blob: c715bc508852db588496938c234ea85ec3241bee (
plain) (
blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
|
# TrustHome
TrustHome disables the password requirement for sudo/login while you’re
using your home wifi and you have your yubikey connected. The main
difference to normal yubico challenge-response is that this
authentication method doesn’t require any interaction.
### DISLAIMER: I’m not responsible for any security breaches you may encounter while having this installed. This is merely a utility for my personal convenience and should never be used if you’re serious about security. You should ALWAYS use other security measures, such as full disk encryption, in addition.
## Installation
0. Make sure that you use `iwd` and have `pam` and `sudo` configured
correctly
- if you don’t use `iwd`, modifying `ishome` to fit your network
daemon shouldn’t be too hard
1. Modify `ishome` according to your network’s specifications
2. Modify `hasyubi` accordingly
3. Verify whether the paths in `install.sh` work for you and your OS
4. Run `sudo ./install.sh` - you might need to install `libpam` if you
get errors
5. Modify your pam configuration accordingly. For example, my
`/etc/pam.d/sudo` file looks like this:
<!-- -->
auth sufficient pam_trusthome.so
auth sufficient pam_yubico.so mode=challenge-response authfile=/etc/yourmappings
account include system-auth
session include system-auth
using this configuration sudo will fall back to my yubikey
challenge-response if I’m not on my home network. You may also want to
edit files like `/etc/pam.d/login` in a similar way.
## Ideas
- other uses of ishome/hasyubi can be found in my
[.files](https://github.com/marvinborner/.files)
- you could try modifying `ishome` so that you get authenticated
automatically based on your GPS location or public IP address.
|