| ▲ | Liskni_si a day ago | ||||||||||||||||
It's also a bit outdated. OpenSSH supports FIDO2 natively, so all this gnupg stuff is unnecessary for ssh. One can even use yubikey-backed ssh keys for commit signing. And the best thing is that you can create several different ssh keys this way, each with a different password, if that's something you prefer. Then you need to type the password _and_ touch the yubikey. | |||||||||||||||||
| ▲ | kemotep 21 hours ago | parent | next [-] | ||||||||||||||||
This is the sk-ed25519 kind of keys correct? These work flawlessly with the KeepassXC ssh-agent integration. My private keys are password protected, saved securely inside my password vault, and with my ssh config setup, I just type in the hostname and tap my Yubikey. | |||||||||||||||||
| ▲ | knorker a day ago | parent | prev [-] | ||||||||||||||||
This assumes that the server is running a recent enough OpenSSH. Configured with this enabled. For Linux servers, sure. For routers, less obviously so. | |||||||||||||||||
| |||||||||||||||||