How to use a cheap USB token (or Yubikey) instead of password in Arch Linux


I bought a cheap yet powerful USB U2F token from (link). The U2F standard is compatible with a few websites, they are listed here:

Beware: I'm using Plasma and SDDM, I did not test all of this with other DEs or DMs.

Also, pay attention before doing something possibly irreversible!

Photo by Nick Fewings / Unsplash

Mostly thanks to, what I also was able to get is to use this token instead of my password (but if you do care your privacy, you should use this as a second factor - not the only one, to do that you only need to change a word in the PAM module).

Since we are going to use PAM, you can also use your token instead of your password for sudo commands and unlocking KDE/Plasma lockscreen.

Plus, using a simple Udev rule, I was able to automatically lock the screen when the USB token is plugged off from my computer (I can still remove it without locking my screen holding Shift).


Thanks to the magic of AUR and the effort of Yubico, the process it's absolutely simple. First of all, remove the usb key from your computer and install the PAM module.

$ pacaur -S pam_u2f

Now plug in the token and run:

$ pamu2fcfg -uantonio

where antonio is my Linux username.

Create and put the result of this command in /etc/u2f_mappings, stripping the final % character if you have it.


We're almost there.

Edit /etc/pam.d/system-auth file and add, before any other auth line (note that this is a single line):

auth  sufficient  debug authfile=/etc/u2f_mappings cue

Basically sufficient means that the pam_u2f module is enough for logging in the user and the password won't be asked. You can change it to required, and put that line right after the pam_unix one, in order to request both the password and the second factor. Try your USB token in sufficient mode before changing it to required.

debug is an useful way of getting more informations in case something go wrong, you can remove this later.

More informations about this PAM module:

Reboot your computer and you are done!

Now from the login/lock screen you should be able to enter an empty password and tapping your token for loggin in :)

Photo by Cristina Gottardi / Unsplash

Locking the screen when the token is removed

Now this part was a little bit trickier, but I got there at the end.

We are gonna use Udev, and evtest for checking if the Shift key is being pressed. So be sure to run:

$ sudo pacman -S evtest

Create the file /usr/local/bin/yubikey-lock-screen with this content:



# Write message to system log
/usr/bin/logger "Screen locked because Yubikey has been disconnected."

# Check, if hotkey is not beeing pressed during lockscreen attempt
kbd_devices=`cat /proc/bus/input/devices | egrep '^H:.* kbd ' | sed 's/.*event\\([0$
for event_dev in ${kbd_devices}; do
    evtest --query /dev/input/${event_dev} EV_KEY ${HOTKEY}
    if [[ "$?" != "0" ]]; then
        exit 0

# Lock the screen
/usr/bin/loginctl lock-sessions

I made this editing a bit the script you can find here. Thank nshadov!

Now give it permission to be executed:

$ sudo chmod a+x /usr/local/bin/yubikey-lock-screen

and now you can just run /usr/local/bin/yubikey-lock-screen to check if it really locks your screen.

Now we're going to add a trigger that will call this script, and here comes the tricky. Run:

$ udevadm monitor --property

remove your USB token, and check the UDEV (not Kernel) events saying action remove. My device didn't have a line containing the vendorId and productId, but I found this:


So what you're looking for is a line containing a variable that can identify your token.

At the end, my udev rule is a single line:

SUBSYSTEM=="usb", ACTION=="remove", ENV{PRODUCT}=="96e/858/4004", RUN+="/usr/local/bin/yubikey-lock-screen"

Put this in /etc/udev/rules.d/71-autolockscreen.rules and load the new rule with:

$ udevadm control --reload
$ udevadm trigger


We did it

I hope this will help someone, but also I hope that a future me will find this notes useful next time I'll format my hard drive.

See you soon!