modules/yubikey: add support of yubico pam

This commit is contained in:
Dmitriy Pleshevskiy 2024-06-01 03:42:04 +03:00
parent 0fe23e8bf8
commit 8e0a030085
Signed by: pleshevskiy
GPG key ID: 17041163DA10A9A2
3 changed files with 63 additions and 20 deletions

View file

@ -7,7 +7,11 @@
./users ./users
]; ];
local.yubikey.enable = true; local.yubikey = {
enable = true;
serial = "28058247";
unplug.enable = true;
};
################################################################################ ################################################################################
# Services # Services

View file

@ -11,7 +11,7 @@ in
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
programs.i3lock = { programs.i3lock = {
enable = true; enable = true;
u2fSupport = lib.mkDefault config.local.yubikey.enable; u2fSupport = lib.mkDefault config.security.pam.u2f.enable;
}; };
programs.xss-lock.enable = true; programs.xss-lock.enable = true;

View file

@ -1,32 +1,71 @@
{ config, lib, pkgs, ... }: { config, lib, pkgs, ... }:
let cfg = config.local.yubikey; in let
cfg = config.local.yubikey;
control = if cfg.multi-factor.enable then "required" else "sufficient";
in
{ {
options.local.yubikey = with lib; { options.local.yubikey = with lib; {
enable = mkEnableOption "yubikey"; enable = mkEnableOption "yubikey";
serial = mkOption {
type = types.nullOr types.str;
default = null;
};
multi-factor.enable = mkEnableOption "multi-factor" // { default = true; };
unplug = {
enable = mkEnableOption "Do action when a Yubikey is unplugged";
model = mkOption {
type = types.str;
default = "407";
};
command = mkOption {
type = types.str;
default = "${pkgs.systemd}/bin/loginctl lock-sessions";
};
};
}; };
config = lib.mkIf cfg.enable { config = lib.mkIf cfg.enable {
environment.systemPackages = [ pkgs.yubikey-manager pkgs.yubikey-personalization ]; environment.systemPackages = [ pkgs.yubikey-manager pkgs.yubikey-personalization ];
security.pam.u2f = { security.pam =
if cfg.serial == null then
{
u2f = {
enable = true; enable = true;
control = "required"; inherit control;
cue = lib.mkDefault true; cue = lib.mkDefault true;
}; };
services.udev.packages = [ pkgs.yubikey-personalization ]; services = {
security.pam.services = { login.u2fAuth = lib.mkDefault true;
login.u2fAuth = true; sudo.u2fAuth = lib.mkDefault true;
sudo.u2fAuth = true; };
}
else
{
yubico = {
enable = true;
inherit control;
mode = "challenge-response";
id = [ cfg.serial ];
};
}; };
services.pcscd.enable = true;
services.udev.extraRules = lib.mkIf config.programs.xss-lock.enable '' services.pcscd.enable = cfg.serial != null;
services.udev = {
packages = [ pkgs.yubikey-personalization ];
extraRules = lib.mkIf cfg.unplug.enable ''
ACTION=="remove",\ ACTION=="remove",\
ENV{DEVTYPE}=="usb_device",\ ENV{DEVTYPE}=="usb_device",\
ENV{PRODUCT}=="1050/402/543",\ ENV{PRODUCT}=="1050/${cfg.unplug.model}/543",\
RUN+="${pkgs.systemd}/bin/loginctl lock-sessions" RUN+="${cfg.unplug.command}"
''; '';
}; };
};
} }