GPG and SSH with Yubikey NEO
I'm a big fan of hardware tokens for access. The three basic technologies where
you have public key crypto are SSH, GPG and SSL. Here I will show how to use
a Yubikey NEO to protect GPG and SSH keys so that they cannot be stolen or
copied. (well, they can be physically stolen, of course).
Let's hope pkcs11 support is coming, so that SSH support improves and SSL keys can also be protected.
Parts of this howto are all but copied from YubiKey
NEO and OpenPGP . I complete it with some details and the SSH parts.
GPG
GPG normally keeps your private key encrypted using your password. If your keyring is
stolen someone can brute force your password and from there decrypt all your files. If someone steals
your keyring you should revoke the key as soon as possible, but assuming this revokation gets to all
interested parties this will only protect new messages from being encrypted to this key. Old encrypted
files could be decrypted by ...