This file is indexed.

/usr/share/doc/yubikey-val/Server_Replication_Protocol.adoc is in yubikey-val 2.38-2.

This file is owned by root:root, with mode 0o644.

The actual contents of the file can be viewed below.

 1
 2
 3
 4
 5
 6
 7
 8
 9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
== Server Replication Protocol

This document describes the server to server protocol.  Its purpose is
to synchronize the last used session and use counter between multiple
validation servers.

Multiple validations servers are connected together so that each
validation server can talk to any of the other validation server using
the Server Replication Protocol.  The validation servers are
authenticated by the use of certificates.

 val A  <->  val B <-> val C <-> val A

See the ValidationProtocolV20 for definition of the client to server
protocol.  The protocol described here is the server to server
protocol.  See ValidationServerAlgorithm for a description of the
implementation algorithm that uses this protocol.

=== Sync request specification

A sync request is issued with a HTTP get call, like this:

 https://apiX.yubico.com/wsapi/sync?otp=xyz&modified=1264430686&nonce=foobar&yk_identity=foo&yk_counter=42&yk_use=17&yk_high=10&yk_low=5

The following parameters are used
[options="header"]
|=============================
| parameter |type |values
| otp | string | one-time password (for logging purposes)
| modified | integer | unix timestamp of when OTP was received
| nonce | string | nonce from client request
| yk_identity | modhex | YubiKey OTP identity in question
| yk_counter | integer | last seen session counter by sender
| yk_use | integer | last seen session use by sender
| yk_high | integer | OTP internal high time value
| yk_low | integer | OTP internal low time value
|==============================

Input values for yk_counter, yk_use, yk_high and yk_low are always
positive except for -1 which indicates that the requesting server did
not have any earlier information about the !YubiKey.

An example response is

 modified=1264430686
 nonce=aspodkaaspdokas
 yk_identity=cccccccccccf
 yk_counter=api2 session counter
 yk_use=api2 session use counter
 yk_high=value
 yk_low=value

The values returned are:

[options="header"]
|====================
| parameter |type |values
| modified | integer | timestamp of when last OTP was received
| nonce | string | nonce from client for last OTP
| yk_identity | modhex | YubiKey OTP identity in question
| yk_counter | integer | last seen session counter
| yk_use | integer | last seen session use
| yk_high | integer | last seen high time value
| yk_low | integer | last seen low time value
|========================

Output values for modified, yk_counter, yk_use, yk_high and yk_low are
always positive except for -1 which indicates that the server did not
have any earlier information about the YubiKey.  In this case, nonce
is a newly allocated random nonce.