diff --git a/README.md b/README.md index d0b368f..0b612a3 100644 --- a/README.md +++ b/README.md @@ -381,7 +381,6 @@ Finally, create an [authentication key](https://superuser.com/questions/390265/w GPG doesn't provide a 'RSA (authenticate only)' key type out of the box, so select 'RSA (set your own capabilities)' and toggle the required capabilities to end up with an Authenticate-only key: -``` gpg> addkey Please select what kind of key you want: (3) DSA (sign only) @@ -467,7 +466,6 @@ GPG doesn't provide a 'RSA (authenticate only)' key type out of the box, so sele gpg> save - ## 3.6 Check your work List your new secret keys: @@ -503,7 +501,6 @@ Save a copy of your keys: $ gpg --armor --export-secret-keys $KEYID > $GNUPGHOME/mastersub.key $ gpg --armor --export-secret-subkeys $KEYID > $GNUPGHOME/sub.key - The exported (primary) key will still have the passphrase in place. In addition to the backup below, you might want to keep a separate copy of the @@ -616,12 +613,13 @@ Create a filesystem: Writing superblocks and filesystem accounting information: done Mount the filesystem: + $ sudo mkdir /mnt/usb $ sudo mount /dev/mapper/encrypted-usb /mnt/usb Finally, copy files to it: - $ sudo cp -avi $GNUPGHOME /mnt/usb + $ sudo cp -avi $GNUPGHOME /mnt/usb ‘/tmp/tmp.aaiTTovYgo’ -> ‘/mnt/usb/tmp.aaiTTovYgo’ ‘/tmp/tmp.aaiTTovYgo/revoke.txt’ -> ‘/mnt/usb/tmp.aaiTTovYgo/revoke.txt’ ‘/tmp/tmp.aaiTTovYgo/gpg.conf’ -> ‘/mnt/usb/tmp.aaiTTovYgo/gpg.conf’ @@ -635,6 +633,7 @@ Finally, copy files to it: ‘/tmp/tmp.aaiTTovYgo/pubring.gpg’ -> ‘/mnt/usb/tmp.aaiTTovYgo/pubring.gpg’ Keep the backup mounted if you plan on setting up two or more keys (as `keytocard` will [delete](https://lists.gnupg.org/pipermail/gnupg-users/2016-July/056353.html) the local copy on save), otherwise unmount and disconnected the encrypted USB drive: + $ sudo umount /mnt/usb $ sudo cryptsetup luksClose encrypted-usb @@ -651,6 +650,7 @@ YubiKey NEOs shipped after November 2015 have [all modes enabled](https://www.yu Older versions of the YubiKey NEO may need to be reconfigured as a composite USB device (HID + CCID) which allows OTPs to be emitted while in use as a smart card. Plug in your YubiKey and configure it: + $ ykpersonalize -m82 Firmware version 4.2.7 Touch level 527 Program sequence 4 @@ -672,8 +672,8 @@ Use the [YubiKey NEO Manager](https://www.yubico.com/products/services-software/ ## 3.10 Configure smartcard Use GPG to configure YubiKey as a smartcard: - $ gpg --card-edit + $ gpg --card-edit Reader ...........: Yubico Yubikey 4 OTP U2F CCID Application ID ...: D2760001240102010006055532110000 Version ..........: 2.1 @@ -1399,4 +1399,4 @@ The Yubikey has two configurations, one invoked with a short press, and the othe - \ No newline at end of file +