aboutsummaryrefslogtreecommitdiffstatshomepage
path: root/README.md
diff options
context:
space:
mode:
authordrduh <github@duh.to>2024-03-17 17:22:15 -0700
committerdrduh <github@duh.to>2024-03-17 17:22:15 -0700
commit6272fc418104a7e6c3d2dbab647274fe1a10b39b (patch)
tree87646d8f70953dc2e000c36ac2d65d14558cc475 /README.md
parentSimplify and automate fdisk commands (diff)
downloadYubiKey-Guide-6272fc418104a7e6c3d2dbab647274fe1a10b39b.tar.gz
Install yubikey-manager directly on Debian
Diffstat (limited to 'README.md')
-rw-r--r--README.md44
1 files changed, 5 insertions, 39 deletions
diff --git a/README.md b/README.md
index 0ec101d..c21fb1a 100644
--- a/README.md
+++ b/README.md
@@ -215,7 +215,7 @@ sudo apt -y upgrade
sudo apt -y install \
wget gnupg2 gnupg-agent dirmngr \
cryptsetup scdaemon pcscd \
- yubikey-personalization
+ yubikey-personalization yubikey-manager
```
**Note** Live Ubuntu images [may require modification](https://github.com/drduh/YubiKey-Guide/issues/116) to `/etc/apt/sources.list` and may need additional packages:
@@ -224,26 +224,6 @@ sudo apt -y install \
sudo apt -y install libssl-dev swig libpcsclite-dev
```
-**Optional** Install the `ykman` utility, which will allow you to enable touch policies (requires admin PIN):
-
-```console
-sudo apt -y install python3-pip python3-pyscard
-
-pip3 install PyOpenSSL
-
-pip3 install yubikey-manager
-
-sudo service pcscd start
-
-~/.local/bin/ykman openpgp info
-```
-
-**Note** Debian does not recommend installing non-Debian packaged Python applications globally. But fortunately, it is not necessary as `yubikey-manager` is available in the stable main repository:
-
-```console
-sudo apt install -y yubikey-manager
-```
-
**OpenBSD**
```console
@@ -581,8 +561,6 @@ sudo mkfs.ext2 /dev/mapper/gnupg-secrets -L gnupg-$(date +F)
Mount the filesystem and copy the temporary GnuPG working directory exported key materials:
```console
-sudo mkdir /mnt/encrypted-storage
-
sudo mount /dev/mapper/gnupg-secrets /mnt/encrypted-storage
sudo cp -av $GNUPGHOME /mnt/encrypted-storage/
@@ -669,8 +647,6 @@ $ doas newfs sd3i
Mount the filesystem and copy the temporary directory with the keyring:
```console
-doas mkdir /mnt/encrypted-storage
-
doas mount /dev/sd3i /mnt/encrypted-storage
doas cp -av $GNUPGHOME /mnt/encrypted-storage
@@ -696,9 +672,7 @@ Create another partition on the portable storage device to store the public key,
**Linux**
-Using the same `/dev/sdc` device as in the previous step:
-
-Create a small (20 Mb is more than enough) partition for storing secret materials:
+Using the same `/dev/sdc` device as in the previous step, create a small (at least 20 Mb is recommended) partition for storing materials:
```console
sudo fdisk /dev/sdc <<EOF
@@ -715,8 +689,6 @@ Create a filesystem and export the public key:
```console
sudo mkfs.ext2 /dev/sdc2
-sudo mkdir /mnt/public
-
sudo mount /dev/sdc2 /mnt/public
gpg --armor --export $KEYID | sudo tee /mnt/public/$KEYID-$(date +%F).asc
@@ -749,8 +721,6 @@ Create a filesystem and export the public key to it:
```console
doas newfs sd2b
-doas mkdir /mnt/public
-
doas mount /dev/sd2b /mnt/public
gpg --armor --export $KEYID | doas tee /mnt/public/$KEYID-$(date +%F).asc
@@ -810,7 +780,7 @@ USER_PIN=$(LC_ALL=C tr -dc '0-9' < /dev/urandom | fold -w6 | head -1)
echo "\nAdmin PIN: $ADMIN_PIN\nUser PIN: $USER_PIN"
```
-Update the admin PIN:
+Update the Admin PIN:
```console
gpg --command-fd=0 --pinentry-mode=loopback --change-pin <<EOF
@@ -822,7 +792,7 @@ q
EOF
```
-Update the user PIN:
+Update the User PIN:
```console
gpg --command-fd=0 --pinentry-mode=loopback --change-pin <<EOF
@@ -834,7 +804,7 @@ q
EOF
```
-Remote and re-insert YubiKey.
+Remove and re-insert YubiKey.
**Warning** Three incorrect *User PIN* entries will cause it to become blocked and must be unblocked with either the *Admin PIN* or *Reset Code*. Three incorrect *Admin PIN* or *Reset Code* entries will destroy data on YubiKey.
@@ -1827,8 +1797,6 @@ sudo mount /dev/mapper/gnupg-secrets /mnt/encrypted-storage
Mount the non-encrypted public partition:
```console
-sudo mkdir /mnt/public
-
sudo mount /dev/sdc2 /mnt/public
```
@@ -1924,8 +1892,6 @@ sudo cryptsetup luksClose gnupg-secrets
Export the updated public key:
```console
-sudo mkdir /mnt/public
-
sudo mount /dev/sdc2 /mnt/public
gpg --armor --export $KEYID | sudo tee /mnt/public/$KEYID-$(date +%F).asc