Quote:
Oooops! I just posted my most intimate passphrase into the plains of the web.
Happened to me. I am certain it happened to you.
Especially with the Nano form factor accidental triggering of your YubiKey happens easily.
For example when just re-positioning my laptop I often haphazardly touch my YubiKey potentially bringing doom over my security setup.
For Linux users I just created a tiny script to protect against this danger.
I call it
YubiGuard. You can find it here together with the necessary instructions:
https://bfelder.github.io/YubiGuard/It is much more advanced than YubiSwitch, a less sophisticated predecessor.
Several notable improvements in this regard are:
- No root privilege required to run! (A much criticized security flaw with YubiSwitch.)
- No unintended output release after reactivation, if you pressed your YubiKey while locked!
- Detects YubiKeys automatically, no need to hardcode ids manually.
- Can handle multiple YubiKeys concurrently.
- Timeout which locks off YubiKey after 5 seconds, to keep "the lid closed tight".
- Automatically locking after YubiKey has been triggered. (Smart isn't it?)
- Panel indicator showing the activation status of YubiKey(s).
It works meticulously on many popular Linux Distros and with all YubiKey models tested.
(A shout out to Yubico who provided additional models for testing.
It demonstrates how this company cares for its community and how it is committed to the development of the YubiKey ecosystem.)Its easy, fun to use. I am certain the Linux users among us will find this tool very useful.
If you like YubiGuard just let others know by leaving a star on its GitHub page.
Download zip archive:
https://github.com/bfelder/YubiGuard/zipball/master