Skip to content

Instantly share code, notes, and snippets.

View azagramac's full-sized avatar
:octocat:
/home/$USER

Jose azagramac

:octocat:
/home/$USER
View GitHub Profile
@pomo-mondreganto
pomo-mondreganto / how-to.md
Created November 12, 2020 13:07
Wireguard installation for older kernels

First, try to install wireguard:

# this should fail with module compilation error
sudo apt update && sudo apt install -y wireguard wireguard-dkms wireguard-tools linux-headers-$(uname -r) build-essential

Then, go to /usr/src/wireguard-<version here> and comment out lines 96,97,99 in compat/compat.h to have

#!/bin/sh
echo "| Name | Partition | Size (kB) | Path | Type |"
echo "|------|-----------|-----------|------|------|"
for d in /dev/block/bootdevice/by-name/*; do
name=$(basename -- "$d")
device=$(basename "$(readlink -- "$d")")
read -r _ fsmount fstype _ <<EOF
@artizirk
artizirk / gnupg_scdaemon.md
Last active December 3, 2025 10:52
OpenPGP SSH access with Yubikey and GnuPG

NB: This document describles a 'Old-School' way of using Yubikey with SSH

Modern OpenSSH has native support for FIDO Authentication. Its much simpler and should also be more stable with less moving parts. OpenSSH also now has support for signing arbitary files witch can be used as replacement of gnupg. Git also supports signing commits/tags with ssh keys.

Pros of FIDO

  • Simpler stack / less moving parts
  • Works directly with ssh, ssh-add and ssh-keygen on most computers
  • Simpler
  • Private key can never leave the FIDO device

Cons of FIDO