Tag Linux
Configuring and using a local Yubikey for SSH with FIDO2 is very straight forward using the Yubico manual Securing SSH with FIDO2
But in some cases I would like to use my Yubikey based SSH key on my office's workstation when I am at home using my notebook.
The expiring Let’s Encrypt DST Root CA X3 can cause problems on old servers:
root@server:/etc# wget https://www.example.com/monitoring --2021-09-30 21:34:39-- https://www.example.com/monitoring Resolving www.example.com (www.example.com)... 93.184.216.34 Connecting to www.example.com (www.example.com)|93.184.216.34|:443... connected. ERROR: The certificate of `www.example.com' is not trusted.
Fortunately there is an easy workaround to ensure the expired chain is not checked.
Due to a misconfiguration I had to shrink a LVM 2 volume group and its physical volume running on a software RAID.
Initially I thought adding a pair of Samsung 860 EVO as software RAID to my small home server cannot be too hard...
... but they seem to require special kernel settings to work.
© 2015 - 2022 Moritz Kobel
Theme by Anders Noren — Up ↑