Pünktlich zum #39C3 habe ich mein #Hardwaretoken #Howto erweitert um
#OpenSSH #Authentifizierung.

Ich zeige wie man sich an #SSH Servern einloggen kann mittels #FIDO2 Device Bound #Passkeys à la #Yubikey, #Nitrokey, #Token2 #Thetis etc.

Damit liegt der geheime Schlüssel im Passkey-Token und kann nicht ohne weiteres ausgelesen werden.

Außerdem zeige ich noch wie man einen 2. externen OpenSSH-Server nur für die Hardwaretoken konfiguriert.

Viel Spaß am Gerät

https://www.cryptomancer.de/posts/20251225-opensshfido2/

OpenSSH-Authentifizierung mittels Hardwaretoken (FIDO2 Device Bound Passkeys à la Yubikey, Nitrokey, Token2, Thetis etc.)

Voraussetzung Seit Version 8.2.0 unterstützt OpenSSH FIDO2 basierte Schlüssel, also Passkeys. Dieser Schlüssel kann dabei bequem als sog. device bound passkey (fürderhin Passkey genannt) auf einem Hardware-Token liegen. Der geheime Schlüssel kann dann nicht vom Token exportiert werden und ist somit vor Diebstahl geschützt. Das Hardwaretoken fungiert dann quasi als Hardware Security Module und schützt den geheimen Schlüssel. Eingesetzt werden kann dafür ein beliebiges FIDO2-konformes Token, z.B. ein Yubikey 5 oder Security Key, Token2 R3 oder ein Thetis Security Key.

CryptoMancer.de

Und weiter geht's bei meiner kleinen Reise durch die wunderbare Welt der #HardwareToken...

Die heutigen Logins am #openvpn und MS Dingens erfolgt mit dem zweiten #TOTP Faktor vom #yubikey. Somit habe ich nun 3 optionale Wege, an diesen Faktor zu kommen:
- #AndOTP
- #keepassxc
- yubikey

$ ykman oath accounts code pfsense pfsense 416654

#security #Hardware #Token

This is unfortunate because I received a pair of these recently that I've been meaning to take out of the package. I guess they won't be issuing recalls?

https://arstechnica.com/security/2024/09/yubikeys-are-vulnerable-to-cloning-attacks-thanks-to-newly-discovered-side-channel/

#securitykey #sidechannel #yubikey #yubikeys #hardwaretokens #hardwaretoken #cryptography #credentials #fido

YubiKeys are vulnerable to cloning attacks thanks to newly discovered side channel

Sophisticated attack breaks security assurances of the most popular FIDO key.

Ars Technica
A RISC-V Security Key

The TKey is a RISC-V-based security key that plugs into a USB port. The device has a number of features, including a device-specific serial number, RAM scrambling, and a monitor that kills the CPU …

Hackaday
How are hardware keys phishing resistant to man-in-the-middle attacks?

I've heard that hardware keys like Yubikey are phishing resistant. But I do not understand where a phished man-in-the-middle attack, which tries to "forward" the whole communication, fail...

Information Security Stack Exchange

I want to beef up my 2FA standards and I'm looking for a 2FA hardware token. The only one's I've ever used have been for work (RSA Tokens) but what else is out there? Better yet, what should I be looking for in a hardware token?

#2FA
#hardwaretoken
#passwordsecurity

@alx does anyone know if this works when your SSH key is stored on a #hardwaretoken like #Yubikey ? This sounds like a good use case of short-lived SSH certificates as well
TurtleAuth DIY Security Token Gets (Re)designed For Durable, Everyday Use

[Samuel]’s first foray into making DIY hardware authentication tokens was a great success, but he soon realized that a device intended for everyday carry and use has a few different problems …

Hackaday

TurtleAuth DIY Security Token Gets (Re)designed for Durable, Everyday Use

[Samuel]'s first foray into making DIY hardware authentication tokens was a great success, but he soon realized that a device intended for everyday carry and use has a few different problems to solve, compared to a PCB that lives and works on a workbench. This led to TurtleAuth 2.1, redesigned for everyday use and lucky for us all, he goes into detail on all the challenges and solutions he faced.

When we covered the original TurtleAuth DIY security token, everything worked fantastically. However, the PCB layout had a few issues that became apparent after a year or so of daily use. Rather than 3D print an enclosure and call it done, [Samuel] decided to try a different idea and craft an enclosure from the PCB layers themselves.

The three-layered PCB sandwich keeps components sealed away and protected, while also providing a nice big touch-sensitive pad on the top, flanked by status LEDs. Space was a real constraint, and required a PCB redesign as well as moving to 0402 sized components, but in the end he made it work. As for being able to see the LEDs while not having any component exposed? No problem there; [Samuel] simply filled in the holes over the status LEDs with some hot glue, creating a cheap, effective, and highly durable diffuser that also sealed away the internals.

Making enclosures from PCB material can really hit the spot, and there's no need to re-invent the wheel when it comes to doing so. Our own [Voja Antonic] laid out everything one needs to know about how to build functional and beautiful enclosures in this way.

#microcontrollers #securityhacks #durable #gpg #hardwaretoken #pcb #security #u2f

TurtleAuth DIY Security Token Gets (Re)designed For Durable, Everyday Use

[Samuel]’s first foray into making DIY hardware authentication tokens was a great success, but he soon realized that a device intended for everyday carry and use has a few different problems …

Hackaday

Secure Shell ssh Möglichkeiten und Gefahren

Der beliebte Zugang zu Remote-Hosts hat auch gewaltige Fallstricke https://blog.schuerz.at/~/SicherheitImNetz/secure-shell-ssh-möglichkeiten-und-gefahren/

Secure Shell ssh Möglichkeiten und Gefahren

Der beliebte Zugang zu Remote-Hosts hat auch gewaltige Fallstricke