mirror of
https://github.com/QubesOS/qubes-doc.git
synced 2024-10-01 01:25:40 -04:00
fix typos
This commit is contained in:
parent
582125abab
commit
f8c0eac48d
@ -50,11 +50,11 @@ To use this mode you need to:
|
|||||||
|
|
||||||
sudo apt-get install yubikey-personalization yubikey-personalization-gui
|
sudo apt-get install yubikey-personalization yubikey-personalization-gui
|
||||||
|
|
||||||
Shut down your TempalteVM. Then reboot your USB VM (so changes inside the TemplateVM take effect
|
Shut down your TemplateVM. Then reboot your USB VM (so changes inside the TemplateVM take effect
|
||||||
in your TemplateBased USB VM or install the packages inside your USB VM if you would like to avoid
|
in your TemplateBased USB VM or install the packages inside your USB VM if you would like to avoid
|
||||||
rebooting your USB VM.
|
rebooting your USB VM.
|
||||||
|
|
||||||
2. Configure your YubiKey for challenge-reponse `HMAC-SHA1` mode, for example
|
2. Configure your YubiKey for challenge-response `HMAC-SHA1` mode, for example
|
||||||
[following this
|
[following this
|
||||||
tutorial](https://www.yubico.com/products/services-software/personalization-tools/challenge-response/).
|
tutorial](https://www.yubico.com/products/services-software/personalization-tools/challenge-response/).
|
||||||
|
|
||||||
@ -62,12 +62,12 @@ To use this mode you need to:
|
|||||||
|
|
||||||
- Choose `configuration slot 2`.
|
- Choose `configuration slot 2`.
|
||||||
- It is recommended to enable `Require user input (button press)` but this is optional.
|
- It is recommended to enable `Require user input (button press)` but this is optional.
|
||||||
- Note: Derivating from the above video, use the following settings select
|
- Note: Different from the above video, use the following settings select
|
||||||
`HMAC-SHA1 mode`: `fixed 64 bit input`.
|
`HMAC-SHA1 mode`: `fixed 64 bit input`.
|
||||||
- We will refer the `Secret Key (20 bytes hex)` as `AESKEY`.
|
- We will refer the `Secret Key (20 bytes hex)` as `AESKEY`.
|
||||||
- It is recommended to keep a backup of your `AESKEY` in an offline VM used as vault.
|
- It is recommended to keep a backup of your `AESKEY` in an offline VM used as vault.
|
||||||
- Consider to keep a backup of your `AESKEY` on paper and store it in a safe place.
|
- Consider to keep a backup of your `AESKEY` on paper and store it in a safe place.
|
||||||
- In case you have multiple yubikeys for backup purposes (in case a yubikey gets lost, stolen or breaks) you can write the same settings into other yubikeys.
|
- In case you have multiple YubiKeys for backup purposes (in case a yubikey gets lost, stolen or breaks) you can write the same settings into other YubiKeys.
|
||||||
|
|
||||||
3. Install [qubes-app-yubikey](https://github.com/QubesOS/qubes-app-yubikey) in dom0.
|
3. Install [qubes-app-yubikey](https://github.com/QubesOS/qubes-app-yubikey) in dom0.
|
||||||
|
|
||||||
@ -83,7 +83,7 @@ To use this mode you need to:
|
|||||||
|
|
||||||
You can calculate your hashed password using the following two commands.
|
You can calculate your hashed password using the following two commands.
|
||||||
First run the following command to store your password in a temporary variable `password`.
|
First run the following command to store your password in a temporary variable `password`.
|
||||||
(This way your password will not leak to the terminal commnand history file.)
|
(This way your password will not leak to the terminal command history file.)
|
||||||
|
|
||||||
read password
|
read password
|
||||||
|
|
||||||
|
Loading…
Reference in New Issue
Block a user