From f8c0eac48df36c1bbd25235481a36ed000d83aed Mon Sep 17 00:00:00 2001 From: Patrick Schleizer Date: Sun, 25 Feb 2018 15:36:02 +0100 Subject: [PATCH] fix typos --- security/yubi-key.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/security/yubi-key.md b/security/yubi-key.md index 91d42f44..0d12ddd3 100644 --- a/security/yubi-key.md +++ b/security/yubi-key.md @@ -50,11 +50,11 @@ To use this mode you need to: sudo apt-get install yubikey-personalization yubikey-personalization-gui - Shut down your TempalteVM. Then reboot your USB VM (so changes inside the TemplateVM take effect + Shut down your TemplateVM. Then reboot your USB VM (so changes inside the TemplateVM take effect in your TemplateBased USB VM or install the packages inside your USB VM if you would like to avoid rebooting your USB VM. -2. Configure your YubiKey for challenge-reponse `HMAC-SHA1` mode, for example +2. Configure your YubiKey for challenge-response `HMAC-SHA1` mode, for example [following this tutorial](https://www.yubico.com/products/services-software/personalization-tools/challenge-response/). @@ -62,12 +62,12 @@ To use this mode you need to: - Choose `configuration slot 2`. - It is recommended to enable `Require user input (button press)` but this is optional. - - Note: Derivating from the above video, use the following settings select + - Note: Different from the above video, use the following settings select `HMAC-SHA1 mode`: `fixed 64 bit input`. - We will refer the `Secret Key (20 bytes hex)` as `AESKEY`. - It is recommended to keep a backup of your `AESKEY` in an offline VM used as vault. - Consider to keep a backup of your `AESKEY` on paper and store it in a safe place. - - In case you have multiple yubikeys for backup purposes (in case a yubikey gets lost, stolen or breaks) you can write the same settings into other yubikeys. + - In case you have multiple YubiKeys for backup purposes (in case a yubikey gets lost, stolen or breaks) you can write the same settings into other YubiKeys. 3. Install [qubes-app-yubikey](https://github.com/QubesOS/qubes-app-yubikey) in dom0. @@ -83,7 +83,7 @@ To use this mode you need to: You can calculate your hashed password using the following two commands. First run the following command to store your password in a temporary variable `password`. - (This way your password will not leak to the terminal commnand history file.) + (This way your password will not leak to the terminal command history file.) read password