Important
|
Yubico has learned of a security issue with the OpenPGP Card applet project that is used in the YubiKey NEO. This vulnerability applies to you only if you are using OpenPGP, and you have the OpenPGP applet version 1.0.9 or earlier. SecurityAdvisory 2015-04-14 |
To configure the OpenPGP application on a YubiKey you can use GnuPG.
The documentation in this section assumes the reader has a general understanding of how GnuPG works. For more in-depth documentation see the GnuPG documentation, especially the parts on the usage and setting of the PIN and reset codes may be useful.
Installed the Yubikey personalization tool.
Verify that your YubiKey has a firmware version 3.1.8 or later.
lsusb -v ...
Make sure that your device is in OTP/CCID or CCID mode, you can use ykpersonalize to switch to OTP/U2F/CCID:
ykpersonalize -m6 ...
Check that your libccid version is 1.4.10 or later so that /etc/libccid_Info.plist contains the YubiKey USB PID/VID.
Check that your PCSCD setup is working. Use "pcsc_scan" to check for card readers, it should show "Yubikey" somewhere in the output.
You need to use the GnuPG agent with scdaemon, and we recommend using version 2.0.22 or later for full functionality.
To check the application version you may run, after inserting your YubiKey:
gpg-connect-agent --hex "scd apdu 00 f1 00 00" /bye D[0000] 01 00 05 90 00 ..... OK
Where "01 00 05" means version 1.0.5. (see security advisory above if version < 1.0.10)
Note that for YubiKey 4 and 5 series, this number will always be equal to the firmware version.
YubiKey 4 and 5 series support a touch feature that allows to protect the
use of the private keys with an additional layer. When this
functionality is enabled, the result of a cryptographic operation
involving a private key (signature, decryption or authentication) is
released only if the correct user PIN is provided and the YubiKey
touch sensor is triggered. This request of user presence ensures that
no malware can issue commands to the YubiKey without the user
noticing.
The YubiKey signals a request for a touch event by blinking for up to
15 seconds. If no touch is provided within this period, the operation
will fail.
There are three possible values for the touch parameter:
off
|
touch is disabled; |
on
|
touch is enabled; |
fix
|
touch is enabled and can not be disabled unless a new private key is generated or imported. |
The touch parameter can be individually set on each one of the three private keys and requires the use of the admin PIN.
In order to activate this functionality, you can use the YubiKey Manager CLI to set the touch ID policy. See the ykman openpgp documentation for more information.
The following demonstrate setting all the parameters in the OpenPGP applet on a YubiKey.
user@debian:~$ gpg --card-edit Application ID ...: D2760001240102000060000000420000 Version ..........: 2.0 Manufacturer .....: unknown Serial number ....: 00000042 Name of cardholder: [not set] Language prefs ...: [not set] Sex ..............: unspecified URL of public key : [not set] Login data .......: [not set] Signature PIN ....: forced Key attributes ...: 2048R 2048R 2048R Max. PIN lengths .: 127 127 127 PIN retry counter : 3 3 3 Signature counter : 0 Signature key ....: [none] Encryption key....: [none] Authentication key: [none] General key info..: [none] gpg/card> admin Admin commands are allowed gpg/card> passwd gpg: OpenPGP card no. D2760001240102000060000000420000 detected 1 - change PIN 2 - unblock PIN 3 - change Admin PIN 4 - set the Reset Code Q - quit Your selection? 3 PIN changed. 1 - change PIN 2 - unblock PIN 3 - change Admin PIN 4 - set the Reset Code Q - quit Your selection? 1 PIN changed. 1 - change PIN 2 - unblock PIN 3 - change Admin PIN 4 - set the Reset Code Q - quit Your selection? q gpg/card> name Cardholder's surname: Josefsson Cardholder's given name: Simon gpg/card> lang Language preferences: sv gpg/card> url URL to retrieve public key: https://josefsson.org/1c5c4717.txt gpg/card> sex Sex ((M)ale, (F)emale or space): m gpg/card> login Login data (account name): jas gpg/card> Application ID ...: D2760001240102000060000000420000 Version ..........: 2.0 Manufacturer .....: unknown Serial number ....: 00000042 Name of cardholder: Simon Josefsson Language prefs ...: sv Sex ..............: male URL of public key : https://josefsson.org/1c5c4717.txt Login data .......: jas Signature PIN ....: forced Key attributes ...: 2048R 2048R 2048R Max. PIN lengths .: 127 127 127 PIN retry counter : 3 3 3 Signature counter : 0 Signature key ....: [none] Encryption key....: [none] Authentication key: [none] General key info..: [none] gpg/card> quit user@debian:~$
The following example is YubiKey 4 specific and shows how to set touch on the signature key:
./yubitouch.sh sig on All done!