![]() You can backup your keyring prior to moving keys and restore it before copying keys to each card or ctrl c out of gpg without saving the keyring references for the material that was moved to the smart card. Generate your material locally with gpg instead of generating them on the smart card itself and use the keytocard command to copy the keys to the card. įor people asking about backing up material on OpenPGP modules: these are write only. The "setup" instructions that are referenced in the packaging and on parts of the site are for basic use of OTP. Typing in my local password instead of the PIV pin when logging into OSX while I have a token with PIV enabled Forgetting to change my environment to use gpg-agent instead of ssh-agent. You might have to unplug and plug the tokenīack in when switching back and forth between GUI/cmdline Yubico tools and gpg. You can't use the PIV or NEO GUI managers and gpg at the same time. The pins for PIV and OpenPGP are separate as these are separate modules on the card. The gotchas I've encountered while using them on OSX: I also purchased a few 4c tokens and so far they've worked great although I haven't been using them for very long. I recently bought a Neo to test out NFC (NFC support on the HTC 10 seems deplorable for smart card reading btw). I still have two of the Symantec VIP tokens from years ago that I've never had issues with. I've had good experiences with Yubikeys thus far.
0 Comments
Leave a Reply. |