Physical OpenGPG keys

April 28, 2020

Smart card reader

Recently, I updated my personal computer from 2014 MacBook Pro to the ThinkPad P1 gen2. Two other competitors are Apple MacBook 16 and Huawei Matebook Pro in the last round. Both of them are great product but ThinkPad surpass them in terms of ports – two USB-A, SD card reader, two USB-C, and full size HDMI. You would definitely love the first two kind of ports if your interact with physical robots.

What surprise me is that Lenovo still managed to fit a full size smart card reader into the slim chassis. The smart card are often used in big organisations to let employers authenticate themselves using a physical card e.g log into computer in the enterprise domain.

I am not aware of any personal use case until I come across the OpenGPG card. The OpenGPG card has the same form factor as the credit card but the chip is designed for various cryptographic tasks. I purchased mine from the FLOSS shop and the lastest version of OpenGPG card has:


Back of OpenGPG card

The OpenGPG compatibility and the key storage capability are the two features I am fond of. This setup guide may help to to harness those features if you own a card (or OpenGPG compatiable Yubikeys).

Setup the card

There are a few packages we need to set up the card on Ubuntu 18.04.

sudo apt install pcscd scdaemon gnupg2 pcsc-tools opensc -y

gnupg2 is the open-source implementation of OpenGPG standard, we will use it to edit the card information and manage our keys later. The other packages are the driver, daemon and configuration tool for the smart card reader.

First of all, we would like to scan the computer to find the smart card reader.

pcsc_scan -n

The result would like below:

PC/SC device scanner
V 1.5.2 (c) 2001-2017, Ludovic Rousseau <[email protected]>
Using reader plug'n play mechanism
Scanning present readers...
0: Alcor Micro AU9560 00 00
 
Wed Apr  29 18:07:54 2020
 Reader 0: Alcor Micro AU9560 00 00
  Card state: Card inserted, 
  ATR: 3B DA 18 FF 81 B1 FE 75 1F 03 00 31 F5 73 C0 01 60 00 90 00 1C

The smart card reader is at AU9560 00 00 and I could add it to the daemon

echo "reader-port \"Alcor Micro AU9560 00 00\"" > ~/.gnupg/scdaemon.conf

After the reboot, you would able to initialise the card:

gpg --card-edit

the command will show the information of your OpenGPG card and start the gpg interactive prompt.

Reader ...........: Alcor Micro AU9560 00 00
Application ID ...: D2760001240103030005000092990000
Version ..........: 3.3
Manufacturer .....: ZeitControl
Serial number ....: 00009299
Name of cardholder: [not set]
Language prefs ...: [not set]
Sex ..............: unspecified
URL of public key : [not set]
Login data .......: [not set]
Signature PIN ....: forced
Key attributes ...: rsa2048 rsa2048 rsa2048
Max. PIN lengths .: 64 64 64
PIN retry counter : 3 0 3
Signature counter : 0
Signature key ....: [none]
Encryption key....: [none]
Authentication key: [none]
General key info..: [none]
gpg/card> 

The card is capable of generating gpg keys on its chip in admin mode. To enter this mode, type admin command and then help to show available operations.

gpg/card> admin
Admin commands are allowed

gpg/card> help
quit           quit this menu
admin          show admin commands
help           show this help
list           list all available data
name           change card holder's name
url            change URL to retrieve key
fetch          fetch the key specified in the card URL
login          change the login name
lang           change the language preferences
sex            change card holder's sex
cafpr          change a CA fingerprint
forcesig       toggle the signature force PIN flag
generate       generate new keys
passwd         menu to change or unblock the PIN
verify         verify the PIN and list all data
unblock        unblock the PIN using a Reset Code
factory-reset  destroy all keys and data

we will use the generate command to generate new keys.

In the card editing process, you will be asked you to back up the encryption key onto your hard disk. It is a good idea to move the back up keys to another device in case your card is damaged or not accessible. During the process, there are few more questions to answer and you need to confirm your ownership of the card by entering the Standard PIN and Admin PIN when necessary. The default PINs are

Standard PIN: 123456
ADMIN PIN: 12345678

Of course, those PINs need to change immediately after (use passwd command in admin mode) you create PGP keys. Also when asked about the PIN, it means the standard PIN instead of Admin PIN.

After finish the interactive configuration process, the gpg keys are generated and stored on your smart card. Your computer does know the signature of the public key but the private keys are stored on the card. (Remember to remove the backup key to a safe place before proceeding)

To view the gpg keys on the card, simply type list command and all keys will be shown.

Finally, we also like to add the smart card to gnome keyring service. Edit the /usr/local/bin/gnome-keyring-daemon with follwing lines

#!/bin/sh
/usr/bin/gnome-keyring-daemon --start -c pkcs11,secrets

and enable the GunPG agents

echo "use-agent" >> ~/.gnupg/gpg.conf
echo "enable-ssh-support" >> ~/.gnupg/gpg-agent.conf

The smart card can now be used as a normal PGP key in your workflow. In my workflow, there are some use cases I do enjoy using the smart card.

Git signing

Git commit can be submitted to the repository by anyone who has write access. The information of committer can be arbitrarily assigned using git config. Git signing is a proper way to prove the identity of the committer.


Verified git commit

Upload your public PGP key to GitHub

Get your public key from GnuPG:

gpg --armour --export YOUR_EMAIL_ADD

and paste that into https://github.com/settings/keys.

Setup Git GPG key

Git let GnuPG sign the commit and you only have to inform which key to use if you have multiple signing keys. Git might able to find the right key if there is only one key but to be more secure it is better to confirm which key you are having on the card.

git config --global user.signingkey YOURKEY_SIGNATURE

where YOURKEY_SIGNATURE is the general key info for your gpg keys.

Signing the code

git commit -S -m 'Change the title of the post'

this will call GunPG and use the signature key to sign off the commit. A window will be prompt to let you insert the physical card and ask you for the standard PIN if the card is already in the reader.

Window ask for PIN when signing the commit

If everything is configured properly, this commit will have a verified status on GitHub.

Email encryption

Another use case I would prefer OpenGPG card is the email signature and encryption. Since my computer is dual boot in Linux and Windows, I would have to keep two sets of keys if I don’t have a way to share them. The smart card address this issue by storing the key on the chip and I don’t have to worry about the leak of private keys. When it comes to the email clients, there are many options on under different operating systems.

Thunderbird + Enigmail on all major OS

Enigmail add-on provides email signature and encryption support with OpenGPG. This is the first choice for me as the solution works on all platforms: Linux, Windows, and macOS.

Outlook + Gpg4win on Windows

Sometimes, you do need Outlook to arrange a few things for you and this when Gpg4win step in. If you do enjoy the integration of Microsoft productivity suite, go for this.

Apple mail + GPGTools on macOS

Similarly, there is a native option for macOS users. The only downside is that GPGTools is not free anymore.

SSH login

I haven’t try SSH login by myself because my organisation blocked the 22 port and I use SSH over HTTPS. You can refer to this Gist for more information about SSH login using GnuPG agent.

Final thought

The answer to “Would you need a card to protect yourself” will largely depend on your workflow. The physical card is an addtionaly layer of protection to your sensitive data and curcial accesses. However, the system security cannot be guaranteed by the physical encryption devices itself. I would recommend to use the chance to revisit your security practise before investing on the device. Also, it worth to consider USB based physical keys such as Yubikey if you don’t have smart card reader.

References

https://blog.programster.org/yubikey-link-with-gpg

https://gnupg.org/howtos/card-howto/en/ch03s03.html

https://stosb.com/blog/using-openpgp-keys-for-ssh-authentication/

https://developers.yubico.com/PGP/

Physical OpenGPG keys - April 28, 2020 - Yu Cao