From a48402dc8b6cbe4779b2a41af2fd12b2a93f9027 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Marczykowski-G=C3=B3recki?= Date: Mon, 25 Jan 2021 00:03:55 +0100 Subject: [PATCH] Remove unmaintained OTP yubikey mode --- user/security-in-qubes/yubi-key.md | 11 ----------- 1 file changed, 11 deletions(-) diff --git a/user/security-in-qubes/yubi-key.md b/user/security-in-qubes/yubi-key.md index a2a23b69..5c017587 100644 --- a/user/security-in-qubes/yubi-key.md +++ b/user/security-in-qubes/yubi-key.md @@ -13,17 +13,6 @@ Using YubiKey to Qubes authentication You can use a YubiKey to enhance Qubes user authentication, for example to mitigate risk of someone snooping the password. This can also slightly improve security when you have a [USB keyboard](/doc/device-handling-security/#security-warning-on-usb-input-devices). -There are (at least) two possible configurations: using OTP mode and using challenge-response mode. - -OTP mode --------- - -This can be configured using the [app-linux-yubikey](https://github.com/adubois/qubes-app-linux-yubikey) package. -This package does not support sharing the same key slot with other applications (it will deny further authentications if you try). - -Contrary to instruction there, currently there is no binary package in the Qubes repository and you need to compile it yourself. -This might change in the future. - Challenge-response mode ----------------------