Search the Community
Showing results for tags 'ssh'.
Found 2 results
KRONOS Kronos (Originally Denarius Pi - dPi) is a AIO interface/wallet for Denarius. Kronos was originally built with the intention of running it and installing it on Raspberry Pi Ubuntu systems, but now can be used mostly for all Linux distros. It is recommended to have at least 2GB of RAM to install and run Kronos (It also runs a Denarius node). Features: Send and Receive D Denarius Addresses with P2PK and P2PKH scripthashed balances Import and Export Private Keys View Transactions Terminal (Access your terminal for advanced use or restarting your Denarius node manually) Generate Minikeys Convert Minkeys Encrypted Local LevelDB 24 Word Seed Phrases Block Explorer (View Addresses, Transactions, and Blocks) Stake your Denarius Monitor your configured FortunaStakes Verify Denarius Messages Sign Denarius Messages Backup Wallet Send Raw Transactions View Current OS Enviroment Statistics like CPU and Memory Usage Runs on local network by default, so great for running on a local Pi or Linux box and then accessing it from your phone or other computer, can also run it locally if viewing with a monitor on a Pi or Linux box. More Coming Soon How to Install: Run one of these commands depending on your flavor of Linux! wget -qO- https://raw.githubusercontent.com/carsenk/kronos/master/installkronos.sh | bash or curl -o- https://raw.githubusercontent.com/carsenk/kronos/master/installkronos.sh | bash Github: https://github.com/carsenk/kronos Screenshot of Kronos: Screenshots when this all started (dPi): More information and list of features will be coming soon! Stay tuned! It will be a one liner install script to run.
I am using a yubikey 5 for this and Manjaro KDE distro. Amazon has same day delivery https://amzn.to/338KYgF slightly different but basically the same as official arch install, except I took out assuming the -m and $MK PIV application's 24-byte management key part as it didn't work for me when generating the self signed certificate. https://wiki.archlinux.org/index.php/YubiKey#Using_a_YubiKey_with_SSH #install yubikey manager sudo pacman -S yubikey-manager yubikey-manager-qt #plug in yubikey and verify it can be seen ykman list #generate key ykman piv generate-key -a RSA2048 9a pubkey.pem #generate self signed certificate ykman piv generate-certificate -d 1826 -s "SSH Key" 9a pubkey.pem #install opensc package sudo pacman -S opensc #configure ssh to use opensc library nano ~/.ssh/config #enter single line below, save and exit PKCS11Provider /usr/lib/opensc-pkcs11.so #convert public-key to standard openssh format ssh-keygen -i -m PKCS8 -f pubkey.pem > pubkey.txt #cat pubkey.txt to see your public key. example can copy and paste the public key into scaleway credentials cat pubkey.txt #or another way to get the public key onto your server cat ~/pubkey.txt | ssh [email protected] 'cat >> .ssh/authorized_keys' now when you ssh into your server, plug in your yubikey and you will be asked for a pin at the login prompt example ssh [email protected] and you will now be prompted for the yubikey pin to access your server