and CHEAP! way. But it has those problems a hardware token does not.</p>
<p>A preseeded hardware token of course has the problem, that the secret key was installed at the vendors site and I do not ask you to trust the vendor.</p>
<p>But there are also hardware tokens that you can initialize yourself. Then you are the only one who knows the secret key and the secret key can not get extracted from the hardware remotely.</p>
<p>So it is important to know what you are doing and decide which level of security you want to achieve. But it is a sham telling that a smartphone will get you the same level of security as a hardware token does!</p>
<p>Luckily you can choose what level of security you want to achieve, when using privacyIDEA.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.privacyidea.org/f-the-smartphone/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
