TrustHome
TrustHome disables the password requirement for sudo/login while you’re using your home wifi and you have your yubikey connected. The main difference to normal yubico challenge-response is that this authentication method doesn’t require any interaction.
DISLAIMER: I’m not responsible for any security breaches you may encounter while having this installed. This is merely a utility for my personal convenience and should never be used if you’re serious about security. You should ALWAYS use other security measures, such as full disk encryption, in addition.
Installation
- Make sure that you use
iwd
and havepam
andsudo
configured correctly- if you don’t use
iwd
, modifyingishome
to fit your network daemon shouldn’t be too hard
- if you don’t use
- Modify
ishome
according to your network’s specifications - Modify
hasyubi
accordingly - Verify whether the paths in
install.sh
work for you and your OS - Run
sudo ./install.sh
- you might need to installlibpam
if you get errors - Modify your pam configuration accordingly. For example, my
/etc/pam.d/sudo
file looks like this:
auth sufficient pam_trusthome.so
auth sufficient pam_yubico.so mode=challenge-response authfile=/etc/yourmappings
account include system-auth
session include system-auth
using this configuration sudo will fall back to my yubikey
challenge-response if I’m not on my home network. You may also want to
edit files like /etc/pam.d/login
in a similar way.
Ideas
- other uses of ishome/hasyubi can be found in my .files
- you could try modifying
ishome
so that you get authenticated automatically based on your GPS location or public IP address.