Hardware-based authentication: Yubikey configuration

In the last article I gave a quick overview of the hardware tokens and the yubikey. Today we will go more in details and we will see how to set and use GPG keys on the yubikey. Basically, this guide will show how to create the GPG KEYS on your pc and then move it to yubikey…Some of the information i got it from some forums. I tested those commands multiple times so they should work fine. Leave a comment if you run into problems.

Before you start, notice there is an easier way to generate the key directly on the yubikey, but this will give in my opinion two disadvantages:

1- I do not trust the yubikey applet to generate random keys. better to use the one from a linux distro.

2- You cannot backup the key, so if you generate onboard, and you  destroy the key there is not copy of the key (it can also be seen as an advantage)

In this post, I will also show how to export the SSH pub key out of the GPG certificate.

So Before you start, you will need the gpg package installed. If you use windows use, install “gpg4win” software. During the installation, select also kleopatra, that is a KeyRing holder for your keys and certificates.

Final note before we start: some key backup are redundant, feel free skip it.

TO CREATE A GPG KEY:
1. Generate master key with:

$gpg2 --gen-key

Choose RSA sign only and fill up the size (4096), name, email and comments… chose if to use a passphrase or not.. validity I use 5 years..
2.MAKE A BACKUP OF THE MASTER KEY.. I called it master_only.asc you can do that from “kleopatra” interface

3. create a revocation certificate (adjust path)

$gpg --output PATH/revocation-certificate.txt --gen-revoke 2A5B4888

as reason you can put “key as been compromised” and comment something like: “Created during key creation, emergency use only.” This certificate is useful in case that someone steal your master key and start to use for signing your documents impersonating you. Then you can upload the revocation certificate to a server and this will inform all the users connected to the gpg servers that key is invalid.

4. Print that certificate in paper and store it in a safe.

5. Lets start to create subkeys: Subkeys are key that are child of the master key. Usually the master key is too powerful. So is good practice to have a separation of key powers. So we will have one subkey for encrypting, one for certification, and one for signing.

$gpg --expert --edit-key 2A5B4888
$addkey

ADD 3 keys.. one only for RSA signing (option 4), one for only encrypting (option 6) and one for only certification ( option 8…set your own capability)– all the key are 4096 and 5years expiring date

At the end you can write save and exit from the edit-key menu….

$save

6. now you should be able to see all your key and secret key with:

$gpg --list-key
$gpg --list-secret-key

At this point all the key are on your local pc. The keywords sec and ssb means the main key and the subkeys are available locally. If the keyring contained only stubs for the private keys (meaning that the key are not present locally but are just a link to the card), it would be shown as sec> and sec# or pub.

7. MAKE A BACKUP OF ALL THE KEY.. use kleopatra for this as in point 2…i called it with_subkey.asc

8. CONFIGURE THE YOUBIKEY : this next steps will set up a pin code to your youbikey

$gpg --card-edit
$gpg/card>admin
$gpg/card>passwd

change the pin and the master pin according with your need. Also change the other info in the card.

$gpg/card> name
$gpg/card> lang
$gpg/card> url
$gpg/card> sex
$quit

9. EXPORT CERTIFICATE (backup) from kleopatra “certificate.asc”

10. At this point,  we need to move the subkeys to the card. We will not move the master key, but only the three subkeys. this is a good practice, because we can use the master key to revoke the existent subkeys, or generate new subkeys in case we need it. Please substitute the correct key id in the following commands.

$gpg --edit-key 1B2C4417
$gpg> toggle
$gpg> key 1

##this will select the key 1… you will see a star near the selected key like this

sec 3744R/1B2C4417created: 2014-06-18 expires: 2014-09-26
ssb* 2048R/72C5235B created: 2014-06-18 expires: never
ssb 2048R/A21E44F2 created: 2014-06-18 expires: never

gpg> keytocard
gpg> key 1    ##we need to deselect the key 1 before we select key 2
gpg> key 2
gpg> keytocard
gpg> key 2
gpg> key 3
gpg> keytocard
gpg> save

Now the subkeys are in the card and not present on your pc anymore. if you type:

$gpg --list-key
$gpg --list-secret-key

you will see that now the keys contains only stubs as explained in point 6.

11. EXPORT AGAIN the cerificate “certificate_stub.asc” now, this will contain only the link to the key and not the private keys. to be sure delete all the certificates from kleopatra and reimport “certificate_stub.asc”. If you try to encrypt something, it will ask for the key.

12. when you import the public keys (certificate_stub.asc), klepatra does not know where your private key is stored (because is not in the certificate itself.). In order to inform kleopatra that the key is on your yubikey, insert the yubikey into the usb and type:

$gpg --card-status

This will print info of the card (yubikey) and inform kleopatra that the private key is available on the hardware.

Done… Now you can start using the yubikey for encrypting and decrypting emails and files.

——– Export SSH pub key from GPG certificate ——–

THIS IS AN ADDITION MADE ON MAY 2022…

in order to export the SSH key is now enough to use the –export-ssh-key functions directly from gpg command line.. Firstly take note of the authentication key id [A]

$gpg2 --list-key

Then you can just generate the ssh public key with the following command:

$gpg2 --export-ssh-key 23YOURKEYID343

— Below here was the old way to extract the GPG key..

For converting the GPGKEY TO SSH public key you will need to use a linux distro for example ubuntu.
Install monkeysphere for openpgp2ssh

$sudo apt-get install monkeysphere

Firstly we need to have the key in the key-ring…

$ gpg --import ../alice.asc

Now we need to take a note of the authentication subkey [A]. Use GPG2 that list the usage [S C E A]

$gpg2 --list-key

if you do not have gpg2 and want to show the usage than you type the following command to edit your email .. take note of the ID of the authentication subkey (A)

$gpg --edit-key youremail@email.com
$quit

Now we can just export the key to ssh pub key.

$gpg --export 473F14C3 | openpgp2ssh 473F14C3 > ssh.pub

Now you have also the ssh.pub file that contains your public ssh key.

Next step, if you are under windows you need to configure putty

———-putty ssh configuration on Windows——–

0. Install putty if you do not have it.

  1. Create gpg-agent.conf file in this location

%APPDATA%\gnupg\gpg-agent.conf

  1. Add this line with NO quotes:

enable-putty-support

  1. restart gpg-agent
gpg-connect-agent killagent /bye
gpg-connect-agent /bye
  1. Add A ENV variable called :   — > GIT_SSH
  2. Make it link to the plink → C:\Program Files\PuTTY\plink.exe

———-Final note for windows users: Solve problems——–

Often under windows, your yubikey is not recognized. To simply check that type $gpg –card-status . You should always see the card information. If you see that, it means that gpg can read the key properly and thus the problem is somewhere else for example in the putty configuration.  If $gpg –card-status  shows “no card available”, then the problem is that windows/gpg cannot read the card, so is not a putty problem. This is easily fixed by resetting the gpg daemons with:

$gpg-connect-agent killagent /bye
$gpg-connect-agent /bye

I have it in a script so i just need to launch when i run into problems.

So that is it, i hope that was useful.

Click to rate this post!
[Total: 2 Average: 5]

Leave a Reply

Your email address will not be published. Required fields are marked *