Yubikey on Arch

Just a quick guide how to get a Yubikey working on Arch Linux.

Enable the udev rules to access the Yubikey as a user.

echo 'KERNEL=="hidraw*", SUBSYSTEM=="hidraw", MODE="0664", GROUP="users", ATTRS{idVendor}=="2581", ATTRS{idProduct}=="f1d0"' | sudo tee /etc/udev/rules.d/10-security-key.rules

Install the U2F module to provide U2F support in Chrome

sudo pacman -S libu2f-host

Enable pcscd (the system smart card daemon)

sudo systemctl enable pcscd.service

Install the personalization GUI

yaourt -S yubikey-personalization-gui-git

Reboot so that the udev rules take effect and pcscd starts (you could use udevadm trigger and systemctl start pcscd.service here, but I like to reboot)

Run yubikey-personalization-gui and configure slot 1 as a OTP slot and slot two as a static password

Michael is a polyglot software engineer, committed to reducing complexity in systems and making them more predictable. Working with a variety of languages and tools, he shares his technical expertise to audiences all around the world at user groups and conferences. You can follow @mheap on Twitter

Thoughts on this post

Thanks for this post, I am an Arch n00b and got my yubikey 2fa working like a charm!

[…] Update – On Arch Linux it was not working out of the box. I had to follow the instructions from https://michaelheap.com/yubikey-on-arch/ […]

Leave a comment?

Leave a Reply