Skip to content

Commit adecaa3

Browse files
authored
Merge branch 'master' into promote-recovery
2 parents 1ad2d22 + c328754 commit adecaa3

File tree

9 files changed

+47
-84
lines changed

9 files changed

+47
-84
lines changed

content/use-openvpn.md renamed to archived/use-openvpn.md

Lines changed: 0 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -16,24 +16,6 @@ section: software
1616
tableOfContents: true
1717
---
1818

19-
## Open A Terminal
20-
21-
### Pop!_OS
22-
23-
Press <kbd><font-awesome-icon :icon="['fab', 'pop-os']"></font-awesome-icon></kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
24-
25-
### Ubuntu
26-
27-
Press <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
28-
29-
## Install Packages
30-
31-
Enter the following command followed by <kbd>Enter</kbd>:
32-
33-
```bash
34-
sudo apt install network-manager-openvpn-gnome
35-
```
36-
3719
## Open Network Settings
3820

3921
Access OpenVPN setting in the <u>Settings</u> application (GNOME Control Center)

content/launch-keyboard.md

Lines changed: 7 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -41,10 +41,16 @@ Once the keyboard is in this mode, you can apply the firmware update. When the u
4141

4242
## Keyboard Configurator
4343

44-
You can download the configurator application [here](https://github.com/pop-os/keyboard-configurator/releases) On Pop!\_OS the configurator is available in the <u>Pop!\_Shop</u>. An `AppImage` is provided for Ubuntu and other Linux OSes. Windows and macOS downloads are also available.
44+
You can download the configurator application [here](https://github.com/pop-os/keyboard-configurator/releases) On Pop!\_OS the configurator is available in the <u>Pop!\_Shop</u>. An `AppImage` is provided for Ubuntu and other Linux OSes as a standalone file. Recent changes to Ubuntu will require that you install the `libfuse2` package for `AppImage` support and can be done with the following command run in a terminal:
4545

46+
```bash
47+
sudo apt update
48+
sudo apt install libfuse2
49+
```
4650
You can also download the configurator from the Arch Linux User Repository (AUR). The main version is built from the latest release, which is recommended for most users. You can find more information [here](https://aur.archlinux.org/packages/system76-keyboard-configurator). The git version is built from the latest commits to the project (this version will have the very latest fixes and features) which can be found [here](https://aur.archlinux.org/packages/keyboard-configurator-git/).
4751

52+
There are also builds of the Keyboard Configurator for [Windows and macOS](https://github.com/pop-os/keyboard-configurator/releases) at the same location.
53+
4854
## Remapping Keys
4955

5056
<video width="900" height="900" controls>

content/use-vpn-software.md

Lines changed: 0 additions & 22 deletions
Original file line numberDiff line numberDiff line change
@@ -38,10 +38,6 @@ Next be sure to leave **Open with Eddy (default)** selected so that the next win
3838

3939
Now click the **Install** button to install <u>ProtonVPN</u> using <u>Eddy</u>. Once that is down close the <u>Eddy</u> window.
4040

41-
### Install the package
42-
43-
Open a <u>Terminal</u> window to install the actual package as the .deb file that we installed added the repository so that our system knows where to find the real <u>ProtonVPN</u> package.
44-
4541
On **Pop!_OS**:
4642

4743
Press <kbd><font-awesome-icon :icon="['fab', 'pop-os']"></font-awesome-icon></kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
@@ -73,24 +69,6 @@ From this window we can see our Upload and Download speeds including the load th
7369

7470
## Install a VPN using OpenVPN files
7571

76-
### Open Terminal
77-
78-
If you are on **Pop!_OS**:
79-
80-
Press <kbd><font-awesome-icon :icon="['fab', 'pop-os']"></font-awesome-icon></kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
81-
82-
If you are on **Ubuntu**:
83-
84-
Press <kbd>Ctrl</kbd>+<kbd>Alt</kbd>+<kbd>t</kbd> on your keyboard. A Terminal window should open.
85-
86-
### Install Packages
87-
88-
Enter the following command followed by <kbd>Enter</kbd>:
89-
90-
```bash
91-
sudo apt install network-manager-openvpn-gnome
92-
```
93-
9472
### Open Network Settings
9573

9674
Access OpenVPN setting in the <u>Settings</u> application (GNOME Control Center)

content/yubikey-login.md

Lines changed: 39 additions & 42 deletions
Original file line numberDiff line numberDiff line change
@@ -14,99 +14,96 @@ section: community
1414
tableOfContents: true
1515
---
1616

17+
If you have a Yubikey, you can use it to login or unlock your system.
1718

18-
If you have a Yubikey, you can use it to login or unlock your system.
19+
To do this you must install the yubikey packages, configure a challenge-response slot on the Yubikey, and then configure the necessary PAM modules.
1920

20-
To do this you must install the yubikey-luks package, configure a challenge-response slot on the Yubikey, and then configure the necessary PAM modules.
21-
22-
**NOTE:** This guide assumes you are running Pop!_OS
21+
**NOTE:** Open an additional root terminal: `sudo su`
2322

2423
## Install Packages
2524

2625
To install the necessary packages, run:
2726

28-
sudo apt install -y libpam-yubico yubikey-personalization
29-
30-
You may get a question about the PAM configuration line. If so, enter this line:
31-
32-
mode=challenge-response
33-
34-
Don't enable any PAM modules yet. We'll do that at the end.
35-
36-
If you have already installed the package or want to reconfigure it, use this command:
37-
38-
sudo dpkg-reconfigure libpam-yubico
27+
sudo apt install -y libpam-yubico yubikey-personalization yubikey-manager
3928

4029
## Configure Challenge-Response for your Yubikey
4130

42-
To enable challenge-response on your Yubikey, type the following command:
31+
To enable challenge-response on your Yubikey in slot 2, type the following command:
4332

44-
ykpersonalize -2 -ochal-resp -ochal-hmac -ohmac-lt64 -oserial-api-visible
33+
ykman otp chalresp -g 2
4534

4635
This configures slot 2 for challenge-response, and leaves slot 1 alone.
4736

48-
Next we need to create some challenge response files, move them to a system wide directory, and secure those files:
37+
Next we need to create a place to store your challenge response files, secure those files, and finally create the stored challenge files:
4938

5039
sudo mkdir /var/yubico
51-
sudo chown root.root /var/yubico
40+
sudo chown root /var/yubico
5241
sudo chmod 700 /var/yubico
5342
ykpamcfg -2 -v
5443

5544
You should receive a message similar to:
5645

5746
`Stored initial challenge and expected response in '$HOME/.yubico/challenge-123456'.`
5847

59-
You should receive a unique *challenge-123456* in your output.
48+
You should receive a unique *challenge-serial* in your output.
6049

6150
Now, to finish up:
6251

63-
sudo mv ~/.yubico/challenge-123456 /var/yubico/alice-123456
64-
sudo chown root.root /var/yubico/alice-123456
65-
sudo chmod 600 /var/yubico/alice-123456
52+
sudo mv ~/.yubico/challenge-123456 /var/yubico/aaronh-serial
53+
sudo chown root.root /var/yubico/aaronh-serial
54+
sudo chmod 600 /var/yubico/aaronh-serial
6655

67-
Pay close attention when copying/pasting the commands above. The *challenge-123456* and *alice-123456* needs to match whatever your output is.**
56+
Pay close attention when copying/pasting the commands above. The *challenge-123456* and *aaronh-serial* needs to match the both the output from the `ykpamcfg` command and the final file needs to match the name of your user name and serial.**
6857

6958
## Configure Plugable Authentication Modules
7059

7160
**Before making any changes to the files listed below, I highly recommend backing up each file, and having a sudo/root session open in case you need to roll-back.**
7261

73-
You need to add the following line to each of the files listed below:
62+
sudo dpkg-reconfigure libpam-yubico
63+
64+
You will want to change the "Parameters for Yubico PAM:" to be:
65+
66+
mode=challenge-response debug chalresp_path=/var/yubico
67+
68+
>**Note:** The debug option is used for testing the change, review the Debugging and Testing section of this article for more information.
69+
70+
![dpkg-reconfigure-pg1](/images/yubikey-login/dpkg-reconfigure-pg1.png)
71+
![dpkg-reconfigure-pg2](/images/yubikey-login/dpkg-reconfigure-pg2.png)
72+
73+
Setting this to sufficient is the recommended method as the login manager will take your password **or** the Yubikey to login. To do this you will need to change the second setting in the following line in ```/etc/pam.d/common-auth```:
7474

7575
auth sufficient pam_yubico.so mode=challenge-response chalresp_path=/var/yubico
7676

77-
This configures your system to accept your Yubikey as an acceptable login alternative. In other words, you can login without a password, just plug the key into a USB port. **You can still use your password to login with this setup**.
77+
This configures your system to accept your Yubikey as an acceptable login alternative.
7878

79-
If you want your Yubiky to be **required to login**, then you need to change *sufficient* to *required*. For example:
79+
If you want your Yubiky to be **required to login**, then you need to change *sufficient* to *required* (which is the default). For example:
8080

8181
auth required pam_yubico.so mode=challenge-response chalresp_path=/var/yubico
8282

83-
There a a number of other options for PAM. Check the man pages for more information. Also, the [Yubico PAM module](https://developers.yubico.com/yubico-pam/) page has a pretty good breakdown.
83+
There a a number of other options for PAM and ways to configure that to your liking. Check the [man pages for more information](https://manpages.ubuntu.com/manpages/jammy/en/man5/pam.d.5.html). Also, the [Yubico PAM module](https://developers.yubico.com/yubico-pam/) page has a pretty good breakdown.
8484

8585
- /etc/pam.d/common-auth
8686
- /etc/pam.d/login
8787
- /etc/pam.d/gdm-password
8888

89-
### /etc/pam.d/common-auth
89+
## Debugging and Testing your PAM configuration
9090

91-
At a minimum you need to modify this file.
91+
You will want to keep a root terminal logged in while setting this up to make sure you can reverse any changes that do not allow you to login. In the initial setup, the parameters to setup libpam-yubico included debug message. "Sudo" on the command line will now show debug output when run.
9292

93-
Add the auth line to the top of this file (after the comment block).
93+
With the Yubikey plugged into the system simulate a login with the following commands:
9494

95-
You may need to run `pam-auth-update` afterwards.
95+
support@pop-os:~$ sudo -s
96+
[snip lots of logging]
97+
[sudo] password for support:
98+
root@pop-os:/home/support#
9699

97-
### /etc/pam.d/login
100+
Test you setup if you are changing the "sufficient" setting to "required" before removing the "debug" setting. Use new terminal windows to simulate a login both with your Yubikey attached and out of the system. In "required" mode, you should not be able to finish a login with the Yubikey not plugged into your system.
98101

99-
Modifying this file is optional. This allows you to authenticate to the Linux terminal with your Yubikey.
102+
Once you are sure that this works with your testing, remove the debug option:
100103

101-
Add the auth line to the top of this file (after the comment block).
102-
103-
### /etc/pam.d/gdm-password
104-
105-
Modifying this file is also optional. If you want to login to your Desktop Environment, (e.g. GNOME), you will need to add the auth line to the /etc/pam.d/gdm-password file.
106-
107-
Add the auth line immediately below the **@include common-auth** line.
104+
auth required pam_yubico.so mode=challenge-response chalresp_path=/var/yubico
108105

109-
**NOTE: This will allow you to login to your desktop without a password, but you may still be asked to use a password to unlock your keyring. This prompt should only appear once upon initial login.**
106+
from "/etc/pam.d/common-auth".
110107

111108
## References
112109

layouts/default.vue

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@
66
href="https://system76.com/specials"
77
target="_blank"
88
>
9-
Special Offers
9+
Gear Up and SAVE up to $150!
1010
</a>
1111
</template>
1212

Loading
2.74 KB
Loading
Loading
Loading

0 commit comments

Comments
 (0)