-
Notifications
You must be signed in to change notification settings - Fork 56
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Cannot use Yubikey keyslot to manage keys #74
Comments
You can use |
Thanks, I wasn't clear on the usage for that command. However, it always attempts to open a container on /dev/sda3 even though that volume does not exist on my system.
|
You have to tell the script which container you want to open, /dev/sda3 is example default. Use |
HackSane, I believe you are correct. Keep in mind the maximum passphrase length is 512 characters (I think), so it should be possible to keep one in another slot without entirely negating the security provided by using a yubikey. |
It seems that a Yubikey keyslot can only be used to unlock on bootup, but not to manage LUKS once logged in, such as adding and changing keys. This would mean that you must keep a password-only LUKS keyslot to manage keys, which seems to defeat the purpose of the added security of a Yubikey. Unless there is a detail I am missing?
The text was updated successfully, but these errors were encountered: