2014-08-11 16:05:27 +02:00
Validation Protocol Version 2.0
===============================
2014-08-11 15:52:11 +02:00
2014-08-11 16:05:27 +02:00
## Introduction
2014-08-11 15:52:11 +02:00
All requests are HTTP GET requests. As such, all parameters must be
properly URL encoded. In particular, some base64 characters (such as
"+") in the value fields needs to be escaped.
Each response sent by the server is signed. To verify that the
response has not been tampered with, clients either verify the HMAC
signature or use HTTPS connections (and verify the server
certificate).
2014-08-11 16:05:27 +02:00
## Generating signatures
2014-08-11 15:52:11 +02:00
The protocol uses HMAC-SHA-1 signatures. The HMAC key to use is the
client API key.
Generate the signature over the parameters in the message. Each
message contains a set of key/value pairs, and the signature is always
over the entire set (excluding the signature itself), and sorted in
alphabetical order of the keys. More precisely, to generate a message
signature do:
2014-08-11 16:05:27 +02:00
* Alphabetically sort the set of key/value pairs by key order.
* Construct a single line with each ordered key/value pair concatenated using '&', and each key and value contatenated with '='. Do not add any linebreaks. Do not add whitespace. For example: `a=2&b=1&c=3`.
* Apply the HMAC-SHA-1 algorithm on the line as an octet string using the API key as key.
* Base 64 encode the resulting value according to RFC 4648, for example, `t2ZMtKeValdA+H0jVpj3LIichn4=`.
* Append the value under key 'h' to the message.
2014-08-11 15:52:11 +02:00
2014-08-11 16:05:27 +02:00
## Verifying signatures
2014-08-11 15:52:11 +02:00
To verify a signature on a response message, follow the same procedure
that was used to sign the response message and compare the signature
in the response to the signature you generated. If the signature
values are equal, the signature is correct. Make sure you remove the
signature itself from the values you generate the signature over for
verification. If the incoming message is
```
b=1&a=2&c=3&h=V5FkMYr9GCG9tQA9ihuuybWl99U=
```
make sure to remove h before verifying:
```
b=1&a=2&c=3
```
Don't forget to sort the key/value pairs.
2014-08-11 16:05:27 +02:00
## Verification
2014-08-11 15:52:11 +02:00
2014-08-11 16:05:27 +02:00
There is one call to verify YubiKey OTPs: verify.
2014-08-11 15:52:11 +02:00
The verify call lets you check whether an OTP is valid. Since the OTP
itself contains identification information, all you have to do is to
send the OTP.
To avoid cut'n'paste attacks, the client MUST verify that the "otp" in
the response is the same as the "otp" supplied in the request.
2014-08-11 16:05:27 +02:00
## Request
2014-08-11 15:52:11 +02:00
Construct an HTTP GET call to
```
http://api.yubico.com/wsapi/2.0/verify
```
with the following parameters (note that this request need not be signed):
{|
! parameter !! type !! required !! purpose
|-
| id || string || Yes || Specifies the requestor so that the end-point can retrieve correct shared secret for signing the response.
|-
|otp || string || Yes || The OTP from the !YubiKey.
|-
| h || string || No || The optional HMAC-SHA1 signature for the request.
|-
| timestamp || string || No || Timestamp=1 requests timestamp and session counter information in the response
|-
| nonce || string || Yes || A 16 to 40 character long string with random unique data
|-
| sl || string || No || A value 0 to 100 indicating percentage of syncing required by client, or strings "fast" or "secure" to use server-configured values; if absent, let the server decide
|-
| timeout || integer || No || Number of seconds to wait for sync responses; if absent, let the server decide
|}
An example request:
```
http://api.yubico.com/wsapi/2.0/verify?otp=vvvvvvcucrlcietctckflvnncdgckubflugerlnr&id=87&timeout=8&sl=50&nonce=askjdnkajsndjkasndkjsnad
```
And if you require additional information on timestamp and session
counters:
```
http://api.yubico.com/wsapi/2.0/verify?id=87&otp=vvvvvvcucrlcietctckflvnncdgckubflugerlnr&timeout=8&sl=50&nonce=askjdnkajsndjkasndkjsnad×tamp=1
```
2014-08-11 16:05:27 +02:00
## Response
2014-08-11 15:52:11 +02:00
The verification response tells you whether the OTP is valid. The
response has the following values:
2014-08-11 16:05:27 +02:00
|===========================
| parameter | type | purpose
| otp | string | The OTP from the !YubiKey, from request.
| nonce | string | Random unique data, from request.
| h | string (base64) | Signature as described above.
| t | time stamp | Timestamp in UTC.
| status | string | The status of the operation, see below.
| timestamp | string | YubiKey internal timestamp value when key was pressed
| sessioncounter | string | YubiKey internal usage counter when key was pressed
| sessionuse | string | YubiKey internal session usage counter when key was pressed
| sl | integer | percentage of external validation server that replied successfully (0 to 100)
|===========================
2014-08-11 15:52:11 +02:00
These are the possible "status" values in a verify response:
{|
! name !! meaning
|-
| OK || The OTP is valid.
|-
| BAD_OTP || The OTP is invalid format.
|-
| REPLAYED_OTP || The OTP has already been seen by the service.
|-
| BAD_SIGNATURE || The HMAC signature verification failed.
|-
| MISSING_PARAMETER || The request lacks a parameter.
|-
| NO_SUCH_CLIENT || The request id does not exist.
|-
| OPERATION_NOT_ALLOWED || The request id is not allowed to verify OTPs.
|-
| BACKEND_ERROR || Unexpected error in our server. Please contact us if you see this error.
|-
| NOT_ENOUGH_ANSWERS || Server could not get requested number of syncs during before timeout
|-
| REPLAYED_REQUEST || Server has seen the OTP/Nonce combination before
|}
2014-08-11 16:05:27 +02:00
## Changes since version 1.1
2014-08-11 15:52:11 +02:00
The verify URL has changed. In the request, the new required field
"nonce" were added, and the new optional fields "sl" and "timeout" are
added. In the response, the new fields "otp", "nonce", and "sl" are
added. The status codes NOT_ENOUGH_ANSWERS and REPLAYED_REQUEST were
added.
Since both the URL and required fields has changed, version 2.0 is not
backwards compatible with version 1.1 or version 1.0. However,
because version 2.0 use a different URL than version 1.x, the server
2014-08-11 16:05:27 +02:00
may support both version 1.x and version 2.0 clients at the same time.