Depends on how you want to implement it.
You can install a Yubikey PAM module and just use the OTP natively, but when you have no Internet connectivity it won't work.
You can use some sort of TOTP PAM module and just have the Yubikey generate the TOTP code on the fly and does not require an...
Clearly you do dude.
Here's an Yubikey OTP string, cccccceihnvijtjfvrccfbrrtlbgufgiunuickurbkcd.
Here's an TOTP for application X, 972270.
Here's an TOTP for application Y, 699718.
Have at it.
Dude, just because you know what factors are used, doesn't mean you'll be able to use it. My Yubikey's keys cannot be read out of the device, once it's written... that's it. I don't even know my private SSH key. Hell I don't even know my first-factor passwords so good luck getting into that...
I use it for LastPass, it's my hardware SSH key, it's my U2F device, it's my everything really. I don't like relying on a 6 digit rolling code with a full computer attached to it that may have its own list of problems. There isn't a way to get around having a physical Yubikey device VS. a...
How can you hate tapatalk? It's a nice app that has all my forum sites in one place, easy to use app.
BTW I'm posting this from my phone since I just gave it a shot of removing both apps and installing the v5 app only and it just works (obviously). I figured that out when I just installed the...
Nope, still not working.
v5 app - Network error, please try again later
pro app - failed to connect to forum, please check with forum administrator if this problem persists
Sorry to beat the dead horse again but now neither the v5 app or the Pro versions will connect here. Did you install the plugin after you did the upgrade?
RIght but aren't hidden services running on a relay to begin with? It has to be connected to the network somehow?
Just found it... yep it's true. https://www.torproject.org/docs/tor-hidden-service.html.en - "Tor allows clients and relays to offer hidden services."
Uhh... did anyone forget about TOR DNS blacklists? All it takes is one provider to scan a block and they'll know.
dig 142.156.8.204.tor.dan.me.uk
-- and --
dig 142.156.8.204.tor.dan.me.uk txt
https://www.dan.me.uk/dnsbl
In fact, if providers signed up at Hetrix Tools, part of the DNSBL scan...