Using Yubikey as ssh key

May 31, 2019


This is a simple guide how you can use your Yubikey for SSH authentication, so that your key is not stored on disc but rather on token (yubikey in this case). Expected environment is Ubuntu 18.04 LTS.

Configure your system

First install necessary packages.

sudo apt install pcscd scdaemon pinentry-gnome3 yubikey-personalization yubikey-personalization-gui

Then copy udev rules for yubikey so it can work as smart card.

sudo cp /lib/udev/rules.d/69-yubikey.rules /etc/udev/rules.d/69-yubikey.rules

We will need to enable SSH support in GPG agent, hence we want to start it with custom params. So first we will deactivate default GPG agent service for you user.

systemctl --global --user mask --now gpg-agent.service gpg-agent.socket gpg-agent-ssh.socket gpg-agent-extra.socket gpg-agent-browser.socket

Then we will manually start GPG agent on user login (through X sever)

cat >>~/.xsessionrc <<"EOF"
gpg-agent --daemon --enable-ssh-support --default-cache-ttl-ssh 36000 --max-cache-ttl-ssh 72000 --pinentry-program /usr/bin/pinentry-gnome3
EOF

And we need to export SSH AUTH socket of GPG agent for your user console (replace 1000 with your UID).

cat >>~/.bashrc <<"EOF"
SSH_AUTH_SOCK=/run/user/1000/gnupg/S.gpg-agent.ssh; export SSH_AUTH_SOCK;
export GPG_TTY=$(tty)
EOF

Configure Yubikey

If you didn’t touch your Yubikey yet, then PIN and admin PIN are following:

  • PIN: 123456
  • Admin PIN: 12345678

You are advised to change them later.

First setup your Yubikey as smart card using gpg.

gpg --card-edit
# enable admin access
gpg/card> admin
# setup card holder info
gpg/card> name
gpg/card> lang
gpg/card> login
gpg/card> sex
# hit enter and save changes
gpg/card> quit

Generate GPG key

TODO - how to generate GPG key

Move key to Yubikey

# pick key to edit
gpg --edit-key $KEY_ID

# pick AUTHZ sub key to be moved to the card
gpg> key $INDEX_AUTHZ_KEY
gpg> keytocard

# pick where should be key stored on card (Yubikey)

#Please select where to store the key:
#   (1) Signature key
#   (3) Authentication key
Your selection? 3

After restart it should all work. You can list available ssh keys (once Yubikey is inserted) using ssh-add -L. If you have any key on the filesystem, you can add it to the GPG agent (since you no longer use standard SSH agent). Just you ssh-add ~/.ssh/id_rsa. You will be asked for key password and then you twice enter new password (for GPG keyring). Then when you SSH to the machine, you are asked for GPG keyring password for you local SSH key or Yubikey/SmartCard PIN for SSH key on the card.