Files
hpr-knowledge-base/hpr_transcripts/hpr2986.txt
Lee Hanken 7c8efd2228 Initial commit: HPR Knowledge Base MCP Server
- MCP server with stdio transport for local use
- Search episodes, transcripts, hosts, and series
- 4,511 episodes with metadata and transcripts
- Data loader with in-memory JSON storage

🤖 Generated with [Claude Code](https://claude.com/claude-code)

Co-Authored-By: Claude <noreply@anthropic.com>
2025-10-26 10:54:13 +00:00

947 lines
23 KiB
Plaintext

Episode: 2986
Title: HPR2986: Onlykey Updated
Source: https://hub.hackerpublicradio.org/ccdn.php?filename=/eps/hpr2986/hpr2986.mp3
Transcribed: 2025-10-24 14:20:55
---
This is Hacker Public Radio Episode 2986 for Monday 13 January 2020.
Today's show is entitled Only Key Updated
and is part of the series' Privacy and Security,
it is the 40th anniversary show of operator
and is about 23 minutes long
and carries an explicit flag. The summer is
only key more like you better have two keys.
Quote-
This episode of HPR is brought to you by
An Honesthost.com
Get 15% discount on all shared hosting
with the offer code HPR15
that's HPR15
Better web hosting that's honest and fair
at An Honesthost.com
Music
Hello everyone, welcome to another episode of Hacker Public Radio
and your host, Operator.
I spent the past 40 minutes or so
fussing around with the only key.
So this is about a hardware-based key
or password manager or authentication device.
So I'm going to go over it. I've gone over it before
I think I did a video along with audio
about how to set them up
kind of properly and some caveats there.
But I just wanted to add some more caveats
because they just had an update
and some tooling and whatever.
So it's always been a little bit struggling
to use this device.
It's very user friendly
but at the same time it can be complex
to understand the layers and how it works.
So it's easy to use
but kind of hard to understand
that that makes any sense.
So what they added with the new features
so some of the features basically are
it has a little key fob you wear
and I don't know if you've heard of UB key
or any of those like that.
It's the same type of thing.
It's a teensy sort of device
and it has six buttons on it
that you can program up to I think 12
and then I think can add an additional double that
because you can have a second profile
that's a fake profile I guess or whatever.
So it has plausible
that I ability features in it.
And it also has support
for like a bunch of two FAs like Google
and OTA and something else.
The only key or UB key stuff.
You can put keys in there
and then those keys can sync up to accounts.
So for example if you're doing something
like Microsoft they don't natively support Microsoft's
to FAA but Microsoft supports Google
so you can pipe Google's to FAA into Microsoft
and then when you authenticate to FAA
to Microsoft it essentially
it syndicates with Google
which essentially talks to your UB key
which essentially is your single
sort of single factor basically.
So that's how crazy you can get with it.
So any two FAA device has like usually
either a Google write or a duo
or whatever or more of a OTP provider.
So anyways that's the features.
There's a bunch of other features in there
you can store keys in it.
You can store all kinds of crazy stuff.
You can do a bunch of other things
like it's like a single authentication device
is the idea they're trying to pair up
with other applications and whatever.
So the outside of the defaults
what you get is not only people have like a URL
a username and a password.
You can also set up
what I have to do is I set up different things
for when I change my password.
So if I had to repeat my password
and an old and new I can have a copy
sort of essentially of my old and new password.
So when I'm changing my password
I have those keys set up.
And what I would say is if you do get it by one,
if you don't like it, give it away.
If you do like it,
you're going to want to purchase another one
because basically it's your two-factor authentication.
So if you lose it, forget it.
Forget it at the house
and you proceed to try to log in.
You're not going to be able to log in
because you don't know when you have your passwords.
So it's something you have
and if you don't have it, obviously you can't log in.
So what I would suggest is what I've had to do is
when I got it,
I thought it was cool to use it for a few days
and then I realized,
hey, if I forget this,
if I leave it in my, you know,
one computer and put it in an uploader,
especially if you're taking it
from one computer to the other,
you're going to want to make sure
that you keep it on you, whatever.
It does have,
they give you the option to buy,
it's fairly expensive actually,
to buy the little trinket that hooks to like a badge.
I would suggest finding one of those on cheap online.
They charge like $5 or something ridiculous.
It's really expensive,
but it's nice, hasn't come apart.
It's not cheap.
It's sturdy.
So chances are,
I actually,
my child or somebody was preparing,
pulling on the UBH,
and the lane you're broke
before any of the UBH stuff broke.
So I've had it for two or three years now.
I like it,
but I have,
you know,
I selfishly have cornered twice now.
So I'll kind of go over what I did and how I did it.
If you have one of the original ones
with the older firmware,
it's like beta six,
I think,
you have to do a teensy method to patch it.
So you get this patch,
you have to figure out
which one you have.
So there's different versions.
So there's,
at least two different versions,
you figure out which one you want,
and then there's also like an international,
which has the 2FA,
or has the,
I think it has the plausible deniability stuff in it.
I'm not really sure what the two differences are,
but I think it's,
I think it's an additional plausible deniability
or an additional profile,
or maybe they'd combine those two,
I don't know.
But anyways,
you just have to be very cautious
of what firmware,
obviously you push these things,
or you might end up kind of
breaking it,
and get the,
kind of start over.
And that's why it's good to have two,
if you do any firmware updates,
just have a backup of your password,
super early.
Somewhere, just in case you break the thing,
and you can't log in to anything anymore,
because you've,
break to your own link,
up the location device.
So the first time I did it,
you,
you have ten outs on there,
and you short out two pins,
and,
or you press a button on two corners of the thing,
and then you flash the firmware,
with the teensy,
if you've ever done any teensy stuff,
firmware flashing.
It's quick,
fast.
I didn't have any issues with that,
but I did try to make,
you know, make sure that I did it the right way,
and it did take me a while to read the documentation
and make sure I was doing it the right way,
because I didn't want to break it,
or anything like that.
And I don't think there is a,
I don't think there's possibility
that I could happen.
You can always flash
an old firmware to it,
I feel like.
I don't know if you can actually
break the things,
but in my experience,
it's always better to take extra time
when you're doing firmware stuff,
and not have to go back
and read you the old thing,
which I've had to do.
So that's the legacy updates.
Now, with the newer updates,
it used to be key-based,
so you had to have a key,
an RSA key,
it's just a certificate, basically.
But now,
you can have a passphrase.
And that passphrase is set up
to, I think, just be built
into the backup itself.
So the backup itself,
I think, actually,
has the passphrase
that goes with it in it.
So instead of having to have a key
with the passphrase,
this standard, you know,
whatever,
it's built into the device,
so all you have to do
is remember your master password.
You don't have to have a key file.
Now, you can do that.
I think you can do one or the other.
I don't think you can do both.
But again, the idea is that,
if you don't want to worry about the key thing,
and I have a key file,
and I haven't uploaded that or whatever,
you can just remember a master password
that's long and complex.
It's a minimum of like 25 characters.
So I had to reach to get to that point,
because I have several key passphrases
that are in my head,
and I had to come up with a long one for this one.
But anyways, now there's the password,
passphrase option to keep your,
to do your backups and stuff.
What I will say is that all the other backups I have
are now worthless,
and I don't think you can restore anything.
So what happened is that,
there's a beta 8 out now,
and I'll put links in the show notes
to the videos and stuff in the builds.
But there's a beta 8 now that's not,
I guess, not pushed out,
or whatever it came out in October.
And they posted some more videos too.
So I just happen,
stands to be like,
hey, let me check and see if there's an update
for my firmware.
One of the features I'll say,
I'm going to go back to my notes here,
is, yeah, I talked about the caveats
and divots between the firmwares.
I think by default,
it puts you on 7 now,
and then, I guess,
eventually they're going to push out 8 to people
as a whatever,
or maybe my UBK plug-in
for Chrome is old or something,
because there's a soft client,
there's a thick client you can put on there
to actually install it.
And then there's a,
you can just use a Chrome.
So if you don't have local admin,
you don't have to worry about installing anything,
you can use a Chrome plug-in,
because it's just,
if I'm not mistaken,
it's just Java.
So what I did once today is,
I downloaded the international firmware,
I think,
and I updated with that,
and I think it was okay,
but then I tried to push a restore,
I tried to back up and push that back up
to the old one,
and it got a good fuse,
or some vice versa.
So I ended up,
there was stuff in my thing,
so when I pressed the button,
it would type stuff,
but it wasn't the password that I was expecting.
So it was either there,
because of the wrong firmware,
or the wrong international,
or the wrong firmware got pushed on there,
or I have a wrong backup or restore,
I don't know what happened,
but essentially,
if you have one working,
you can always just backup,
replace all your backups and whatever.
Where you have a problem,
is if you don't know what version,
firmware,
or whatever your key goes with,
then you need to figure it out,
and then reverse engineer it.
So what I would say is that,
in the future,
is bundle your firmware
with your backups,
just in case,
maybe even keep the old,
all the firmwares that you've used,
or patch to it.
So just in case,
you have to restore an old password,
from an old firmware,
that's no longer available,
or whatever,
there won't be any confusion,
as to what firmware you use,
when you packed it up.
So, you know,
I would go as far as to say,
is to keep your backups
with your firmware,
that it's currently on there,
and the right version,
and say,
I'm going to have to worry about it.
Obviously,
it'll figure it to your passphrase,
is what I ended up doing,
but luckily,
I had the old new password,
for Active Directory,
and the different,
are assigned to a different key,
and I hadn't ruined that one yet,
and I accidentally wiped the wrong,
the wrong thing.
So obviously, be careful,
there's no prompts with this stuff.
So if you hit the white key,
and you wipe out your,
you know, Active Directory password,
or whatever,
it's gone,
you're done,
and once you can restore it,
which I couldn't do,
and luckily, I remembered that,
one of the keys,
I had bounded and bind it to,
to the new password,
which would have been the new password for AD.
I kind of looked out.
So,
so I have everything set on the two devices now,
they're all set up.
You can change the LED brightness.
It's very bright,
I think, eight by default.
It's extremely bright by default.
I might even just leave it on one for now
and see how that works.
In some instances,
you know, you are outside,
and I've actually had problems,
being able to tell whether or not,
you know,
it's a key I'm pressing,
because it's under the device.
So, you basically have to cup your hand,
under the device,
to see if the LED is on or not.
So, I would actually,
you know,
give it a try with a lower,
with a lower brightness,
because if you're walking around with it at night,
it's really bright,
like, freaking bright,
and you're walking past somebody,
and you'll be able to kind of have blinded.
So, it's a really bright LED in there.
The other feature I'll say that a data added
is a quick setup guide,
which basically,
um,
dumps out all the information you need.
Okay, here's your password.
Here's your key.
Here's your pin.
Here's your alternate pin.
Here's your passphrase to back it up.
Um,
pair it up this document
and keep it somewhere physically safe,
and you don't have to do anything.
It just works.
Um,
so that way,
all your backups
have the same issue.
You don't have to worry about any of that.
It's setting it up,
or setting up in keys,
or being complicated,
because that's,
that's kind of the feature I,
that's kind of the thing,
but say we're kind of missing,
because,
um, you know,
doing the keys,
and figuring out what firmware we had,
or whatever it was kind of confusing.
Um, so I think this quick setup
might help people that just want to,
want to make it go.
Um, so that way,
they could just print out this document,
have their pins in there,
and they have the alternate method,
where you can enter the pin,
and it won't actually save it to the screen.
I think it just puts it in there,
and you have to remember your pin, obviously.
Um,
so that's in those videos.
Um,
let's what else I'll say.
Um,
you'll also want to get,
because if you're in a corporate environment,
or wherever else,
if you're doing something with your phone,
guess what?
You're going to want to authenticate
through your phone, too.
And,
you don't necessarily want
your core passwords,
or master passwords,
to be in something like a password safe,
like, last pass.
So,
what you don't want to do is
put your 2FA,
or your,
your only key passwords
in your,
in any of your,
um,
password managers,
or whatever.
So, the idea that,
is if your password manager gets popped,
then,
and you have your only key,
or your, you know,
2FA token thing keys stuck in there,
then, um,
as somebody pops that,
and they can get to your passwords for it,
or, um,
only key,
physical device type of thing.
So, I'm keeping,
I keep in the last pass,
stuff separate,
then, um, my only key.
So, that way,
you know,
my bank password
is only on my brain,
and only on the key,
and it's only on the other key in the world.
Um, so, that way,
uh,
there's no confusion as to, like,
getting prompts,
and password prompts,
and stuff for,
for, um,
for hosts,
and domains,
and things that I don't want to save,
anywhere,
except for a physical device.
Um,
and if you're using, like, Android,
um,
every once in a while,
you're going to have to re-authenticate,
and guess what?
If you don't know your 52 character password,
I think it's 56 characters max or something.
Um,
if you don't know your 52 character password,
then you're going to have to
copy and paste it somewhere,
out of somewhere,
and then send it to yourself,
and then paste it in,
which is, obviously,
the pizza purpose of the whole thing.
So, um,
what you can get is a little fog
that, uh,
starts to come with newer phones now,
that transfer the USB-C
to USB standard USB standard USB,
so if you want to charge your phone
through standard USB,
you can do that.
I think it's also designed
for this specific case,
so if you have a 2FA device,
you can plug your little USB-C
to, um,
mail,
or to female USB,
plug it into the,
the bottom there,
and then you plug in the USB key,
or the only key,
sorry,
and, um,
putting your password,
the problem,
or at least on this phone,
and the phone previous,
is that the LED
doesn't work,
and I guess it's because the voltage
or whatever,
I read something on my,
I assumed it wasn't,
excuse me,
I assumed it wasn't working,
but it's actually working,
but the voltage,
or something about the voltage,
or whatever.
Um,
so you just have to,
keep in mind that, you know,
type in your,
pin,
wait a few seconds,
and then press your thing,
and it'll pop right up.
Um,
I've also had issues with,
um,
oh, I mentioned the,
I know if I mentioned a lot of lock features,
so you can assign one of the keys,
it has to be the primary,
so I had to move some things around.
But, um,
I assigned, like,
the number 6 key,
to lock,
the workstation,
uh, window key L,
and then,
basically set the only key to, um,
like,
to pv key.
So,
I don't know how you're supposed to do it before,
but basically,
it has to take it with me.
So, I would walk off,
unplug the key,
and take it with me.
Now, you can just hit the lock key,
it'll lock your workstation,
and it will lock the,
uh, only key 2.
So, if you don't want to physically bring it with you,
you can just use that.
Um,
let's see,
what else?
Um,
the Android issues I talked about,
um,
I was talking about the features,
and there was one other thing I was going to bring up,
outside of the, uh,
locking feature,
there was another new feature,
um, oh, the keyboard speed.
So, it's always been around,
but the, you can,
you can set the speed of the keyboard,
a default,
like 8, or something like that,
8 or 4.
Um, which is pretty slow.
Now, what,
well, everything's first things there to do,
is put it all in,
all the way to 10,
which is almost instantaneous.
Um, seems to work everywhere,
except for I had Symantec,
um,
Symantec, uh,
drive encryption,
on a system,
and if it was
not booted
into the right thing,
or whatever,
um, the keyboard speed would be too fast.
So, I will, like,
when I disabled,
I think I disabled,
um, UEFI,
or disabled something in the BIOS,
like legacy support for USB,
or something like that.
Um, and it was able to pick it up after that,
but I had issues with speed.
So,
obviously keep that in mind,
if you've got things like RDP client,
or if you're doing remote desktop over,
remote desktop,
there's things like Sync Key Delays,
and, um,
if you ever end to Auto-Hot Key,
and Auto-IT scripts,
there's things like Sync Key Delays
and whole,
whole time values,
meaning,
if you just type out the password extremely fast,
that's not long enough sometimes,
for certain applications,
to pick up that you've actually registered,
and clicked,
that thing,
or,
typed that key.
So,
I don't even know if they have like a Sync Key Delay,
setting for the thing that tells you how long to hold the key down.
How many milliseconds hold the key down before it actually lifts up that key?
That's a key up value.
Um,
there's a DLL stuff you can do, like,
Sync Key event stuff for, um,
throughout Auto-Hot Key,
and you can do it straight up in Windows.
Um, anyways.
But, you'll find issues,
where you're already peed into a box,
you hit the thing,
and it goes,
and either the keys
are messed up somehow,
because the case gets screwed.
Um, I don't understand how or why it happens.
The only thing I can assume
is that the,
um,
is that it's typing it so quickly,
it changes the case.
So, meaning that,
if my password has an uppercase in it,
or a special character,
it's going to hit the special character,
and then stay in the lower case,
the uppercase for a while,
the caps lock basically,
the shift button,
for too long.
So, it hasn't sent
the key up
from the shift before it,
so if you're,
it's hard to explain,
but basically,
it's keeping the caps lock
or the shift key down too long,
and your password
is being a bunch of garble to you,
and it's not right.
So, um,
keep in mind that there are, you know,
some things that are limited,
uh, and you'll find,
that when you're working with this stuff,
the more time,
the more you use it,
the more weird things you'll find out about it,
um,
are some kind of limitations,
not to,
excuse me,
you be keys,
uh,
fail design,
it's just the way,
you know, people and applications
interpret,
um, keys,
and we start going faster than human,
um,
humans can type,
things get weird,
so,
I've had issues with RDP,
um,
and I've had to do silly stuff,
like, um,
have a auto-hot key script
that would pick up the odd,
pick up what I typed
in the box,
and then,
what I typed in the box
would be actually sent
through auto-key,
auto-hot key,
and then sent out
to, you know,
the screen buffer,
or the,
the send key buffer
through auto-hot key,
so that it would type
the right password.
Um,
um,
that's pretty much it,
as far as payloads,
I thought initially,
I could make it a teensy,
or a,
a USB,
but you could only put,
basically,
up to,
um,
it's like,
52 bytes,
or more,
52 characters,
and another 52,
and another 52,
so I think you could get,
that's about all you get,
which is roughly,
here,
like, 150 characters.
Um,
that's not enough for,
really any kind of payload,
um,
especially, like,
I'm not a piece of gated payload,
um,
the power shell,
or something.
Um,
that's pretty much it.
I like it,
I use it, um,
you know,
there are weird use cases,
like, for example,
if someone wants you to type
in your password into
something that doesn't,
oh, I need to easily type
in your password,
it's very painful,
um,
and that's where that,
that,
um,
that need,
or want,
is to take it,
and just throw it up into
last pass,
and that kind of beats the purpose,
so don't try not to do that,
um,
so,
for example,
uh,
you can always make sure you,
uh,
some kind of wireless device
for the touchscreen,
and I'm like,
I'm not going to put in
a 52-character password,
with, like, a tiny little LCD,
I'm, like,
some dumb printer,
or something,
like, I'm not going to,
first,
I don't trust that device,
the whole password,
safely,
anyways,
or the authentication
for that password,
anyways,
uh, probably class centered
over plain text,
somewhere,
anyways,
um,
secondly,
it's, you know,
just somebody out,
um, I've gotten
a UB keys before,
and given them away,
uh, only keys,
they're run about
40 bucks, I think,
and then, when it's all said
and done,
they're, like,
45 or something,
and then you buy two of them,
so you're,
spending 100 bucks on,
uh,
key fobs,
but, you know,
having a nice long password,
that no one can hack,
um,
and,
and funny,
I say that,
um,
that you actually used
a previous employer,
and the coworker was actually
able to crack it,
so, um,
keep in mind,
the password is,
uh, pseudo-random password,
it's not something that's a quote,
or, uh,
a string of,
known, uh,
character,
so you don't want to use,
obviously,
you don't want to use things
from a book,
but, you know,
you think that it's random enough,
but obviously,
it's not random enough,
if it's something
that's already been
written and printed,
and it's not,
you know,
random battery horse staple,
anyways,
I hope that helps you guys out.
Um, if you have any questions about
setup and stuff like that,
um,
I'll have the videos posted,
um, but,
if you have any problems with it,
or whatever need help,
set it up,
just let me know, um,
and, uh,
I can help you guys out,
but,
I like it,
I bought it one from my dad,
I don't know if he's,
used it,
but, uh, we'll see.
Appreciate it,
take it easy.
Music
You've been listening
to Hecker Public Radio
at Hecker Public Radio.org.
We are a community podcast network
that releases shows every weekday
Monday through Friday.
Today's show,
like all our shows,
was contributed
by an HBR listener
like yourself.
If you ever thought
of recording a podcast,
then click on our contributing,
to find out how easy it really is.
Hecker Public Radio was founded
by the Digital Dove Pound
and the Infonomicon Computer Club,
and is part of the binary revolution
at binwreff.com.
If you have comments on today's show,
please email the host directly,
leave a comment on the website
or record a follow-up episode yourself,
unless otherwise status,
today's show is released
on the Creative Commons,
App Tribution,
ShareLife,
3.0 license.
Thank you very much.