==================================================
Using a Yubikey to authenticate to a Gentoo system
==================================================
:CreationDate: 2015-11-29 13:30:11
:Id: SW/yubikey-auth
:tags: - software
- configs
Very rough:
* add `my overlay`_
* un-keyword the needed packages, for example by writing this to
``/etc/portage/package.accept_keywords/yubikey``::
app-crypt/libu2f-host
app-crypt/libu2f-server
sys-auth/pam_u2f
* install |pam_u2f|_
There's still a weird problem in that ebuild, it puts the library in
the wrong directory. You may need to ``cp
/lib/x86_64-linux-gnu/security/pam_u2f.so /lib64/security``
* add at the top of ``/etc/pam.d/system-login``::
auth required pam_u2f.so
* run, as each user on your machine::
mkdir -p ~/config/Yubico
pamu2fcfg -u${USER} -opam://$(hostname) -ipam://$(hostname) \
>> ~/config/Yubico/u2f_keys
* Done. Now you'll need to touch your Yubikey every time you login,
after you type the username but before you type the password. See
the |pam_u2f|_ documentation for further details.
.. note::
By declaring that |pam_u2f| is "``required``", you're saying that
the Yubikey is necessary *in addition to your password*. If you
want to just use the Yubikey, write ``sufficient`` instead.
.. _`my overlay`: https://www.thenautilus.net/cgit/gentoo-overlay/
.. _`pam_u2f`: https://developers.yubico.com/pam-u2f/
.. |pam_u2f| replace:: ``pam_u2f``