| Commit message (Collapse) | Author | Age | Files | Lines |
|
|
|
|
|
| |
operation` error
Signed-off-by: Peter Engelbert <pmengelbert@gmail.com>
|
|\
| |
| | |
Fix typo (numnber → number)
|
| |
| |
| |
| | |
Closes drduh/YubiKey-Guide#297
|
|\ \
| |/
|/| |
Adding wget as prerequisite on macOS
|
|/
|
| |
When i was following the guide I could not fetch the gpg config because I was missing wget
|
|\
| |
| | |
Point out that paperkey backups are password-protected
|
| |
| |
| | |
Fixes #263. Really though decision to make whether a paper printout with the password is a good way to go (recoverable but needs a really good place to keep) or not (more protection, but possibly worthless).
|
|\ \
| | |
| | | |
Add small adjustments after renewing my subkeys
|
| |/ |
|
|\ \
| | |
| | | |
Add missing preposition ("be able use" -> "be able to use")
|
| |/ |
|
|\ \
| | |
| | | |
Fixed broken "Change PUK" link
|
| |/
| |
| |
| |
| | |
Fixed a broken link found in
https://github.com/drduh/YubiKey-Guide/issues/287 and updated the text.
|
|\ \
| | |
| | | |
Fix for `tr: Illegal byte sequence` on macOS
|
| |/ |
|
|\ \
| |/
|/| |
Add notes about KDF compatibility (solves #307)
|
|/ |
|
|\
| |
| | |
Added clearer recovery options
|
| | |
|
| | |
|
|\ \
| | |
| | | |
add pinentry path for M1 macs
|
| |/
| |
| |
| | |
Closes #289
|
|\ \
| | |
| | | |
Use GPT instead of MBR
|
| |/ |
|
|\ \
| | |
| | | |
Add Key Derived Function (KDF) setting
|
| |/ |
|
|\ \
| | |
| | | |
Minor grammar fixes
|
| |/ |
|
|\ \
| |/
|/| |
add prefix and date to temporary folder
|
|/
|
|
| |
This makes identifying the latest version easier when daleing with backups.
|
| |
|
| |
|
| |
|
| |
|
|\
| |
| | |
Clarified PIN config
|
| | |
|
| |
| |
| |
| |
| | |
- define each pin name, default, usage
- call out special admin pin restrictions
|
|\ \
| | |
| | | |
switching between Yubikeys
|
| |/
| |
| | |
section describes the issue and the remedy for GPG stubs only pointing to the Yubikey that was last subject to the keytocard command
|
|\ \
| | |
| | | |
added mention of ssh key support for blue security keys
|
| |/
| |
| |
| |
| | |
As detailed in their recent press release and blog post
https://www.yubico.com/blog/github-now-supports-ssh-security-keys/
|
|\ \
| | |
| | | |
Script to switch between two Yubikeys with identical keys
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
Some GitHub users have asked in the issues why can't I use two Yubikeys (one as a backup). It's a question often asked
The usual answer given across the web is that you can't as GPG replaces the key with key stubs when you quit and save (if you don't save then the Yubikey appears useless as GPG doesn't delete the keys and carries on using them off the keyring.
If once you have run keytocard to transfer your keys to the Yubikey#1 you QUIT WITHOUT SAVING then you can repeat the whole process again and put in your Yubikey#2 and keytocard again. this time QUIT AND SAVE.
GPG will now replace the keys with a key stub pointing to the Yubikey with the card serial number (see Yubikey serial on back of key) when you try to decrypt/sign/authenticate. The first Yubikey will be ignored despite the fact it has a copy of the Yubikey.
However you can use gpg-connect-agent to force read the Yubikey and repoint the key stubs to the keys on the Yubikey inserted.
Just run the script and insert whichever key you have to have (primary or backup) when prompted
NB once this script has been run GPG will be pointing the stubs at the recently used Yubikey ... to go back to your first Yubikey again switch Yubikeys and re-run script
Simples :)
|
|\ \ \
| |_|/
|/| | |
Update nixos LiveCD example
|
|/ /
| |
| |
| | |
````nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-graphical-kde.nix```` no longer exists.
Update to ````nixpkgs/nixos/modules/installer/cd-dvd/installation-cd-graphical-plasma5.nix````
|
|\ \
| | |
| | | |
Add note about pass insert error and `trust-key` usage
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | | |
When using a previously provisioned YubiKey on a new computer,
I was met with an "Unusable public key" error when trying to insert
a new password, despite being able to decrypt pass entries.
I tried setting the trust on the key via `gpg --edit-key`, but was
then met with "Need secret key to do this."
I found that the solution is apparently to use the `trust-key`
directive in `~/.gnupg/gpg.conf`, which is not mentioned in the README
at the moment.
|
|\ \ \
| | | |
| | | | |
Update usage of ykman
|
| | |/
| |/|
| | |
| | |
| | |
| | | |
Fixes the following warning:
WARNING: The use of this command is deprecated and will be removed!
Replace with: ykman openpgp keys set-touch
|
|\ \ \
| | | |
| | | | |
[security] Adds warning about PUK being default
|