From 35e595d00457c567dab2548566ea1153213afd9b Mon Sep 17 00:00:00 2001 From: Jordan Mynes Date: Wed, 9 Apr 2025 11:09:50 -0500 Subject: [PATCH] fix: indicate that the secret key used is an example --- user/security-in-qubes/mfa.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/user/security-in-qubes/mfa.md b/user/security-in-qubes/mfa.md index a555e285..95f07044 100644 --- a/user/security-in-qubes/mfa.md +++ b/user/security-in-qubes/mfa.md @@ -207,7 +207,7 @@ website](https://docs.nitrokey.com/software/nitropy/all-platforms/installation). YubiKey](https://www.qubes-os.org/doc/how-to-use-usb-devices/) to this app qube though) or directly on the sys-usb vm. - This command will configure your Yubikey: + This command will configure your Yubikey, given a 20 character (all lowercase) secret key, like the example below: `ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -ochal-btn-trig -a 303132333435363738393a3b3c3d3e3f40414243` @@ -216,6 +216,7 @@ though) or directly on the sys-usb vm. - Challenge-Response Mode: `HMAC-SHA1`, - Require usser input (Optional, but Recommended): `true`, - HMAC-SHA1 Mode: `fixed 64 bit input` + - Secret Key (example): `303132333435363738393a3b3c3d3e3f40414243` **Yubikey (via GUI)**