yubikey-provisioning-scripts
openpgp
yubikey-provisioning-scripts | openpgp | |
---|---|---|
6 | 1 | |
57 | 105 | |
- | 0.0% | |
1.5 | 10.0 | |
about 1 year ago | almost 3 years ago | |
Shell | C | |
GNU General Public License v3.0 only | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
yubikey-provisioning-scripts
- Passwordless sudo and verified GitHub commit signing with Yubikey - a pair coder's dream
- Scripts to automate Yubikey provisioning. They set up your yubikey for you so you don't have to!
-
How to Yubikey: A Configuration Cheatsheet
It really depends on what you want to do with the yubikeys. If you're just using the PGP functionality (like SSH-ing and signing git commits) all you have to do is upload the same private (sub)keys to the two yubikeys and they'll be functionally the same*. I wouldn't know about other (more advanced) features though.
If you follow DrDuh's guide, you should be able to set up the yubikeys in the way I described. I also created some provisioning scripts that automate the whole process which you should be able to use to provision the PGP applet:
https://github.com/santiago-mooser/yubikey-provisioning-scri...
Make sure to enable the export of the private key though!
- Scripts to Automate the Provisioning of a Yubikey
- I wrote some scripts to automate the provisioning of yubikey's openPGP applet
- I created some bash scripts to automate the provisioning of a yubikey's openPGP applet! I created them for work but feel free to use them yourself
openpgp
-
How to Yubikey: A Configuration Cheatsheet
Unfortunately SoloKey doesn't work as an OpenPGP smart card, which means it's not a real substitute for a Yubikey. I haven't had any luck with resident FIDO2, either.
The Solo team believes that other functionality such as PIV overlaps with GnuPG use cases, so that OpenPGP isn't a priority, and their work on that functionality appears to have stopped in 2021. That's too bad, because OpenPGP's network effects far outweigh its pure functionality, which means a technical substitute isn't a substitute.
https://github.com/solokeys/openpgp
What are some alternatives?
tillitis-key1 - Board designs, FPGA verilog, firmware for TKey, the flexible and open USB security key 🔑
u2f-javacard - A privacy-focused Java Card U2F Authenticator based on ledger-u2f-javacard
yubikey-otp - Fuzzy search for TOTP (oath) secrets on your YubiKey and copy them to your clipboard.
OpenSK - OpenSK is an open-source implementation for security keys written in Rust that supports both FIDO U2F and FIDO2 standards.
YubiKey-Guide - Guide to using YubiKey for GnuPG and SSH
yubikey-provisioning-scri
FIDO2Applet - FIDO2 Javacard Applet
android-hardware-key-driver