SlideShare a Scribd company logo
Yubikey Neo
What is it and what can it do for me?
Yubikey Neo
It’s a USB/NFC stick that acts as a
physical security token
Cross platform
No drivers
Acronyms!
OTP
CCID
U2F
What Can I Do With It?
Log into your computer
Improve Password Managers like LastPass
Generate strong passwords
Secure access to password database
Two Factor Auth to various web services
Act as a physical SSH key
Other things!
Using it as a U2F token
You do have two factor auth enabled on your
Google account right?
1. Add the key to your account
2. When you next log in, you’ll be prompted
to enter your token.
3. There is no step 3
What about SSH keys?
Make use of the smart card functionality to store a PKCS11 certificate on the key
Generate an SSH public key from this and deploy to target servers
SSH will use the opensc libraries to communicate with the key to access your
private key
SSH: Prerequisites
1. A Unix-y system
2. A Yubikey Neo
3. The opensc and opensc-pkcs11 libraries installed
4. The yubikey-piv-tool installed
5. CCID enabled on the Neo
SSH: Generate The Key
yubico-piv-tool -s 9a -a generate -o public.pem
yubico-piv-tool -a verify-pin -P 123456 -a selfsign-certificate 
-s 9a -S "/CN=SSH key/" -i public.pem -o cert.pem
yubico-piv-tool -a import-certificate -s 9a -i cert.pem
SSH: Deploy & Use
ssh-keygen -D /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so | ssh
username@targethostname 'cat >> /ssh/authorized_keys'
echo "PKCS11Provider /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so"
>> ~/.ssh/config
ssh username@targethostname
Enter PIN for 'PIV_II (PIV Card Holder pin)':
Thank you!
Giles Paterson
@gilesp

More Related Content

Viewers also liked

Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
Student
 
Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...
Komal Patil
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
Aman Raj
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank Algorithm
Omkar Dash
 
Seo (Search Engine Optimization)
Seo (Search Engine Optimization)Seo (Search Engine Optimization)
Seo (Search Engine Optimization)
mudit agrawal
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
guest561f62
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
toryharis
 
Wi vi ppt
Wi vi pptWi vi ppt
Wi vi ppt
snehalpapa
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
Nisha Menon K
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer science
Rinshad Akbar K K
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
خالد اكدمون
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
Francisco Carabez
 
הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013
הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013
הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013Anochi.com.
 
תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...
תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...
תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...
Anochi.com.
 
Severa PSA feature list
Severa PSA feature listSevera PSA feature list
Severa PSA feature list
Severa PSA
 
Teaching by Design - Session 1 Slides
Teaching by Design - Session 1 SlidesTeaching by Design - Session 1 Slides
Teaching by Design - Session 1 Slides
Ilene Dawn Alexander
 
Taller redes sociales
Taller redes socialesTaller redes sociales
Taller redes sociales
Javieralgeciras
 
สังคมประกิต
สังคมประกิตสังคมประกิต
สังคมประกิต
Dowroong Wittaya School
 
אריאב סולארי סופי 11 מרץ 2012
אריאב סולארי סופי 11 מרץ 2012אריאב סולארי סופי 11 מרץ 2012
אריאב סולארי סופי 11 מרץ 2012
Anochi.com.
 
דוח לוקר יולי 2015
דוח לוקר יולי 2015דוח לוקר יולי 2015
דוח לוקר יולי 2015Anochi.com.
 

Viewers also liked (20)

Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...Wi vi- wifi that see through walls...
Wi vi- wifi that see through walls...
 
Wi-Vi Technology
Wi-Vi TechnologyWi-Vi Technology
Wi-Vi Technology
 
Google Page Rank Algorithm
Google Page Rank AlgorithmGoogle Page Rank Algorithm
Google Page Rank Algorithm
 
Seo (Search Engine Optimization)
Seo (Search Engine Optimization)Seo (Search Engine Optimization)
Seo (Search Engine Optimization)
 
Barcode In Retail Presentation
Barcode In Retail PresentationBarcode In Retail Presentation
Barcode In Retail Presentation
 
Cloud Computing Integration Introduction
Cloud Computing Integration IntroductionCloud Computing Integration Introduction
Cloud Computing Integration Introduction
 
Wi vi ppt
Wi vi pptWi vi ppt
Wi vi ppt
 
Securing underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon KSecuring underwater wireless communication by Nisha Menon K
Securing underwater wireless communication by Nisha Menon K
 
latest seminar topics in computer science
latest seminar topics in computer sciencelatest seminar topics in computer science
latest seminar topics in computer science
 
Cloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN KhalidCloud Computing by AGDMOUN Khalid
Cloud Computing by AGDMOUN Khalid
 
Rfid technologies
Rfid technologiesRfid technologies
Rfid technologies
 
הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013
הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013
הצעת חוק להגנת הספרות והסופרים טיוטא מתאריך 26 ביוני 2013
 
תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...
תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...
תיאור וניתוח שוק הדירות להשכרה והשפעת רגולציה מוצעת על הגבלת שיעור העליה בשכר...
 
Severa PSA feature list
Severa PSA feature listSevera PSA feature list
Severa PSA feature list
 
Teaching by Design - Session 1 Slides
Teaching by Design - Session 1 SlidesTeaching by Design - Session 1 Slides
Teaching by Design - Session 1 Slides
 
Taller redes sociales
Taller redes socialesTaller redes sociales
Taller redes sociales
 
สังคมประกิต
สังคมประกิตสังคมประกิต
สังคมประกิต
 
אריאב סולארי סופי 11 מרץ 2012
אריאב סולארי סופי 11 מרץ 2012אריאב סולארי סופי 11 מרץ 2012
אריאב סולארי סופי 11 מרץ 2012
 
דוח לוקר יולי 2015
דוח לוקר יולי 2015דוח לוקר יולי 2015
דוח לוקר יולי 2015
 

Similar to Yubikey Neo

ProteMac LogonKey UserGuide
ProteMac LogonKey UserGuideProteMac LogonKey UserGuide
ProteMac LogonKey UserGuide
ProteMac
 
Fido U2F PROTOCOL
Fido U2F PROTOCOLFido U2F PROTOCOL
Fido U2F PROTOCOL
Ather Ali
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
OWASP Delhi
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
Cyber Security Alliance
 
Security Keys Presentation.pptx
Security Keys Presentation.pptxSecurity Keys Presentation.pptx
Security Keys Presentation.pptx
Alok Sharma
 
Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2
Paul Fremantle
 
Creating SSH Key.pptx
Creating SSH Key.pptxCreating SSH Key.pptx
Creating SSH Key.pptx
Saumya876452
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
FIDO Alliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Cyber Security Alliance
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
Brent Muir
 
Securing Your Resources with Short-Lived Certificates!
Securing Your Resources with Short-Lived Certificates!Securing Your Resources with Short-Lived Certificates!
Securing Your Resources with Short-Lived Certificates!
All Things Open
 
Road to RIoT 2017 Medan
Road to RIoT 2017 MedanRoad to RIoT 2017 Medan
Road to RIoT 2017 Medan
Albert Suwandhi
 
Playing with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritzPlaying with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritz
Deepanshu Gajbhiye
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average quality
Vinayak Wadhwa
 
Steps to be done in arduino ide for monitoring
Steps to be done in arduino ide for monitoringSteps to be done in arduino ide for monitoring
Steps to be done in arduino ide for monitoring
Citharthan Durairaj
 
Security Tokens
Security TokensSecurity Tokens
Security Tokens
tkisason
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
Droidcon Berlin
 
Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...
Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...
Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...
Claire Priester Papas
 
The People Terminating Unit
The People Terminating UnitThe People Terminating Unit
The People Terminating Unit
Charles Moore
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
Abhishek Hirapara
 

Similar to Yubikey Neo (20)

ProteMac LogonKey UserGuide
ProteMac LogonKey UserGuideProteMac LogonKey UserGuide
ProteMac LogonKey UserGuide
 
Fido U2F PROTOCOL
Fido U2F PROTOCOLFido U2F PROTOCOL
Fido U2F PROTOCOL
 
Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali Fido U2F Protocol by Ather Ali
Fido U2F Protocol by Ather Ali
 
Easy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 fEasy public-private-keys-strong-authentication-using-u2 f
Easy public-private-keys-strong-authentication-using-u2 f
 
Security Keys Presentation.pptx
Security Keys Presentation.pptxSecurity Keys Presentation.pptx
Security Keys Presentation.pptx
 
Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2Federated Identity for IoT with OAuth2
Federated Identity for IoT with OAuth2
 
Creating SSH Key.pptx
Creating SSH Key.pptxCreating SSH Key.pptx
Creating SSH Key.pptx
 
Google & FIDO Authentication
Google & FIDO AuthenticationGoogle & FIDO Authentication
Google & FIDO Authentication
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB FlashingSanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
SanDisk SecureAccess Encryption - Forensic Processing & USB Flashing
 
Securing Your Resources with Short-Lived Certificates!
Securing Your Resources with Short-Lived Certificates!Securing Your Resources with Short-Lived Certificates!
Securing Your Resources with Short-Lived Certificates!
 
Road to RIoT 2017 Medan
Road to RIoT 2017 MedanRoad to RIoT 2017 Medan
Road to RIoT 2017 Medan
 
Playing with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritzPlaying with fuzz bunch and danderspritz
Playing with fuzz bunch and danderspritz
 
HCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average qualityHCLOS.Reduce to 600 dpi average quality
HCLOS.Reduce to 600 dpi average quality
 
Steps to be done in arduino ide for monitoring
Steps to be done in arduino ide for monitoringSteps to be done in arduino ide for monitoring
Steps to be done in arduino ide for monitoring
 
Security Tokens
Security TokensSecurity Tokens
Security Tokens
 
Smart homes using android
Smart homes using androidSmart homes using android
Smart homes using android
 
Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...
Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...
Delivering Infrastructure and Security Policy as Code with Puppet and CyberAr...
 
The People Terminating Unit
The People Terminating UnitThe People Terminating Unit
The People Terminating Unit
 
secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger secure from Phishing Hacking and Keylogger
secure from Phishing Hacking and Keylogger
 

Recently uploaded

美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
widenerjobeyrl638
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
XfilesPro
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
gapen1
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
Alberto Brandolini
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
campbellclarkson
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
Patrick Weigel
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
Jhone kinadey
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Paul Brebner
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
Reetu63
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
alowpalsadig
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
Luigi Fugaro
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
Envertis Software Solutions
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
sandeepmenon62
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
Massimo Artizzu
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
vaishalijagtap12
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
ervikas4
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
dakas1
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
The Third Creative Media
 

Recently uploaded (20)

美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
美洲杯赔率投注网【​网址​🎉3977·EE​🎉】
 
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
Everything You Need to Know About X-Sign: The eSign Functionality of XfilesPr...
 
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
如何办理(hull学位证书)英国赫尔大学毕业证硕士文凭原版一模一样
 
Modelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - AmsterdamModelling Up - DDDEurope 2024 - Amsterdam
Modelling Up - DDDEurope 2024 - Amsterdam
 
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
🏎️Tech Transformation: DevOps Insights from the Experts 👩‍💻
 
WWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders AustinWWDC 2024 Keynote Review: For CocoaCoders Austin
WWDC 2024 Keynote Review: For CocoaCoders Austin
 
Boost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management AppsBoost Your Savings with These Money Management Apps
Boost Your Savings with These Money Management Apps
 
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
Why Apache Kafka Clusters Are Like Galaxies (And Other Cosmic Kafka Quandarie...
 
ppt on the brain chip neuralink.pptx
ppt  on   the brain  chip neuralink.pptxppt  on   the brain  chip neuralink.pptx
ppt on the brain chip neuralink.pptx
 
Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)Photoshop Tutorial for Beginners (2024 Edition)
Photoshop Tutorial for Beginners (2024 Edition)
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
WMF 2024 - Unlocking the Future of Data Powering Next-Gen AI with Vector Data...
 
What’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete RoadmapWhat’s New in Odoo 17 – A Complete Roadmap
What’s New in Odoo 17 – A Complete Roadmap
 
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptxOperational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
Operational ease MuleSoft and Salesforce Service Cloud Solution v1.0.pptx
 
Liberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptxLiberarsi dai framework con i Web Component.pptx
Liberarsi dai framework con i Web Component.pptx
 
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdfBaha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
Baha Majid WCA4Z IBM Z Customer Council Boston June 2024.pdf
 
42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert42 Ways to Generate Real Estate Leads - Sellxpert
42 Ways to Generate Real Estate Leads - Sellxpert
 
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptxMigration From CH 1.0 to CH 2.0 and  Mule 4.6 & Java 17 Upgrade.pptx
Migration From CH 1.0 to CH 2.0 and Mule 4.6 & Java 17 Upgrade.pptx
 
一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理一比一原版(USF毕业证)旧金山大学毕业证如何办理
一比一原版(USF毕业证)旧金山大学毕业证如何办理
 
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
Unlock the Secrets to Effortless Video Creation with Invideo: Your Ultimate G...
 

Yubikey Neo

  • 1. Yubikey Neo What is it and what can it do for me?
  • 2. Yubikey Neo It’s a USB/NFC stick that acts as a physical security token Cross platform No drivers Acronyms! OTP CCID U2F
  • 3. What Can I Do With It? Log into your computer Improve Password Managers like LastPass Generate strong passwords Secure access to password database Two Factor Auth to various web services Act as a physical SSH key Other things!
  • 4. Using it as a U2F token You do have two factor auth enabled on your Google account right? 1. Add the key to your account 2. When you next log in, you’ll be prompted to enter your token. 3. There is no step 3
  • 5. What about SSH keys? Make use of the smart card functionality to store a PKCS11 certificate on the key Generate an SSH public key from this and deploy to target servers SSH will use the opensc libraries to communicate with the key to access your private key
  • 6. SSH: Prerequisites 1. A Unix-y system 2. A Yubikey Neo 3. The opensc and opensc-pkcs11 libraries installed 4. The yubikey-piv-tool installed 5. CCID enabled on the Neo
  • 7. SSH: Generate The Key yubico-piv-tool -s 9a -a generate -o public.pem yubico-piv-tool -a verify-pin -P 123456 -a selfsign-certificate -s 9a -S "/CN=SSH key/" -i public.pem -o cert.pem yubico-piv-tool -a import-certificate -s 9a -i cert.pem
  • 8. SSH: Deploy & Use ssh-keygen -D /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so | ssh username@targethostname 'cat >> /ssh/authorized_keys' echo "PKCS11Provider /usr/lib/x86_64-linux-gnu/opensc-pkcs11.so" >> ~/.ssh/config ssh username@targethostname Enter PIN for 'PIV_II (PIV Card Holder pin)':

Editor's Notes

  1. I am by no means an expert! This is all based on my tinkering about and browsing through the yubico website.
  2. Small, relatively cheap (£40 for the Neo but other versions are cheaper, just less featureful). Manufactured by Yubico in the USA or Sweden Software and protocols are opensource OTP is One Time Password CCID is Chip Card Interface Device (Basically smart card via USB) U2F is Universal Two Factor Presents as a USB keyboard so touching the button is sufficient to send the OTP password to the computer It has two “slots” for configuring the bahaviour of the button. By default only the Yubico OTP is configured but you can choose from various OTP methods, challenge response or even a static password. The two slots are chosen by a short or long press. The U2F and CCID functionality are independent of these slots, so you can have 4 functions from one device.
  3. Log in to computer either makes use of a Yubico authentication server or locally configured list of users. Has PAM components (OTP, Challenge Response & U2F) for Linux & Mac OS X and a windows equivalent. Can be configured as the sole authentication method or as an additional one. Can be used as an authentication mechanism for password managers such as LastPass, Keepass, Passwordsafe etc. Stop having to remember a complex master password. Two Factor auth is done by using the U2F standard (supported by Google, Facebook, Dropbox and Wordpress) or OTP which is more widely supported You can generate and store a certificate on the key and from this produce a public ssh key that you deploy to target servers, more on that shortly. There is a wealth of information on the Yubico website and I’ve not explored it all yet, but I saw information on how to use the yubikey to sign code and integrate with full disk encryption setups. The code signing would be handy for Apple development as it’s all too easy to lose your credentials when moving machines etc.
  4. Two factor authentication is good, timed code apps like Google Authenticator are less good. U2F means you don’t need to type anything or wait for the timer to countdown, just insert your key, and touch the button. Doesn’t require you to carry your phone around or have it charged up. Currently requires Chrome browser but other browsers are implementing it also. https://accounts.google.com/b/0/SmsAuthSettings#securitykeys
  5. opensc is the Open Smart Card project, an implementation of the PKCS11 protocol/API
  6. The tools are all installable from packages under debian (and presumably other distros too), if not you can download and install them from the Yubico website For some reason the CCID functionality is disabled by default on the key, so you need to use the manager app to enable it.
  7. This generates a self signed key in slot 9a on the key (there are multiple slots with different use cases that basically enforce different levels of PIN checking) - for our use, it doesn’t really matter which one we use. By default the key has a PIN of 123456 - you’d want to change that before using it in the real world. This process creates a private PKCS11 key that is stored on the key. There are other techniques that generate it entirely on the device so it never exists on your computer but they’re more complex and I’m still figuring things out.
  8. This generates an ssh public key and copies it to your target host The PKCS11Provider line tells ssh to use the opensc libraries to communicate with the Yubikey. Without it, you need to specify the library each time you use ssh, which would be a pain. Now when you ssh to the server, when the key is present you will be prompted to enter your PIN to unlock the certificate, then you’re in. You can use ssh agent to cache this as with any ssh key/password. If you don’t have the key present then it will fall back to password based auth, unless that has been disabled on the server. This also works with git - add your ssh key to github, for example, and then you’ll be prompted for your PIN when performing git operations.