We have been informed that our primary Phoenix-area venue (UAT) has suspending all gatherings until April at the earliest. Since we now lack a meeting location, and due to increasing pressure to practice “social distancing”, our events will be virtual until further notice.
The Calendar Page will always reflect the current meeting info. Please check that page for dates and times.
We will be hosting the events on our Big Blue Button server (https://bbb.azloco.net). At the designated meeting time, please visit that page and select a username. You must be using a modern browser to connect. If you have difficulty connecting, please contact us on Freenode.
If the BBB system is unable to handle the demand, we have established a Zoom Meeting room. We will enable this room only necessary.
We hope to see you there.
As of today, Ubuntu 18.10 (aka Cosmic Cuttlefish) has reached the end of its 9-month support lifespan. It will no longer be supported by package or security updates.
The supported upgrade path from Ubuntu 18.10 is via Ubuntu 19.04.
Instructions and caveats for the upgrade may be found at:
I’ve been using my Yubikey for years with Ubuntu SSO, as a 2-factor authentication device.
Recently, I started playing with some of its other capabilities. In particular, I became interested in the OpenPGP capabilities. I spent a couple hours working through this excellent guide on the subject.
The end result: I have a GPG key stored on my hardware key, in the device’s “secure element”. I can sign and decrypt messages/files when the key is inserted into my Ubuntu or Mac systems, and the private key is not stored on the system at all.
A brief summary of the process:
- Buy a Yubikey. If you want to carry it with you, don’t get the Nano–they’re easy to lose.
- Install scdaemon to your system. You will also need pinentry
- Generate the key. You can do on the Yubikey but I recommend doing it on an offline computer or live CD.
- BACK UP the private key offline. This is important, as the next step is destructive.
- Move the private key/subkeys to the Yubikey, one at a time. They will be removed from your keyring.
- Edit gpg-agent.conf and add “pinentry” as described.
- Edit gpg.conf and add “use-agent” as described.
- Optional: upload your public key to keyserver.ubuntu.com
To use the key on another system, you will need scdaemon and pinentry, along with the configuration files. I find that I need to import my public key for the system to recognize the private key on my Yubikey. Also, don’t lose your offline backup of your private key. Some functions (like adduid) apparently require you to re-import your private key to your keyring–and the private key cannot be exported from the Yubikey.
Finally, you can use your GPG key in your Yubikey as an SSH private key. See the steps in the guide on Github. If you have any questions, hit me up in #Ubuntu-US-AZ on Freenode.