LukeMainFrame

Knowledge Is Power

Home  Blog Articles  Publications  About Me  Contacts  
6 May 2019

Hardware-based authentication: Yubikey overview

by Lord_evron

This article series will explain hardware-based authentication and how to configure a YubiKey (a popular security token) to secure your accounts and manage your SSH/GPG keys.

Security tokens significantly enhance user authentication. Compromising an account requires not just a username and password, but also physical possession of the hardware token, which must be inserted and activated (button press, code reading).
When implemented correctly, this virtually eliminates remote attacks, leaving only physical access as a potential vulnerability. This is why banks use one-time passwords. Many security tokens exist, from those popularized by the Bitcoin boom (like Trezor) to simple time-based code generators (used by banks) and more complex tokens like the YubiKey. This series focuses on the YubiKey due to its flexibility.

A YubiKey is a small USB device with multiple uses, including authentication and encryption. It has many features, but its documentation can be challenging. (I did read the manual, though!). YubiKeys come in various versions, differing in form factor, key storage capacity, NFC support, etc. We’ll focus on the YubiKey 4, but the information should be generally applicable. YubiKeys use different USB interfaces (protocols) depending on the function:

Now, let’s dive into the YubiKey’s applications:

This concludes the overview of YubiKey features. The next article will cover configuring the OpenPGP applet and using the key for SSH.

tags: technology - hardware - yubikey