Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.
Sign updocument Yubikey qubes-dom0-yubikey / qubes-app-yubikey #3307
Comments
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Nov 13, 2017
Member
Looks like https://github.com/QubesOS/qubes-app-yubikey/blob/master/bin/yk-auth requires HMAC-SHA1 mode fixed 64 bit input. That works for me. HMAC-SHA1 mode Variable input does not work.
|
Looks like https://github.com/QubesOS/qubes-app-yubikey/blob/master/bin/yk-auth requires |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Nov 13, 2017
Member
The video referenced under https://www.yubico.com/products/services-software/personalization-tools/challenge-response/ shows HMAC-SHA1 mode Variable input. So currently the documentation is wrong.
- Should / can https://github.com/QubesOS/qubes-app-yubikey/blob/master/bin/yk-auth be made compatible with
HMAC-SHA1 modefixed 64 bit input? - Should / can be https://github.com/QubesOS/qubes-app-yubikey/blob/master/bin/yk-auth be ported to
HMAC-SHA1 modeVariable input?
What is better anyway,HMAC-SHA1 mode fixed 64 bit input or HMAC-SHA1 mode Variable input?
|
The video referenced under https://www.yubico.com/products/services-software/personalization-tools/challenge-response/ shows
What is better anyway, |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
marmarek
Nov 13, 2017
Member
|
I'd go with 'fixed 64 bit input'.
…--
Best Regards,
Marek Marczykowski-Górecki
Invisible Things Lab
A: Because it messes up the order in which people normally read text.
Q: Why is top-posting such a bad thing?
|
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Note to self: |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
|
Working on it. Pull request soon. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
referenced this issue
in QubesOS/qubes-doc
Nov 13, 2017
Closed
document https://github.com/QubesOS/qubes-app-yubikey #478
andrewdavidwong
added
C: doc
task
labels
Nov 14, 2017
andrewdavidwong
added this to the
Documentation/website milestone
Nov 14, 2017
andrewdavidwong
assigned
adrelanos
Nov 14, 2017
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Nov 14, 2017
Member
//cc @mig5
I am also mentally processing these blog posts.
I doubt yubi_auth $KEY1 || yubi_auth $KEY2 is necessarily. You can just write the same HMAC-SHA1 ("AESKEY") secret into a backup yubikey? Any reason against that?
Once above pull request is merged, I might add on how to optionally set yubikey only and how to use it for login and lightdm.
|
//cc @mig5 I am also mentally processing these blog posts. I doubt Once above pull request is merged, I might add on how to optionally set yubikey only and how to use it for |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
adrelanos
Nov 16, 2017
Member
Once above pull request is merged, I might add on how to optionally set yubikey only and how to use it for
loginandlightdm.
Correction: It's now all documented.
Correction: It's now all documented. |
This comment has been minimized.
Show comment
Hide comment
This comment has been minimized.
mig5
Nov 29, 2017
@adrelanos yes you're right that you could have an exact clone of your primary yubikey, but if that yubikey is stolen or its key compromised in some way, then you can't rely on your backup either since it's identical. So you'd have to regenerate the key on the secondary rather than just revoke the key of the former in your config/script
I only blogged what works for me :) and yes as per your other issue, I use it in /etc/pam.d/xscreensaver as well as /etc/pam.d/login and /etc/pam.d/lightdm - anything less feels like backdooring yourself with single-factor auth.
Let me know if you would like copies of those files from my system to get the positioning right etc (I had varying degrees of success depending on how early the 'auth include yubico' was referenced)
mig5
commented
Nov 29, 2017
•
|
@adrelanos yes you're right that you could have an exact clone of your primary yubikey, but if that yubikey is stolen or its key compromised in some way, then you can't rely on your backup either since it's identical. So you'd have to regenerate the key on the secondary rather than just revoke the key of the former in your config/script I only blogged what works for me :) and yes as per your other issue, I use it in /etc/pam.d/xscreensaver as well as /etc/pam.d/login and /etc/pam.d/lightdm - anything less feels like backdooring yourself with single-factor auth. Let me know if you would like copies of those files from my system to get the positioning right etc (I had varying degrees of success depending on how early the 'auth include yubico' was referenced) |
adrelanos commentedNov 13, 2017
•
edited
Edited 1 time
-
adrelanos
edited Nov 13, 2017 (most recent)
https://www.qubes-os.org/doc/yubi-key/ is out of date. https://github.com/QubesOS/qubes-app-yubikey is in Qubes repository, but undocumented. Couldn't make it work, so also cannot document it.
yubikey settings:
HMAC-SHA1 modeVariable inputThat secret I copied to dom0
/etc/qubes/yk-keys/yk-secret-key.hex. (Including the space every two characters.)test "x$correct_response" = "x$response"will show different strings, hence the script failsexiting1.