@LimeSurvey The new #2FA with #YubiKey doesn't work well in combination with @1password and the auto submit feature. Why didn't you implement #WebAuthn?
@LimeSurvey The new #2FA with #YubiKey doesn't work well in combination with @1password and the auto submit feature. Why didn't you implement #WebAuthn?
I've hit a use-case where the #Yubikey is unusable.
I have an ssh key I use with Ansible. I use ssh-add to add that key to ssh-agent.
When running a script to update mulitple hosts, I'm being prompted: "Please enter the passphrase for the ssh key". Repeatedly.
That's not feasible. Ain't nobody got time for that.
Is this just the way I've set it up?
@fleaz : it's not MultiMultiFactorAuthentication but 1FA max.
Assuming that you don't use those hardware keys to generate TOTP codes (which are pointless when confronted with the likes of #Evilginx2), but use WebAuthn instead (FIDO2 passkeys in hardware keys), everything depends on one factor: the domain name of the website.
DV-CERTS SUCK
It is not very common that certificates are issued to malicious parties, but it *does* happen now and then (https://infosec.exchange/@ErikvanStraten/112914050216821746).
SUBDOMAINS
Furthermore, sometimes organizations have "dangling" subdomain names. For example,
test.example.com
may point to the IP-adress of some cloud server no longer used by example.com. Anyone with write access to that server may install a fake "test.example.com" website and phish you to it. It *may* be used to phish your WebAuthm credentials *if* "example.com" does not explicitly *DENY* WebAuthn from "test.example.com".
See https://github.com/w3ctag/design-reviews/issues/97#issuecomment-175766580 for how Google prevents "sites.google.com" from authenticating to "google.com".
DNS HACKED
It may not be neccessary to execute BGP-hijacks to redirect network traffic to an impostor: it also all depends on how reliable DNS records are protected against unauthorized access. If the dude in charge for DNS uses a stupid password only, or the DNS provider is easily fooled into believing "I forgot my creds", it's game over. The crooks will obtain a DV-cert in no time, no questions asked, for free.
All the bells and whistless are moot if there's an alternative way to log in (such as by using a 1FA rescue code) and the user is fooled into providing it (after they've been lied to that their WebAithn public key on the server became corrupted or was lost otherwise).
Cloudflare MitM's https connections (it's not a secret: https://blog.cloudflare.com/password-reuse-rampant-half-user-logins-compromised/). The same applies to any server you log in to, which is accessible by untrustworthy personnel. They can steal your session cookie.
In the end MFA/2FA is a hoax anyway, because the session cookie (or JWT or whatever) is 1FA anyway.
Did I mention the risks of account lockout with hardware keys that cannot be backupped? And the mess it is to keep at least one other hardware key synchronized if it's in a vault? And the limitation of, for example, 25 WebAuthn accounts max? And (unpatcheable) vulnerabilities found in hardware keys? And their price? And how easy it is to forget or loose them?
@teleclimber I like the pro version!The same Dev makes an email client: FairEmail which I use instead Gmail (I use Google accounts for non important stuff). I'm still setting it up as I want to step up my game in using FOSS alternatives. The 3a has very little if any bloatware which is nice. Nothing OS looks sleek but I think I'll switch launchers as I like having more functionality. NFC isn't working for me (can't find the position) and my #Yubikey C NFC didn't work - could be my settings tho.
https://discourse.nixos.org/t/yubilock-module-for-waybar/62385
Oooh... graphical waybar Yubikey locking module that can be toggled on & off.... yes please!
https://discuss.privacyguides.net/t/keepassxc-yubikey-how-to-set-up-a-local-only-password-manager/25906 This article is a tutorial to install the password manager KeePassXC to work with a YubiKey.
This setup is very convenient if you wish to store your passwords locally only.
And it’s quite easy to set up!
@techlore proton pass is good in that your data on proton pass is fully #encrypted. So if you use a hardware based #passkey such as a #yubikey to secure the main account, and have all your other accounts within use software based passkeys and 2FA, wouldn't be as much of a risk even if Proton Pass got breached as a service.
If you are looking for a good password manager you can use from anywhere, there are plenty of excellent options to choose from. However, if you prefer to only store your passwords locally, KeePassXC is what you need. In our latest tutorial, we'll walk through setting up KeePassXC to work with your YubiKey as an additional factor to secure your local-only password database.
https://www.privacyguides.org/articles/2025/03/18/installing-keepassxc-and-yubikey/
Offline PKI using 3 Yubikeys and an ARM single board computer
New tutorial on how to connect to SFTP with private key stored on #YubiKey https://docs.cyberduck.io/tutorials/sftp_publickeyauth_yubikey/
Y a-t-il dans le coin des utilisateurs de #YubiKey5C ?
Het is goed om vaker naar Europese alternatieven te kijken, zodat we onze economie sterk houden. Gelijktijdig leven we in een globale economie en komt soms het "beste" product of dienst uit een ander werelddeel. Als we alle landen zouden boycotten die slechte doen of deden, dan kun je nergens meer iets kopen
Zelf kijk ik naar meer Europese producten. Zo heb ik afgelopen week een @nitrokey gekocht in plaats van #Yubikey. Niet alleen vanwege de afkomst, maar ook omdat zij meer #OpenSource zijn.
New Privacy Guides article
by me:
If you are using a YubiKey,
you might get in some situations where you need to reset your key to factory default, and/or set up a backup of it on a spare key.
This tutorial will guide you
through each step to reset and back up your YubiKey successfully, with clear instructions and plenty of visual support.
I hope you find it helpful!
https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/
Always remember, when it comes to hardware security keys: Two is one, one is none.
Our latest article covers the setup process for two YubiKeys (from Yubico's YubiKey 4 or 5 series) to keep your online accounts safe and secure + it goes through resetting your existing keys to a blank slate, and the reasons you might want to do so!
https://www.privacyguides.org/articles/2025/03/06/yubikey-reset-and-backup/
People who use hardware security keys: Storing them in geographically diverse locations is a wise move but makes it impossible to quickly onboard. How do you keep track of where you’ve registered each key? A checklist in a spreadsheet is obvious but cumbersome. Is there a better way? (Yes I use passkeys extensively but for certain services like email, iCloud, and my password manager, a hardware option is desirable if not mandatory.) #YubiKey #YubiKeys #FIDO #FIDO2 #FIDOKey #FIDOKeys #Security
The #YubiKey Manager GUI will be EOL on February 19, 2026.
https://www.yubico.com/support/download/yubikey-manager/#h-downloads