Onlykey
OnlyKey was developed by a team of computer security experts and white hat hackers to stop malicious hackers. One thing hackers and malware on a computer cannot do is physically touch something.
In order to use OnlyKey to log in, physical touch is required. In order to read a secure message, physical touch is required.
Our design is open source and reviewed by the community to verify that there are no backdoors. This just isn’t possible with other closed source products.
PIN PROTECTED When you first receive your OnlyKey the first step to set it up is to set a PIN. The PIN is entered directly on the OnlyKey PIN pad to activate OnlyKey. This provides the following advantages:
Physical Security - If you lose your OnlyKey it is unusable without knowing the PIN. Protected on Untrusted Computer - The PIN is entered on OnlyKey instead of on a computer. Entering a PIN on a compromised computer would result in compromise of the PIN. Only One PIN to Remember - Protect all of your accounts with only one PIN to remember.
— Onlykey
OnlyKey setup (pam.d) in archlinux
Be careful, pam rules applied immediately If you have issues, boot using
live-iso usb drive, mount system (mount /dev/.. /mnt
) and fix
etc/pam.d files.
TODO: need to ingerate with NixOS, 2 keys (backup).
References
- GitHub - drduh/YubiKey-Guide: Guide to using YubiKey for GPG and SSH
- OnlyKey User’s Guide | Docs
- Universal 2nd Factor - ArchWiki
- Unlocking LUKS2 volumes with TPM2, FIDO2, PKCS#11 Security Hardware on systemd 248
- Yubico/pam-u2f: Pluggable Authentication Module (PAM) for U2F and FIDO2
- Yubikey - NixOS Wiki
- Ubuntu Linux Login Guide - U2F – Yubico
- U2F setup for sudo by Brendan Horan
- U2F setup for lightdm login/screensaver by Brendan Horan