OpenBSD Yubikey Authentication
OpenBSD includes out-of-the-box support for login via. YubiKey. Yay!
OpenBSD doesn’t authenticate against a central server (such as the service offered by Yubico) to verify a YubiKey. This is good because I don’t have to trust a 3rd party with my credentials. Unfortunately, this also means that OpenBSD is tracking the “last-use” token (not centralized) which means that without somehow synchronizing the “last-use” value I can only safely use a YubiKey token on a single machine. Using it on multiple machines would open me up to replay attacks where a YubiKey entered on one machine (where “last-use” is big), could be used on another machine (where “last-use” is smaller).
I can live with this but it’s something to be aware of.
The OpenBSD YubiKey authentication ‘‘replaces’’ password authentication. Ideally, I would have to provide both a password and a YubiKey as credentials so that finding my YubiKey is not sufficient to compromise my system. Fortunately a patch exists that allows me to use both.
Configuring the YubiKey #
Configuring the YubiKey is a bit of a pain. Yubico offers some nice utilities and it’s easiest to run these on Windows. My preferred approach is to setup a Windows VM with the Yubi tools, turn off networking, snapshot it, program my YubiKeys, record the private id / secret key, and then rollback the snapshot.
Roughly:
- Start the YubiKey Personalization Tool
- Insert your YubiKey
- Click “Yubico OTP” in the header at the top
- Click “Quick”
- Choose a configuration slot to program (1 is often pre-programmed so you may want to be careful overwriting that)
- Record the “Private Identity” and “Secret Key”
- Click “Write Configuration” to push those keys onto your YubiKey
The “Advanced” mode lets you lock your YubiKey to prevent overwriting your credentials.
Configuring OpenBSD to Login via. YubiKey #
- Grab the value from the “Private Identity” field and put it into
/var/db/yubikey/$user.uid
(removing all the spaces!) - Grab the value from the “Secret Key” field and put it into
/var/db/yubikey/$user.key
(removing all the spaces!) - Make sure permissions are correct (owned by root.auth, 0640)
Note: The echo “…” statements below work but shouldn’t really be used. They will expose the secret key in the process list and your shell’s history. Best to just open the files in a text editor and type/paste those values in.
# cd /var/db/yubikey
# echo "f2a4ac5bb965" > bob.uid
# echo "b70c2224b328523b43d46f4bdb5221a6" > bob.key
# chown root.auth bob.*
# chmod 640 bob.*
# ls -l
total 32
-rw-r----- 1 root auth 33 Apr 16 07:32 bob.key
-rw-r----- 1 root auth 13 Apr 16 07:32 bob.uid
-rw-rw---- 1 root auth 3 Apr 16 07:30 root.ctr
-rw-r----- 1 root auth 33 Apr 16 07:29 root.key
-rw-r----- 1 root auth 13 Apr 16 07:29 root.uid
Open /etc/login.conf
and add “yubikey” to the auth-defaults.
auth-defaults:auth=yubikey,passwd,skey:
Configuring SSH to require YubiKey + Public #
I choose to configure SSH to require login using a public key AND my YubiKey by adding the following two lines to /etc/ssh/sshd_config
.
AuthenticationMethods publickey,password
PasswordAuthentication no
When you login you should see something like this:
$ ssh bob@localhost
OpenBSD 5.4 (GENERIC) #37: Tue Jul 30 15:24:05 MDT 2013
Enter passphrase for key '/home/bob/.ssh/id_ecdsa':
Authenticated with partial success.
bob@localhost's password: [PRESS YUBIKEY BUTTON HERE]
$