Perfectly reasonable security for GPG, SSH and password management using a Yubikey hardware device
Perfect security, if such a thing exists, probably involves a Faraday cage and no Internet connectivity. Increasing security usually comes at the cost of usability and if a computer system is so cumbersome to use that it isn’t used at all, then it serves no purpose. One must strike a balance between the two. I recently did, when I got myself a set of Yubikeys, a hardware authentication device. This is my setup for perfectly reasonable security.
While no expert on the matter, I know enough about crypto to be nervous. I have wanted to improve my setup for a long time and when I recently got myself a Yubikey for hardware authentication I decided to write down some of my thoughts and what I learned in the process of setting it up.
TL; DR; version
- secure password manager
- secure SSH auth
- GPG for email, maybe? I’m not really using it but it’s a plus
It is challenging because:
- computer security sucks
- don’t keep secret keys on computer!
- put key on dedicated hardware authentication device
- thus hacking computer reveals no keys
- I choose Yubikey 4 as my hardware authentication device (HAD)
- my GPG key is on the Yubikey
- I use password store, a very UNIXy solution for password management, which can use the GPG keys on the Yubikey for decryption of secrets
- GPG key on Yubikey is used for SSH authentication
- GPG key on Yubikey can be used for GPG email
- all security / trust is rooted in the keys on the Yubikey
- someone can steal my Yubikey, but it’s impossible to retrieve the key itself from the Yubikey
- stolen hardware device can be used to sign / authenticate / decrypt though, if PIN is known - so need to protect PIN too
- too many failed PIN attempts => hardware authentication device is locked
- attack surface and risk is lower since number of people in physical proximity able to steal my Yubikey is probably lower than everyone on the Internet wanting to steal my secrets (and can through some combination of security flaws)
- Yubikey doesn’t carry master key, only sub keys signed by master
- if retrieving key from Yubikey turns out to be possible, due to some flaw in the Yubikey, it is “only” a subkey
- subkeys expire after one (1) year
- extending subkey expiry requires master keys, thus need to bring out master key once a year, at which time I also verify all USB sticks work etc.
- protect backups just like any other key!
- I reduce risk of rogue application on my computer using the Yubikey to decrypt / sign / whatever by requiring that I physically touch the Yubikey for every operation. maybe slight PITA but IMHO worth it - you don’t have to do that
If you don’t feel like getting depressed you can skip this next section over to the much less gloomy solutions part further down.
Motivation a.k.a. the depressing state of computer systems
I started writing this post focusing on the solutions I had found for improving security but realised that what I present, while nice in many aspects, often means a few more hoops to jump through than what one might be used to. I felt I needed to explain and motivate why we want something, what the risks are of not doing it and all of a sudden, this whole heading was born. Read this if you want to feel depressed over the state of your computer and how insecure it all really is.
I’ve relied on Chrome remembering passwords pretty much since the feature was made available. When I got a MacBook a few years back I started using the OS X keychain for all sorts of passwords too and made a short foray into using Safari as well.
Chrome password manager or similar features of Firefox or any other browser only goes so far. They cover web pages but not other passwords or sensitive information you might want to save. For example, you might want to save credit card information or personal information like passport numbers etc.
I got tired of it all. I can’t use a feature that best case consistently leaks some information left and right and worst case sends all my passwords to some bad guy. I decided to go for password-store, a very UNIX style password manager. It’s actually a shell script that invokes GPG to keep secrets in encrypted form on disk. It can also check everything into git. I love it.
Computer hardware are crap, or is it just Intel CPUs?
Spectre and Meltdown were patched. Then we got L1TF. It’s sort of the same thing. OpenBSD’s Theo de Raadt commented;
We believe Intel cpus do almost no security checks up-front, but defer checks until instruction retire. As a result we believe similar issues will be coming in the future.
So it’s just a matter of time until someone comes up with other clever ways of tricking your CPU to leak data. This is at the very bottom of your stack - the hardware of your computer. If we move up a level we’ll find the operating system and its kernel.
Somewhat like the browser bugs, I haven’t taken note of Linux CVEs but over the last ten years I’ve had to patch my machines a few times too many. I have a child now so I don’t have time in my life for surprise patching sessions.
I mentioned I had a MacBook and I’m afraid it’s no better. In addition, using multiple computers and having secret keys on all of them means I am exposed to more security flaws. Breaking any of them would reveal my secrets.
I think the basic problem is that the focus of almost all software development is with features - anything bringing perceived value to the product, so it can be sold for more or motivate the next upgrade. I want a system that works and I want it developed through a process that prioritise correct code. I think it is more important to be correct than fast which is why my interest for OpenBSD has only increased.
Summary of the state of computer systems
In the end, we have a machine built of hardware we don’t trust with an operating system we don’t trust that executes different programs, some or all of which we don’t trust. The computer shifts between executing these programs so fast that we humans actually perceive the programs as running in parallel, yet it’s all running on a single execution engine (core / thread) - no wonder there are timing related side channel attacks in there.
Solutions / mitigations
Using a hardware authentication device (HAD) we can get around some of these issues. By placing my GPG keys on the HAD, they are no longer accessible from the computer.I can sign, authenticate and encrypt or decrypt data by using my HAD but the keys will not ever leave the HAD.
My choice for this hardware authentication device fell on the Yubikey 4. There’s some criticism of the Yubikey 4 because unlike some earlier designs, it has a completely closed design. I read Yubico CTO Jakob Ehrensvärd’s thoughts on the matter. It turns out the previous designs weren’t that open, so the Yubikey 4 isn’t much worse. I suppose a completely open card would be better but as I can’t find one it doesn’t seem to make much of a difference. Bottom line, I believe that by using a Yubikey 4 I will be much better off than keeping my keys on disk on multiple computers.
A bad person can naturally steal my Yubikey, however, since hardware authentication devices are designed to be write-only it is impossible to retrieve my keys from it.
A stolen Yubikey could still be used to sign, authenticate or decrypt content but that requires a PIN. Entering an incorrect PIN too many times will lock that PIN.
PIN entry is potentially insecure as it’s done through software. A “proper” hardware authentication device would have a PIN entry mechanism on the device itself, instead of through the “insecure” computer. The small size of the Yubikey, which is rather convenient, sort of prevents putting many physical keys on it. With the alternative being a much larger device, I am overall fine with this and deem the risk acceptable.
When inserting the Yubikey and trying to use it, you will be prompted for the PIN. gpg-agent can cache the PIN for a certain amount of time such that the PIN doesn’t have to be entered for every use of the Yubikey.
However, any program could use the Yubikey once unlocked. To prevent this, I have enabled a mode that forces me to push the button on the Yubikey. I think this is an effective measure to mitigate the risk of rogue programs running on my computer trying to use the Yubikey to decrypt my content behind my back. It does however mean I can’t batch anything. Also a nice thing I didn’t know; there is a small light on the Yubikey and it lights up when it needs me to press. If it lights up and I didn’t do anything, then something fishy is going on.
It is possible to generate keys on the Yubikey making it truly impossible to ever read them out (provided as always, that they Yubikey does what it says on the box). However, it also means you loose the key if you loose the Yubikey so instead I opted to generate my keys on a computer and copy them to the Yubikey. This way I can have multiple Yubikeys and obviously restore one if it’s lost or broken.
I generate they keys on an air gapped computer that I boot from a USB stick so that it has no permanent storage. The keys are backed up to USB sticks. The USB sticks use an encryption layer and the keys themselves are encrypted since I have a passphrase on them.
One master key is first generated which then signs a number of subkeys. It is the subkeys that are copied to the hardware authentication device.
If the Yubikey promise holds not to be true - that it is indeed possible to read out the key, then it is “only” a subkey.
The subkeys expire after one year, making it further difficult to use it if somehow stolen.
To update the expiry date of subkeys, I must bring out my master key. This is also a good time to verify readability of the multiple backups - USB sticks don’t last forever, so I figured a yearly refresh is prudent.
I’m still pondering devising some way of printing the keys for backup. Others are doing this, I just need to see if it fits my backup methods.
Don’t forget that all “backups” of your keys are just a copy of the key. They’re not worth less. If someone gets their hand on it, it can be used just like your normal key. All copies, including backups, needs to be carefully protected!
Random bits of GPG and other information
Do I need passphrases on the keys I generate for my Yubikey?
You should always put a passphrase on your key, even ones you intend to use on a Yubikey.
The passphrase means the key is encrypted on disk, which is a very nice feature.
Given that the Yubikey doesn’t prompt for the passphrase (not that it really could), I suspect the
keytocard command might not actually move the key verbatim but decrypt it from disk based on the passphrase (you need to enter it when running
keytocard) and put the key on the card in plain-text (although still protected on the card by other means, preventing it from being read).
I initially thought of SSH keys where it is common to not add a passphrase for keys that are used non-interactively by computers and similar. GPG is different. Always use a passphrase!
Same GPG key on multiple Yubikeys? Maybe not a good idea. It’s not very smooth.
I have both a Yubikey 4 and a Yubikey 4 nano and my idea was that I would load the exact same keys on them so they could be used interchangeably. That’s not the case though. GPG wasn’t built for this at all and it’s actually per design that you are not meant to do this.
First, when moving the keys to the card using the keytocard command, the keys are actually moved so after you’ve done that with the first Yubikey, you simple won’t have the keys anymore in your .gnupg directory. This is why you need a backup. I merely restored the backup, restoring the state gnupg thought it was in before I issued keytocard and thus I was able to do that again for the second Yubikey.
On my other computers I have imported the public key but as GPG associates the key with a particular Yubikey card ID, it prompts me to insert that particular card when it wants to use the key. This is a feature, since otherwise it might mean that someone has stolen your key, put it on their own card and are now trying to use it.
It is possible to change the card ID associated with the key using gpg-command-agent.
scd serialnowill display the serial number of the currently inserted card
learn --forcetells GPG to learn and associate the new card with the relevant keys You can combine these in a single shell command line
gpg-command agent "scd serialno" "learn --force" /bye.
I will probably try to use one of the Yubikeys as my primary one and only rarely rely on this command to relearn card ID.
I was initially rather nervous about what expiry time to set. I figured that a key that never expired would be bad and picking a too short time meant I would have to do lots of GPG key magic to generate new keys, have them signed by the old ones etc etc.
It doesn’t seem so bad though. My master key doesn’t expire but since it’s not used for anything but signing the subkeys it doesn’t matter. The subkeys do expire so before that happens I will need to bring out my master key from the backup USB sticks, modify the expiry date on the subkeys and install the new version of them on the Yubikey.
Getting to it
I mostly relied on this excellent guide for doing all that I described above. I also liked the details of Simon Josefsson’s guide. Last but certainly not least, this post that really resonated with me, in particular the parts on how the Yubikey can be configured to require touch for every decrypt / auth / sign operation.