The officially official Devuan Forum!

You are not logged in.

#1 2017-11-11 14:46:58

kwmiebach
Member
Registered: 2017-11-11
Posts: 1  

HOWTO: Using a hardware USB authenticator (Yubikey, Hyperfido, U2F)

If you are using a USB authentication device, maybe for 2-factor-auth in the browser, and the USB key is not recognized by the system, this might help:

In the beginning I installed libu2f-host0, I am not sure if it is necessary:

sudo apt-get install libu2f-host0

It is necessary to have permissions to access the usb key. If there is not yet a rule in /etc/udev/rules.d you can create one like this:

cd /etc/udev/rules.d
sudo wget https://raw.githubusercontent.com/Yubico/libu2f-host/master/70-u2f.rules

The new file /etc/udev/rules.d/70-u2f.rules contains rules for the most frequent vendors and their models.

Now edit the file and replace

TAG+="uaccess"

with

GROUP="plugdev", MODE="0660"

The reason behind this, the rules file provided by Yubico assumes you have systemd running. See https://blog.flameeyes.eu/2014/10/setti … n-general/

I also restarted udev, don't know if it is necessary:

sudo service udev restart

The whole process was tested on devuan ascii.

Last edited by kwmiebach (2017-11-11 14:48:02)

Offline

#2 2018-01-15 15:33:47

huguei
Member
Registered: 2018-01-15
Posts: 1  

Re: HOWTO: Using a hardware USB authenticator (Yubikey, Hyperfido, U2F)

Thanks! It worked perfect for me (Devuan GNU/Linux 1 (jessie)) with a FIDO-U2F key.
The only thing I was missing was libu2f-host0 that wasn't available on my sources. I had to add jessie-backports first, using https://backports.debian.org/Instructions/#index2h2

Offline

Board footer