fosstodon.org is one of the many independent Mastodon servers you can use to participate in the fediverse.
Fosstodon is an invite only Mastodon instance that is open to those who are interested in technology; particularly free & open source software. If you wish to join, contact us for an invite.

Administered by:

Server stats:

9.9K
active users

#pkcs11

0 posts0 participants0 posts today
OpenSoul ✅<p>Siamo nel #2025 e con <a href="https://mastodon.social/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> sulle *buntu <a href="https://mastodon.social/tags/Opensc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Opensc</span></a> e tutti i certificati <a href="https://mastodon.social/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a> (quindi anche robe come la <a href="https://mastodon.social/tags/CNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNS</span></a>) continuano a *NON* funzionare grazie al fantastico sistema <a href="https://mastodon.social/tags/SNAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SNAP</span></a> che qualcuno nello staff di <a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> ha detto semplicemente "freghiamocene", nonostante sia stato segnalato da ANNI il problema</p><p>Vediamo quanti anni devono passare ancora... Io sono senza parole 😞</p>
OpenSoul ✅<p>Siamo nel #2025 e con <a href="https://mastodon.social/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> sulle *buntu <a href="https://mastodon.social/tags/Opensc" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Opensc</span></a> e tutti i certificati <a href="https://mastodon.social/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a> (quindi anche robe come la <a href="https://mastodon.social/tags/CNS" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CNS</span></a>) continuano a *NON* funzionare grazie al fantastico sistema <a href="https://mastodon.social/tags/SNAP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SNAP</span></a> che qualcuno nello staff di <a href="https://mastodon.social/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Ubuntu</span></a> ha detto semplicemente "freghiamocene", nonostante sia stato segnalato da ANNI il problema</p><p>Vediamo quanti anni devono passare ancora... Io sono senza parole 😞</p>
jakob 🇦🇹 ✅<p><span class="h-card"><a href="https://mastodon.social/users/nixCraft" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>nixCraft</span></a></span></p><p>Yes for sure!<br><a href="https://soc.schuerz.at/search?tag=PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a></p>
Guillaume-Jean Herbiet<p><span class="h-card" translate="no"><a href="https://mastodon.social/@jpmens" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jpmens</span></a></span> Read that too and also had a look at <a href="https://mamot.fr/tags/cznic" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cznic</span></a> <a href="https://mamot.fr/tags/Knot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Knot</span></a> for a <a href="https://mamot.fr/tags/dnssec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>dnssec</span></a> bump-in-the-wire signer.<br>Also seen that @nitrokey also has doc for <a href="https://mamot.fr/tags/Knot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Knot</span></a>: <a href="https://docs.nitrokey.com/nethsm/knotdns" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">docs.nitrokey.com/nethsm/knotd</span><span class="invisible">ns</span></a><br>One operational question I have is the the ability to pre-generate keys once on the HSM, lock the <a href="https://mamot.fr/tags/pkcs11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkcs11</span></a> interface and have <a href="https://mamot.fr/tags/Knot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Knot</span></a> use them for automatic roll-overs according to policy w/o creating new keys automatically.<br>My understanding of <a href="https://mamot.fr/tags/Knot" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Knot</span></a> manual mode is that key timing has to be done… well, manually!</p>
Martin Schmitt<p>Ich bereite einen Bugreport vor für einen proprietären Smartcardtreiber, der allein dadurch, dass er geladen wird, <a href="https://mastodon.online/tags/pcscd" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pcscd</span></a> abspacken lässt, egal ob eine <a href="https://mastodon.online/tags/Smartcard" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Smartcard</span></a> im Reader steckt oder nicht.</p><p>Mit dem "normalen" onepin-opensc-pkcs11.so tritt das Problem nicht auf.</p><p>Jetzt kommts: Kann jemand einen frei downloadbaren proprietären <a href="https://mastodon.online/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a>-Smartcardtreiber eines namhaften Anbieters 🤡 empfehlen, den ich daneben halten kann, ob er sich genauso erratisch verhält?</p>
Oej<p>Are you using <a href="https://infosec.exchange/tags/SoftHSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SoftHSM</span></a>? Join us on October 24th! Check the attachment for details.</p><p><a href="https://infosec.exchange/tags/PKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKI</span></a> <a href="https://infosec.exchange/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a> <a href="https://infosec.exchange/tags/SOFTHSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>SOFTHSM</span></a> <a href="https://infosec.exchange/tags/OPENDNSSEC" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPENDNSSEC</span></a> <a href="https://infosec.exchange/tags/OPENSOURCE" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>OPENSOURCE</span></a></p>
Kushal Das :python: :tor:<p>What could cause <a href="https://toots.dgplug.org/tags/Firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Firefox</span></a> (after opening a new tab) to try to unlock a <a href="https://toots.dgplug.org/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a> by asking for PIN? <a href="https://toots.dgplug.org/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://toots.dgplug.org/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
Voralpen Linux User Group<p>Morgen, am 14.06.2024 um 18:30 gibt es wieder ein <a href="https://floss.social/tags/VALUG" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>VALUG</span></a>-Treffen im Alten Schl8hof in <a href="https://floss.social/tags/Wels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Wels</span></a>. <span class="h-card" translate="no"><a href="https://chaos.social/@hkrat" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>hkrat</span></a></span> wird diesmal Einblicke in die Thematik "<a href="https://floss.social/tags/HSM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>HSM</span></a> (<a href="https://floss.social/tags/TPM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>TPM</span></a>, <a href="https://floss.social/tags/CAAM" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CAAM</span></a>) &amp; <a href="https://floss.social/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a>" gewähren. <a href="https://valug.at/events/2024-06-14-hsm/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">valug.at/events/2024-06-14-hsm</span><span class="invisible">/</span></a></p>
James Bottomley<p>I finally dusted off my <a href="https://mastodon.online/tags/openssl" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openssl</span></a> to <a href="https://mastodon.online/tags/pkcs11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkcs11</span></a> conversion project to work with openssl3:</p><p><a href="https://git.kernel.org/pub/scm/linux/kernel/git/jejb/openssl-pkcs11-export.git/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">git.kernel.org/pub/scm/linux/k</span><span class="invisible">ernel/git/jejb/openssl-pkcs11-export.git/</span></a></p><p>This all came about because I wanted a pkcs11 capability rooted in the <a href="https://mastodon.online/tags/tpm2" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tpm2</span></a> so I can use <a href="https://mastodon.online/tags/tpm" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tpm</span></a> based keys on <a href="https://mastodon.online/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> . However, since I'd already written the engine for tpm2, it seemed somewhat parochial to limit this to tpm2 only and instead I wrote the above to export every possible key type (including engine keys and hence tpm2 keys) from openssl.</p>
Kan-Ru Chen<p>從一開始入手 … <a href="https://kanru.info/fedora-pkcs11-ssh-and-pgp/" class="" rel="nofollow noopener noreferrer" target="_blank">閱讀全文 <span class="">Fedora 上使用硬體加密的 SSH 與 PGP</span></a></p><p><a href="https://kanru.info/fedora-pkcs11-ssh-and-pgp/" rel="nofollow noopener noreferrer" target="_blank">https://kanru.info/fedora-pkcs11-ssh-and-pgp/</a></p>
:idle: OpenSoul :verified:<p>Dopo altri <a href="https://mastodon.uno/tags/mesi" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>mesi</span></a>, questo è l'aggiornamento sulla vicenda 🤦 ...</p><p><a href="https://mastodon.uno/tags/firefox" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>firefox</span></a> <a href="https://mastodon.uno/tags/cns" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cns</span></a> <a href="https://mastodon.uno/tags/snap" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>snap</span></a> <a href="https://mastodon.uno/tags/canonical" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>canonical</span></a> <a href="https://mastodon.uno/tags/ubuntu" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ubuntu</span></a> <a href="https://mastodon.uno/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a></p>
Heiko<p>While exploring use of PKCS #11 devices in <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="tag">#<span>OpenPGP</span></a> contexts, I stumbled over a bug (and potential security issue) in the yubihsm_pkcs11.so driver for <a href="https://fosstodon.org/tags/YubiHSM" class="mention hashtag" rel="tag">#<span>YubiHSM</span></a> devices.</p><p>Long form text by Christian Reitter (who walked me through the coordinated disclosure process with <a href="https://fosstodon.org/tags/Yubico" class="mention hashtag" rel="tag">#<span>Yubico</span></a>, and did amazing work analyzing and writing up the issue):<br /><a href="https://blog.inhq.net/posts/yubico-yubihsm-pkcs-vuln/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">blog.inhq.net/posts/yubico-yub</span><span class="invisible">ihsm-pkcs-vuln/</span></a></p><p>Yubico advisory: <a href="https://www.yubico.com/support/security-advisories/ysa-2023-01/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://www.</span><span class="ellipsis">yubico.com/support/security-ad</span><span class="invisible">visories/ysa-2023-01/</span></a></p><p><a href="https://fosstodon.org/tags/CVE" class="mention hashtag" rel="tag">#<span>CVE</span></a>: <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39908" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">cve.mitre.org/cgi-bin/cvename.</span><span class="invisible">cgi?name=CVE-2023-39908</span></a></p><p>(Thanks again to <span class="h-card" translate="no"><a href="https://mastodon.social/@sovtechfund" class="u-url mention">@<span>sovtechfund</span></a></span> for funding my <a href="https://fosstodon.org/tags/PKCS11" class="mention hashtag" rel="tag">#<span>PKCS11</span></a> work)</p>
Heiko<p>Over the last half year, I&#39;ve spent time with PKCS #11 and PIV hardware security devices. In particular, using such devices in the <a href="https://fosstodon.org/tags/OpenPGP" class="mention hashtag" rel="tag">#<span>OpenPGP</span></a> context.</p><p>Entry points for results of this work:</p><p>- <a href="https://codeberg.org/heiko/openpgp-pkcs11" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/heiko/openpgp-pkc</span><span class="invisible">s11</span></a><br />- <a href="https://codeberg.org/heiko/openpgp-piv" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">codeberg.org/heiko/openpgp-piv</span><span class="invisible"></span></a><br />- <a href="https://codeberg.org/heiko/pkcs11-openpgp-notes" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">codeberg.org/heiko/pkcs11-open</span><span class="invisible">pgp-notes</span></a></p><p>One particular focus was building CI testing infrastructure (including <a href="https://gitlab.com/hkos/virtual-piv/" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="">gitlab.com/hkos/virtual-piv/</span><span class="invisible"></span></a>), to make future work on these codebases easier (and hopefully fun).</p><p><a href="https://fosstodon.org/tags/PKCS11" class="mention hashtag" rel="tag">#<span>PKCS11</span></a> <a href="https://fosstodon.org/tags/PIV" class="mention hashtag" rel="tag">#<span>PIV</span></a> <a href="https://fosstodon.org/tags/HSM" class="mention hashtag" rel="tag">#<span>HSM</span></a></p><p>[This work was funded by <span class="h-card" translate="no"><a href="https://mastodon.social/@sovtechfund" class="u-url mention">@<span>sovtechfund</span></a></span>]</p>
Jamie Clark<p>OASIS Open is a cosponsor of this year's International Cryptographic Module Conference (<a href="https://infosec.exchange/tags/ICMC23" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ICMC23</span></a>) in Ottawa this September; two of our technical committees, <a href="https://infosec.exchange/tags/KMIP" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>KMIP</span></a> and <a href="https://infosec.exchange/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a>, are on the agenda.<br>More details: <a href="https://icmconference.org" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">icmconference.org</span><span class="invisible"></span></a><br><a href="https://infosec.exchange/tags/cryptography" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cryptography</span></a> <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> <a href="https://infosec.exchange/tags/standards" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>standards</span></a></p><p>RT @CryptoModConf@twitter.com: Agenda Announced! The Industry Reconvenes this Fall in Ottawa to Review Changing Global Standards ... in commercial cryptography.</p>
Heiko<p>Today I spent a bit of time with the <a href="https://fosstodon.org/tags/YubiHSM" class="mention hashtag" rel="tag">#<span>YubiHSM</span></a> and its <a href="https://fosstodon.org/tags/PKCS11" class="mention hashtag" rel="tag">#<span>PKCS11</span></a> driver (the yubihsm_pkcs11.so driver had exhibited some confusing-to-me behavior, during occasional experiments over the past few weeks).</p><p>After a closer look, I believe that &quot;yubihsm_pkcs11.so&quot; version 2.4.0 has introduced a number of rather confusing regressions around object IDs (see <a href="https://github.com/Yubico/yubihsm-shell/issues/345" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/Yubico/yubihsm-shel</span><span class="invisible">l/issues/345</span></a> <a href="https://fosstodon.org/tags/Yubico" class="mention hashtag" rel="tag">#<span>Yubico</span></a>).</p><p>This investigation was a side-quest of my <span class="h-card" translate="no"><a href="https://mastodon.social/@sovtechfund" class="u-url mention">@<span>sovtechfund</span></a></span> financed project &quot;PKCS#11 support for <span class="h-card" translate="no"><a href="https://mastodon.social/@sequoiapgp" class="u-url mention">@<span>sequoiapgp</span></a></span>&quot;.</p>
Kushal Das :python: :tor:<p>What are good <a href="https://toots.dgplug.org/tags/opensource" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>opensource</span></a> <a href="https://toots.dgplug.org/tags/certificate" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>certificate</span></a> authorities which allows <a href="https://toots.dgplug.org/tags/PKCS11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKCS11</span></a>? <a href="https://toots.dgplug.org/tags/PKI" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>PKI</span></a> <a href="https://toots.dgplug.org/tags/CA" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>CA</span></a> This need to be deployed for smaller orgs.</p><p><span class="h-card"><a href="https://abyssdomain.expert/@filippo" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>filippo</span></a></span> any tips?</p>
NLnet Labs<p>Any <a href="https://fosstodon.org/tags/PKCS11" class="mention hashtag" rel="tag">#<span>PKCS11</span></a> experts who want to chime in on this discussion, whether or not to mark private keys as unmodifiable? <a href="https://fosstodon.org/tags/cryptography" class="mention hashtag" rel="tag">#<span>cryptography</span></a> <a href="https://fosstodon.org/tags/HSM" class="mention hashtag" rel="tag">#<span>HSM</span></a> <a href="https://fosstodon.org/tags/security" class="mention hashtag" rel="tag">#<span>security</span></a> <a href="https://fosstodon.org/tags/BestPractices" class="mention hashtag" rel="tag">#<span>BestPractices</span></a> <a href="https://github.com/NLnetLabs/krill/issues/1018" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/krill/iss</span><span class="invisible">ues/1018</span></a></p>
NLnet Labs<p>As the adoption of Delegated and Hybrid <a href="https://fosstodon.org/tags/RPKI" class="mention hashtag" rel="tag">#<span>RPKI</span></a> grows, so are the number of Hardware Security Modules (HSMs) out in the field that people store Krill&#39;s key material on. </p><p><a href="https://fosstodon.org/tags/KMIP" class="mention hashtag" rel="tag">#<span>KMIP</span></a> is pretty straight forward, but especially <a href="https://fosstodon.org/tags/PKCS11" class="mention hashtag" rel="tag">#<span>PKCS11</span></a> can be quite finicky. So we&#39;re keeping a public list of interoperability information. <a href="https://fosstodon.org/tags/BGP" class="mention hashtag" rel="tag">#<span>BGP</span></a> <a href="https://fosstodon.org/tags/OpenSource" class="mention hashtag" rel="tag">#<span>OpenSource</span></a> <a href="https://fosstodon.org/tags/interop" class="mention hashtag" rel="tag">#<span>interop</span></a> <a href="https://fosstodon.org/tags/rustlang" class="mention hashtag" rel="tag">#<span>rustlang</span></a> <a href="https://github.com/NLnetLabs/krill/issues?q=label%3A%22interop+testing%22+label%3A%22hsm%22" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">github.com/NLnetLabs/krill/iss</span><span class="invisible">ues?q=label%3A%22interop+testing%22+label%3A%22hsm%22</span></a> </p><p>Learn more about the option to use HSMs here: <a href="https://krill.docs.nlnetlabs.nl/en/stable/hsm.html" target="_blank" rel="nofollow noopener noreferrer" translate="no"><span class="invisible">https://</span><span class="ellipsis">krill.docs.nlnetlabs.nl/en/sta</span><span class="invisible">ble/hsm.html</span></a></p>
OPSEC Cybersecurity News Live<p>How to create, use and backup android signing keys without trusting the computer? <br> <br> <a href="https://security.stackexchange.com/questions/267736/how-to-create-use-and-backup-android-signing-keys-without-trusting-the-computer" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">security.stackexchange.com/que</span><span class="invisible">stions/267736/how-to-create-use-and-backup-android-signing-keys-without-trusting-the-computer</span></a> <br> <br> <a href="https://aspiechattr.me/tags/codesigning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>codesigning</span></a> <a href="https://aspiechattr.me/tags/yubikey" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>yubikey</span></a> <a href="https://aspiechattr.me/tags/backup" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>backup</span></a> <a href="https://aspiechattr.me/tags/pkcs11" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pkcs11</span></a></p>
Petr Menšík :fedora:<p>When playing with my <a href="https://fosstodon.org/tags/Yubi" class="mention hashtag" rel="tag">#<span>Yubi</span></a> 5 key, I have hit a wall. OTP keys were not straight forward, but worked. <a href="https://fosstodon.org/tags/PKCS11" class="mention hashtag" rel="tag">#<span>PKCS11</span></a> works fine. But moving secret key from <a href="https://fosstodon.org/tags/gpg" class="mention hashtag" rel="tag">#<span>gpg</span></a> to the key became blocker. It just doesn&#39;t work! Gitlab&#39;s or GitHub&#39;s <a href="https://fosstodon.org/tags/fido" class="mention hashtag" rel="tag">#<span>fido</span></a> works like charm though.</p>