>>107160372
the key has 2 slots where you can pot a long touch and a short touch action. one of the options is a 'static password' where it emulates a keyboard and types in a password (up to 38 characters) i think its designed for old/legacy shit or stuff that doesnt support any modern security standards.

but you could set up the LUKS so that you enter your password (say 10 character fairly standard pass) and then tap the yubikey and it enters the 38 remainint characters of your password. thats how i have it set up right now.

the challange-response is what i have on slot 1 where i tap the key to log in and to do sudo ... and that one doesnt exposes the actual cryptographic password which never leaves the yubikey itself it only uses it to encrypt ('sign') challanges from the computer.


im honestly not that worried about anyone snatching both my keys and pc. it would have to be a targeted attack/police raid or something and im just a normall ass user. what is more likely is i might lose the key, lose the laptop or have either stolen and this happened before (lost a laptop many years back) where the laptop had a 'normal' somewhat crackable password for the encryption. when i figure it out ill probably just set the LUKS/drive encryption to open like the regular challange-response authentication im using in the OS (fedora kde)