yubikey-agent
aws-vault
Our great sponsors
yubikey-agent | aws-vault | |
---|---|---|
15 | 49 | |
2,564 | 8,127 | |
- | 1.0% | |
0.0 | 1.7 | |
5 months ago | about 2 months ago | |
Go | Go | |
BSD 3-clause "New" or "Revised" License | MIT License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
yubikey-agent
-
Show HN: SSH-tpm-agent – SSH agent for TPMs
This is a great idea. I now exclusively use SSH keys on hardware security modules of some kind. I use "Secretive", a mac app that does the same, plus a yubikey using yubikey-agent (https://github.com/FiloSottile/yubikey-agent; there are too many complicated ways to use SSH keys with a yubikey this is one of the friendliest ones). Depending on the security and frequency of which I access the service impacts whether I need presence confirmation or use secretive versus the yubikey.
I would be remiss to mention there are existing SSH TPM projects, not sure how this one differentiates. It seems to at least have the user experience pretty simple, similar to yubikey-agent (and secretive), and unlike some of the existing solutions which have quite a few extra steps:
-
Secretive: Store SSH Keys in the Secure Enclave
Also check out https://github.com/FiloSottile/yubikey-agent which simplifies the setup quite a bit.
-
Yubikey ssh keys with Ansible, wants to be touched constantly
I'm using it on nixOS and macOS, via Nix Packages and Homebrew respectively. It's this - https://github.com/FiloSottile/yubikey-agent I'm realizing from this thread that it's not an official package. I'll go closer to the source with ykman. Thanks!
-
Is it possible to use AGE with a Ledger hardware device?
I think the Ledger Manager only interfaces with the GPG and SSH agents, neither of which age take advantage of. But age does have support for Yubikeys (see https://github.com/FiloSottile/yubikey-agent). If you can interface with the Ledger hardware device as a Yubikey, this might work. I don't have experience here, just a thought.
-
Cloudflare Hardware Keys (Yubico Partnership)
You can use PIV for SSH just fine.
It's not OpenSSH's weird FIDO mode, but I don't like the FIDO mode anyway because it requires storing a file on the computer.
-
Am I the only one who's nervous when SSH-agent forwarding?
I have the same concern. I modified Pageant (Windows agent) so that it prompts me before signing anything which helps ease my mind, I only approve when I know I'm connecting to a new server. There are also options like requiring a Yubikey too (https://github.com/FiloSottile/yubikey-agent)
-
Failed to fetch key with ECDSA keys via libykcs11.dll
Aging MBP, Intel based, Monterey 12.3.1 uname -v Darwin Kernel Version 21.4.0: Fri Mar 18 00:45:05 PDT 2022; root:xnu-8020.101.4~15/RELEASE_X86_64 brew info yubikey-agent yubikey-agent: stable 0.1.5 (bottled), HEAD Seamless ssh-agent for YubiKeys and other PIV tokens https://filippo.io/yubikey-agent /usr/local/Cellar/yubikey-agent/0.1.5 (7 files, 4.8MB) * ...
-
How to Store an SSH Key on a Yubikey
Unless I've missed something, SSH keys stored on Yubikeys are still hampered because you aren't allowed to a touch policy of "touch never".
Imagine needing to touch the Yubikey with each "git pull" or using Ansible to operate over SSH on a dozen servers in parallel, and needing to touch the Yubikey once for each server.
The feature request I'm tracking is here: https://github.com/FiloSottile/yubikey-agent/issues/95
The proposed feature would allow setting a touch policy for the SSH key.
- FreeBSD SSH Hardening
-
Yubikey PIV encrypted messaging system
If you can do ssh, you can sign messages: https://github.com/FiloSottile/yubikey-agent
aws-vault
-
Keep your AWS CLI config fresh with Cog
Undying fondness for aws-vault to securely cache my session credentials.
-
A CLI app that keeps your passwords encrypted and lets you manage them using a single secret
you might want to check https://github.com/99designs/keyring and https://github.com/99designs/aws-vault
-
Cannot use AWS SSO with Terraform
You install aws-vault (https://github.com/99designs/aws-vault), configure it according to the README and make sure you have an SSO entry that is compatible, i.e.:
-
How do you protect your secret keys in your local computer?
I use a aws-vault to switch thought all profiles on all aws account. It support SSO with 2FA.
-
LastPass says DevOps engineer’s hacked computer led to security breach in 2022
Nice! Do I understand this correctly?
You use aws-vault(https://github.com/99designs/aws-vault) and configure it with IAM and MFA with YubiKeys. You configure e.g. the profile jonsmith.
When you run
aws-vault exec jonsmith -- aws s3 ls
it will ask you, e.g. every hour to confirm with YubiKeys and cache the key for one hour. After that the temporary keys expire. Can you also store keys different from AWS?
-
Ask HN: Why most CLIs are not using keyring?
Don't know about kube, but awscli and a few others decouple the idea of getting credentials and doing the actions. You can use the password every time, but a better way is to either use the preconfigured profile or some wrapper which does use the keychain. For example https://github.com/99designs/aws-vault/ supports one-off commands and shell sessions with pre-populated tokens.
-
Recommended script access to AWS
It sounds like you have AWS SSO enabled and need a way to run scripts manually in the terminal. Take a look at the aws-vault project that makes it easy working with multiple AWS accounts.
-
Can I run cdk bootstrap in aws cloudshell?
A tool called aws-vault can fix the "insecure" part.
-
Programatic access with AWS SSO
Take a look at aws-vault, which has support for SSO and running in a docker container.
-
Authenticating to AWS provider
I read the docs on: https://github.com/99designs/aws-vault
What are some alternatives?
wsl-ssh-agent - Helper to interface with Windows ssh-agent.exe service from Windows Subsystem for Linux (WSL)
awsume - A utility for easily assuming AWS IAM roles from the command line.
authelia - The Single Sign-On Multi-Factor portal for web apps
leapp - Leapp is the DevTool to access your cloud
age-plugin-yubikey - YubiKey plugin for age
powerlevel10k - A Zsh theme
win-gpg-agent - [DEPRECATED] Windows helpers for GnuPG tools suite
azure-aws-creds - This project allows federated Azure Active Directory roles to be easily used with AWS CLI session credentials
ssh-audit - SSH server & client security auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)
aws-cli - Universal Command Line Interface for Amazon Web Services
piv-agent - An SSH and GPG agent which you can use with your PIV hardware security device (e.g. a Yubikey).
ohmyzsh - 🙃 A delightful community-driven (with 2,300+ contributors) framework for managing your zsh configuration. Includes 300+ optional plugins (rails, git, macOS, hub, docker, homebrew, node, php, python, etc), 140+ themes to spice up your morning, and an auto-update tool so that makes it easy to keep up with the latest updates from the community.