hko, (edited ) to rust
@hko@fosstodon.org avatar

Meet oct-git, a new signing and verification tool for use with the distributed version control system:

https://crates.io/crates/openpgp-card-tool-git 🦀

oct-git focuses exclusively on ergonomic use with OpenPGP card-based signing keys

It is designed to be easy to set up, standalone (no long running processes), and entirely hands-off to use (no repeated PIN entry required, by default). It comes with desktop notifications for touch confirmation (if required)

dvzrv,
@dvzrv@chaos.social avatar
schizanon, to passkeys
@schizanon@mastodon.social avatar

PassKeys seem like a bad idea. Google backs them up to the cloud, so if your Google account is compromised then all your private keys are compromised. I don't see how that's an improvement over password+2FA at all.

Now security keys I get; keep the private key on an airgapped device. That's good. Hell I even keep my 2FA-OTP salts on a YubiKey.

oliklee, (edited ) to ubuntu
@oliklee@chaos.social avatar

I have upgraded two systems to #Ubuntu 24.04 now and also tried #Thunderbird as snap (which is the default for Ubuntu 24.04) on another machine.

The system upgrades were incredibly smooth. Thunderbird in general also works fine, but it doesn't support #GPG with private keys on a #YubiKey yet (which is my usecase). (Yes,there is a workaround, although clunky.)

So it looks like I'll stay on 23.10 a bit longer on my main machine.

https://bugs.launchpad.net/ubuntu/+source/thunderbird/+bug/2009825

rhys, to llm
@rhys@rhys.wtf avatar

My first troublesome hallucination with a #LLM in a while: #Claude3 #Opus (200k context) insisting that I can configure my existing #Yubikey #GPG keys to work with PKINIT with #Kerberos and helping me for a couple of hours to try to do so — before realising that GPG keys aren't supported for this use case. Whoops.

No real bother other than some wasted time, but a bit painful and disappointing.

Now to start looking at PIV instead.

#AI #Anthropic #Claude

chiefgyk3d, to DEFCON
@chiefgyk3d@social.chiefgyk3d.com avatar

I’m prepping for my credential rollover and setting up the new @yubico 5C NFC keys they sent me as I’m a yubico ambassador and decided to get the @defcon stickers from Keyport to style the new keys I will be swapping to as I’m deprecating USB A. Also got new Keyport covers for backups and to swap out my current ones for a different style.

#defcon #infosec #cybersecurity #yubikey

ctietze, to random
@ctietze@mastodon.social avatar

Listening to a talk at a local meetup.

sounds like a cool thing to have for this for device-bound passkeys.

But:

How does YubiKey earn one’s trust?

With everything home-cooked one knows who’s responsible for damage. With 3rd party, you’re still to blame to trust the wrong company :/

c0dec0dec0de, to random
@c0dec0dec0de@hachyderm.io avatar

Alright, where on fedi is the nerd who uses a to unlock and start their car? (And do they have a sweet blog about their nerd-mobile?)

stafwag, to debian
@stafwag@mastodon.social avatar

Use a GPG smartcard with Thunderbird. Part 1: setup GnuPG

https://stafwag.github.io/blog/blog/2024/04/21/use-a-gpg-smartcard-with-thunderbird-part_1-setup-gpg/

I moved to a Thinkpad w541 with coreboot so I needed to set up my email encryption on Thunderbird again.

It took me more time to reconfigure it again - as usual - so I decided to take notes this time and create a blog post about it. As this might be useful for somebody else … or me in the future :-)

@stafwag

stafwag,
@stafwag@mastodon.social avatar

@adamsdesk For the fsf europe fellowship card I don't know. I got my card 8 year ago from floss-shop.de. (I live in Europe/Belgium BTW ) You can check with them if they ship to Canada.

But the setup should work with any GPG compatible smartcard. I'm also looking at Not sure if nitrokey is available on your side of the ocean 🙂

is also a option:
https://stafwag.github.io/blog/blog/2015/06/16/using-yubikey-neo-as-gpg-smartcard-for-ssh-authentication/

But I lean more to nitrokey as I have the impression that they're more active in the opensource community

scy, to random
@scy@chaos.social avatar

"A security issue has been identified in YubiKey Manager GUI which could lead to unexpected privilege escalation on Windows. If a user runs the YubiKey Manager GUI as Administrator, browser windows opened by YubiKey Manager GUI may be opened as Administrator which could be exploited by a local attacker to perform actions as Administrator."

https://www.yubico.com/support/security-advisories/ysa-2024-01/

Note that this affects Windows only.

kubikpixel, to passkeys German
@kubikpixel@chaos.social avatar

Mist, jetzt hatte ich doch Hoffnung und Glaube, dass PassKey unanfälliger ist als Password-Logins. Zugegeben, es ist dessen Hilfsmittel und nicht deren Definition aber trotzdem.

»FIDO2-Sticks: Lücke in Yubikey-Verwaltungssoftware erlaubt Rechteausweitung.
Um die FIDO2-Sticks von Yubikey zu verwalten, stellt der Hersteller eine Software bereit. Eine Lücke darin ermöglicht die Ausweitung der Rechte.«

😬 https://www.heise.de/news/FIDO2-Sticks-Luecke-in-Yubikey-Verwaltungssoftware-erlaubt-Rechteausweitung-9690597.html

schenklklopfer, to microsoft German
@schenklklopfer@chaos.social avatar

Kennt jemensch nen Tweak, wie ich die von der Firma vorgegebenen Sicherheitsmaßnahmen um meinen Account umgehen kann?

Die sind mir zu unsicher.

Ich will meinen verwenden und nicht diese Microsoft Malware an "Microsoft Authenticator".

chiefgyk3d, to infosec
@chiefgyk3d@social.chiefgyk3d.com avatar

I find it really stupid Coinbase only allowed me to input 5 FIDO/U2F keys. That doesn't even cover half the total FIDO/U2F hardware keys in my arsenal. Not including the capability that Ledger and Trezor have to be a FIDO/U2F key themselves.

chiefgyk3d, to Cybersecurity
@chiefgyk3d@social.chiefgyk3d.com avatar

Big thank you to @yubico they are sending me two new Yubikey 5C NFC keys as I am no longer needing the Yubikey 5Ci as I no longer use lightning connections since I got an iPhone 15.

Yubico has been my longest running partner since I have been creating content. Thank you for the support over all these years and the many keys you have provided me.

scy, to random
@scy@chaos.social avatar

In theory you can gpg-connect-agent 'scd random 16' /bye to get 16 bytes of good randomness from your .

In practice you'll have to cut off the D[space] at the beginning, the [newline]OK[newline] at the end, and then find a way to remove URL-style percent encoding from the result (because some control characters and percent symbols will be encoded) … which is surprisingly hard to do on the command line without installing additional stuff or calling out to Python/Perl/Ruby/etc.

scy, to random
@scy@chaos.social avatar

If you own a modern , you might know that you can use the YubiKey Manager to enable/disable the applications & interfaces it provides.

What you probably didn't know: You can password-protect this setting using the command-line version of the Manager, with the ykman config set-lock-code command.

If you lose that lock code, you can't change the setting anymore, ever.

If it's not yet set, others with physical access to your key could disable everything, set a code and lock you out. 😬

scy,
@scy@chaos.social avatar

Okay, slightly more problematic scenario: Malware bricking your this way, forcing you to reset your setup to something less secure.

But if you already have malware on your machine, it probably has other ways to prevent you from using your YubiKey, too.

scy, to random
@scy@chaos.social avatar

TIL: The 5 supports setting a PIN for additional security – but only the FIPS models, not the normal ones, and only in FIPS Level 1; in Level 2 U2F is forbidden entirely and only FIDO2 can be used.

scy, to opsec
@scy@chaos.social avatar

Huh. Anyone ordered a lately? Did yours also come with an obvious fingerprint smudge on its contact surface?

The packaging is apparently undamaged.

I've contacted Yubico support about whether that's normal or a possible sign of tampering. Let's see what they say.

hko, to rust
@hko@fosstodon.org avatar

I just released https://crates.io/crates/openpgp-card-ssh-agent version 0.2.1, a new agent for card users.

This release should fix build issues (the previous version didn't build on mac).

However, we're still exploring how secret storage works on non-Linux platforms. Expect a bumpy ride if you try it.
(If you do delve into debugging on mac or windows, we'd love to hear from you!)

scy, to random
@scy@chaos.social avatar
scy, to random
@scy@chaos.social avatar

Pondering whether to move my secrets to a .

Pro:
• stored safely on protected hardware
• secret "cannot" be extracted
• can access TOTP codes from an untrusted device, e.g. if my phone's battery is empty

Con:
• backing up the secrets is "not possible"
• having a second YubiKey for redundancy is recommended, but both need to be present when setting up a new secret (or you need to store a copy of the secret somewhere else)
• only has 32 slots (but I only have 23 TOTPs atm)

hko, to rust
@hko@fosstodon.org avatar

The oct tool for inspecting, configuring and using OpenPGP card devices (https://crates.io/crates/openpgp-card-tools) is on "This Week in Rust":

https://this-week-in-rust.org/blog/2024/02/21/this-week-in-rust-535/#projecttooling-updates

Yay! 🎉 Thanks again, @dvzrv 😀

mima, to fediverse

Why does / need an "authenticator app" registered before you can use a hardware key? That doesn't make sense wise.

Yeah I know it's to prevent people from just accidentally getting locked out of their accounts, but there should be an option for to allow this risk. 🤔

ho1ger, to passkeys German
@ho1ger@mas.to avatar

Ich habe in den letzten Tagen etwas mit und einem gespielt. Coole Technik, sollte man mal ausprobieren → https://ho1ger.de/2024/02/14/selbstversuch-passkeys-mit-und-ohne-yubikey/

  • All
  • Subscribed
  • Moderated
  • Favorites
  • anitta
  • vwfavf
  • magazineikmin
  • everett
  • thenastyranch
  • Youngstown
  • slotface
  • hgfsjryuu7
  • ngwrru68w68
  • rosin
  • kavyap
  • khanakhh
  • PowerRangers
  • DreamBathrooms
  • Leos
  • mdbf
  • InstantRegret
  • ethstaker
  • Durango
  • osvaldo12
  • tacticalgear
  • tester
  • modclub
  • GTA5RPClips
  • cisconetworking
  • cubers
  • normalnudes
  • provamag3
  • All magazines