fix typos

This commit is contained in:
Patrick Schleizer 2018-02-25 15:36:02 +01:00 committed by GitHub
parent 582125abab
commit f8c0eac48d
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -50,11 +50,11 @@ To use this mode you need to:
sudo apt-get install yubikey-personalization yubikey-personalization-gui sudo apt-get install yubikey-personalization yubikey-personalization-gui
Shut down your TempalteVM. Then reboot your USB VM (so changes inside the TemplateVM take effect Shut down your TemplateVM. Then reboot your USB VM (so changes inside the TemplateVM take effect
in your TemplateBased USB VM or install the packages inside your USB VM if you would like to avoid in your TemplateBased USB VM or install the packages inside your USB VM if you would like to avoid
rebooting your USB VM. rebooting your USB VM.
2. Configure your YubiKey for challenge-reponse `HMAC-SHA1` mode, for example 2. Configure your YubiKey for challenge-response `HMAC-SHA1` mode, for example
[following this [following this
tutorial](https://www.yubico.com/products/services-software/personalization-tools/challenge-response/). tutorial](https://www.yubico.com/products/services-software/personalization-tools/challenge-response/).
@ -62,12 +62,12 @@ To use this mode you need to:
- Choose `configuration slot 2`. - Choose `configuration slot 2`.
- It is recommended to enable `Require user input (button press)` but this is optional. - It is recommended to enable `Require user input (button press)` but this is optional.
- Note: Derivating from the above video, use the following settings select - Note: Different from the above video, use the following settings select
`HMAC-SHA1 mode`: `fixed 64 bit input`. `HMAC-SHA1 mode`: `fixed 64 bit input`.
- We will refer the `Secret Key (20 bytes hex)` as `AESKEY`. - We will refer the `Secret Key (20 bytes hex)` as `AESKEY`.
- It is recommended to keep a backup of your `AESKEY` in an offline VM used as vault. - It is recommended to keep a backup of your `AESKEY` in an offline VM used as vault.
- Consider to keep a backup of your `AESKEY` on paper and store it in a safe place. - Consider to keep a backup of your `AESKEY` on paper and store it in a safe place.
- In case you have multiple yubikeys for backup purposes (in case a yubikey gets lost, stolen or breaks) you can write the same settings into other yubikeys. - In case you have multiple YubiKeys for backup purposes (in case a yubikey gets lost, stolen or breaks) you can write the same settings into other YubiKeys.
3. Install [qubes-app-yubikey](https://github.com/QubesOS/qubes-app-yubikey) in dom0. 3. Install [qubes-app-yubikey](https://github.com/QubesOS/qubes-app-yubikey) in dom0.
@ -83,7 +83,7 @@ To use this mode you need to:
You can calculate your hashed password using the following two commands. You can calculate your hashed password using the following two commands.
First run the following command to store your password in a temporary variable `password`. First run the following command to store your password in a temporary variable `password`.
(This way your password will not leak to the terminal commnand history file.) (This way your password will not leak to the terminal command history file.)
read password read password