Conversation
Notices
-
configured ssh two-factor authentication using yubikey. works pretty well. Factors are yubikey OTP and password. No way to use SSH key in two-factor ssh setup, it just overrides everything as the only factor.
-
@opal hm, when I enabled it it just disabled the other factors.
-
@opal that's ok, this way is good enough for government work.
-
@moonman Because: Yo[u] [will] b[e] [in] Key [oto] [soon].
-
Another limitation seems to be that when enabled, every user must have a yubikey. This is a real problem if there's automated processes accessing the server over SSH.
One way around this may be to run a second ssh server configured separately.
-
@dielan yeah I'm already anticipating this being a huge pain in the ass. But it's required to pass our PCI compliance audit.
-
Se have mfa requirements at work as well. Right now we have our private keys in yubikey and unlock them to ssh agent every 12 hours. Sudo is done with agent passing (ssh -A) . We are looking into transitioning to signed ssh keys and hashicorp vault.