101010.pl is one of the many independent Mastodon servers you can use to participate in the fediverse.
101010.pl czyli najstarszy polski serwer Mastodon. Posiadamy wpisy do 2048 znaków.

Server stats:

586
active users

#nitrokey

1 post1 participant0 posts today
Continued thread

Besides the #Nitrokey FIDO2, I also already have a Nitrokey U2F & a Solo Somu from #SoloKeys, so I wasn't too keen on paying 50€ + shipping for a new Nitrokey 3A Mini – a product I wouldn't need if my old key's firmware had been updated.

Instead, I bought a 🇨🇭 Token2 PIN+ Dual R3 whose hardware and firmware is also open-source and which costs only 25€ + shipping: token2.eu/shop/product/pin-dua #T2F2

The only downside is that #Token2 manufacture their products outside Europe (Nitrokeys are made in 🇩🇪).

www.token2.euTOKEN2 Sàrl is a Swiss cybersecurity company specialized in the area of multifactor authentication. We are a FIDO Alliance member.FIDO2 USB Key, U2F USB Key, Cheap Yubico alternative, FIDO2, fido alliance certified security keys Replace your mobile authenticator with secure hardware OTP token! Easily programmed via NFC. Designed to use with Google, Facebook, Dropbox, GitHub, Wordpress, Office 365, Azure MFA etc.

As I need an Ed25519-SK SSH key generated with a hardware token, I tried to use my Nitrokey #FIDO2 for that, but: no.

Years ago, #ed25519 had experimentally been added to the firmware (not released) but later #Nitrokey stated that customers should've donated on top of the selling price to get firmware updates & advised to buy the new product instead.

The latter would be OK if the old key wasn't sold anymore, but it is still sold & the firmware was last updated in 2021.

github.com/Nitrokey/nitrokey-f

GitHubSupport for ed25519-sk · Issue #39 · Nitrokey/nitrokey-fido2-firmwareBy dr-br

Had a mild need for a third hardware token and wow, the #Nitrokey I thought I'd give a whirl after the recent Yubikey vuln is so much nicer to work with.

systemd-cryptenroll made adding it to my LUKS keylist was trivial, adding it to PAM was trivial with pamu2fcfg, and gpg --edit-card covered device management and my GPG/SSH keys.

No need for ykman!