(no title)
32032141 | 6 years ago
Services that support them either have them locked down so hard that if you lose a single Yubikey (there's often no backup second key option), you're very screwed. Others go the other option, and have too easy to reset systems, SMS fallbacks, or other total bypasses of the security tokens.
For SSH and GPG, authentication keys are generally the least of your concern. The content you're controlling are much more valuable than the authentication itself. Can an attacker just wait until you SSH somewhere, and leverage that access? Can they wait until you'd press the button for another benign purpose and use that authentication in a malicious way? The answer is almost always yes, which reduces the value of these sort of devices substantially. They don't protect against local compromise, in which case a keyfile sitting on your local host is just as secure and a lot more convenient.
peterwwillis|6 years ago
So I think in general private keys aren't improved with a token, since a compromised private key is supposed to be a local compromise.
32032141|6 years ago
nijave|6 years ago
In addition, these places tend to have less technical users and "plug it in and press during login" isn't terribly difficult
32032141|6 years ago
unknown|6 years ago
[deleted]
WordyMcWordface|6 years ago