by kn9 on 1/12/16, 5:04 AM with 47 comments
by lrvick on 1/12/16, 9:19 PM
Now to ssh to anything, clone from Github, etc you insert your Yubikey, and enter your pin to unlock it. A gpg-agent process is created that acts as a standard ssh agent.
No server modifications required and you get strong hardware backed 2FA. The ssh private key never enters system memory and could not be stolen even by an untrusted machine.
If the smartcard itself is stolen, it will brick itself on 3 incorrect pin attempts.
The same device can also store all your OTP tokens or behave as U2F depending on what a service supports so the end game is secrets no longer live on disk or in memory on your systems.
This also integrates well on Android devices via the Yubikey Neo with apps like Yubico Authenticator and Open Keychain,
by georgyo on 1/12/16, 5:07 PM
A simpler and more robust method is SSH Keys + Passwords. I should write a blog post on this...
by backslash on 1/12/16, 4:27 PM
by cornelinux on 1/12/16, 10:39 PM
Why not have it all?
Using privacyIDEA [1] you can
* manage SSH Pub keys for several servers * manage your Google Authenticator centrally * manage Yubikeys centrally or whichever OTP token.
In addition you can combine it to use the Google Authenticator or any other OTP ++PLUS++ SSH keys [2].
[1] http://privacyidea.org [2] https://www.privacyidea.org/ssh-keys-and-otp-really-strong-t...
by Freak_NL on 1/12/16, 9:34 AM
Alternatively, you could go for a dedicated hardware token such as Yubico's FIDO U2F [1] keys [2]. Hardware tokens that use the fledgling FIDO U2F standard can also be used with PAM and SSH as well [3].
Two U2F keys (one backup) will cost around $40, and can be used with a growing number of webservices, including GitHub, DropBox, and GMail as well. The small form factor means you can put the key on your (physical, real world) keychain.
1: https://fidoalliance.org/specifications/overview/
2: https://www.yubico.com/products/yubikey-hardware/fido-u2f-se...
by matthiasb on 1/12/16, 6:10 PM
by ewindisch on 1/12/16, 5:44 PM
by doublerebel on 1/12/16, 5:51 PM
In theory I could worry about Duo going down, but I also rely on other critical cloud services and do have other ways to access an instance in an emergency (and Duo supports fallbacks).
Simplicity can be deceiving. In this case I think leaving security to the pros is worth the tradeoff. I've previously relied on cloud services for secure user management and wasn't let down.
by PTRFRLL on 1/12/16, 4:56 PM
by newman314 on 1/12/16, 9:31 PM
by e40 on 1/12/16, 6:59 PM