Está viendo la página Spain versión del sitio.
Le gustaría cambiar a su sitio local?
15 MIN TIEMPO DE LECTURA

HARDWARE KEYS

Understand and deploy security keys

Stuart Burns reveals how you can quickly boost your system’s protection using security keys and Multi Factor Authentication (MFA).

OUR EXPERT

Stuart Burns is a cloud-and security-focused administrator specialising in large-scale virtual implementations.

Usernames and passwords were originally designed to be proof that the person trying to log in is who they say they are. Interestingly, Richard Stallman famously ran his first systems with no passwords because “it hindered collaboration.” This was a brave choice even back before the evolution of the networks as we know them today.

The username/password combo used to be sufficient proof of identity to enable access. Things are different these days. With the vast array of password and account thefts that occur, a simple username and password combination is no longer sufficiently secure. This is especially so when considering the ability to brute-force stolen password hashes using powerful cloud GPU compute to reverse-engineer a password. Anything of any significant value – either financially or otherwise – should be protected by as much security as can be thrown at it.

Salty hashes

Most security-aware sites now use salted hashes. These are one-way functions (akin to physical trap doors if you will) that enable developers to encrypt passwords easily in terms of CPU time, but incredibly hard to decrypt. To reverse engineer all the password combinations would be a futile, expensive and lengthy undertaking in a properly salted and hashed environment. Salting refers to adding a second additional and unique value to the encryption key to make reversing the password hash more difficult, because it can’t be run against pre-built tables of hashes. More information about salts can he found at https://en.wikipedia.org/wiki/Rainbow_table.

The command line tool GPG can be used to effectively manage the settings on the card, such as pins, identities and administration.

To enhance security, the concept of software and hardware tokens was introduced. These introduce a multiple factor of authentication alongside the password something you know – the password, the first factor; and something you own, a security token or even a phone with a quality TOTP (time-based one-time password) with a rotating set of numbers. They include the Google Authenticator, Authy and many others. Phone-based security can be fine for most users, but it still doesn’t do much for security beyond website logins. Hardware tokens take things a step further because they enable the usage of secure public/private encryption keys to extend the ability to prove an identity or even sign code, emails and so on.

If the Yubikey is just inserted and pressed (in a quick fashion) it will emit a static password. This is where a lot of people new to hardware keys trip up. It isn’t a magic secure password for everything. It’s purely a static password. It should be used where a strong password is required for some reason. However, never just use that password alone because if someone knew what it belonged to and stole it , they would have the entire password. Its ideal use case would be as the start or end of the password, with an additional portion of text making up the password. That makes it much harder for anyone to try and hack the password.

Desbloquea este artículo y mucho más con
Puedes disfrutar:
Disfrute de esta edición al completo
Acceso instantáneo a más de 600 títulos
Miles de números atrasados
Sin contrato ni compromiso
Inténtalo €1.09
SUSCRÍBETE AHORA
30 días de acceso, luego sólo €11,99 / mes. Cancelación en cualquier momento. Sólo para nuevos abonados.


Más información
Pocketmags Plus
Pocketmags Plus

Este artículo es de...


View Issues
Linux Format
March 2022
VER EN TIENDA

Otros artículos de este número


WELCOME
Not so private networks
I have no idea what you get up
MEET THE TEAM
This issue we’re exploring VPNs. We asked our experts if they use a specific one, how they hide their online tracks (if at all) and their paranoid online fears!
REGULARS AT A GLANCE
2022: the year of Linux gaming?
Hold on to your gamepads – there’s some great stuff coming for Linux video gaming
TikTok accused of violating GPL licence
TikTok’s new Live Studio desktop streaming application has been accused of using code from OBS Studio
Intel Alder Lake gets Linux boost
Update to Linux drivers will give Intel’s latest processors a hike in performance
MY HAPPY PLACE
Matt Yonkovit Head of open source strategy and
PROBLEMS PROBLEMS
Keith Edmunds is MD of Tiger Computing Ltd,
RIP a.out
Archaic file format looks set to disappear from Linux
New ransomware discovered
SFile ransomware has been ported to Linux
Mozilla and Mint join forces
Linux Mint announces that it’s teaming up with the “champion of Open Source”
Distro watch
What’s down the side of the free software sofa?
WINE ON WAYLAND
Alexandros Frantzis is a senior software engineer at
FOCUS ON FIRMWARE
Jon Masters has been involved with Linux for
KERNEL WATCH
Jon Masters summarises the latest happenings in the Linux kernel, because someone has to
Answers
Got a burning question about open source or the kernel? Whatever your level, email it to lxf.answers@futurenet.com
Mailserver
WRITE TO US Do you have a burning Linux-related
System Monitor Center
Version: 0.3 Web: https://github.com/ hakandundar34coding/system-monitoring-center
Tesseract
Version: 5.0 Web: https://github.com/ tesseract-ocr/tesseract
Libtree
Version: 3.0.1 Web: https://github.com/ haampie/libtree
Video trimmer
Version: 0.7 Web: https://gitlab.gnome.org/ YaLTeR/video-trimmer
Ntfy
Version: 1.6.1 Web: https://github.com/ binwiederhier/ntfy
Rusty Aquarium
Version: 0.13 Web: https://github.com/ ollej/rusty-aquarium
Caravaggio
Version: 3.6.2 Web: https://github . com/ramiel/caravaggio
FishFight
Version: 0.3 Web: https://fishfight.org
AssaultCube
Version: 1.3 Web: https://assault.cubers.net
Kage Studio
Version: 0.4.2 Web: https://kage.sourceforge.io
System G
Version: 3.0.1 Web: https://github.com/jafl/system-g
REVIEWS
Intel NUC 11 Extreme PC
Kizito Katawonga wonders what happened to the NUC of the past?
Kingston XS2000 External SSD
Next-gen external USB 3.2 2x2 storage goes mainstream with Ganesh T S at the testing station
Neptune 7.0
Debian-based KDE distros are a dime a dozen, so Mayank Sharma was keen to see how it stacks up against the competition
Slackel 7.5
Mayank Sharma finds this distribution combines Slackware and USB distros with two use-cases: older computers and portable installations
Siduction 2021.3.0
You probably think Mayank Sharma has a thing for Debian-based KDE distros, but he’ll want you to believe that it’s just coincidence
Pop!_OS 21.10
Keyboard-driven Jonni Bidwell is excited by the prospect of new shortcut keys and swish application launchers. Will his enthusiasm be curbed?
Oxygen Not Included
Management are thrilled with Christopher Livingston’s latest cost-saving suggestion: workers don’t really need to breathe, do they?
ROUNDUP
GUI text editors
Within the world of Linux, so often we need to invoke a text editor to get the heart of the matter. Michael Reed investigates the best of the current crop
General-purpose text editor
How does it perform when working with configuration and log files?
Licence and installation
What does it take to get hold of this software and install it?
Configurability
To what extent can you make your text editor feel like home?
User interface
We want something efficient and pleasant
Documentation and community
Extensive features aren’t much good if you can’t figure out how to use them
Additional plugins
Improve your enjoyment of using an editor and increase productivity too
Suitable for programmers?
Editing and creating source code is a common task for a text editor
The Verdict
GUI text editors
SECURE YOUR VPN
The ever-sceptical Jonni Bidwell is here to cast doubt on the highly profitable VPN business, and show you how you can do better…
The why and wherefore of VPNs
It’s not VPNs that are bad, rather people’s unrealistic expectations of privacy. And, in a pay-per-click age, honesty
Run a WireGuard VPN
WireGuard is the newest, leanest, meanest VPN protocol on the scene. Let’s get those wires guarded!
Tor and other VPN alternatives
Tor has long been regarded as the gold standard for privacy and anonymity. See how easy it is to go dark
Extra measures
See what VPNs don’t and can’t protect against, and bolster your privacy with a layered approach
Pi USER
Celebrating the Raspberry Pi at 10
The Raspberry Pi has achieved so much more than just material success, as Neil Mohr reveals…
Raspberry Pi OS
Les Pounder takes the latest Raspberry Pi OS, otherwise known as Bullseye, for a ride… but does it miss the target?
How to easily create multi-HAT Pi projects
PHAT STACK
LINUX FROM SCRATCH
Aaron Peters examines building a distro from the ground up with Linux From Scratch, because why take the easy way?
TUTORIALS
Managing passwords
Credit: https://github.com/biox/pa
Build your own dynamic timelines
Credit: https://thetimelineproj.sourceforge.net
Emulate the classic MSX system
Credit: https://openmsx.org
Multi-boot USB drives for easy distro hopping
Use the powerful Ventoy to repair operating systems and make distrohopping so much simpler, with a bit of help from Matthew Holder
Recipe management done by the book
Credit: https://hay-kot.github
Publishing a hit book using Linux
Have you ever wanted to publish your own book? Michael Reed demonstrates that all of the tools you need exist on Linux
TOP OF THE FOSS
Perl at 34
Jonni Bidwell tries not to cut himself on the “Swiss army chainsaw” of programming languages, Perl
CODING ACADEMY
Create 3D gaming worlds with Python
Understanding the basics of rending a 3D world is a great way to understand game code. Lock and load, says Andrew Smith…
Use Python to get more from Dropbox
Mihalis Tsoukalos explains how to use the Dropbox REST API with Python to create your own custom tools
Chat
X
Soporte Pocketmags