<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-gb">
<link rel="self" type="application/atom+xml" href="https://forum.yubico.com/feed.php?f=23&amp;t=1143" />

<title>Yubico Forum</title>
<subtitle>...visit our web-store at</subtitle>
<link href="https://forum.yubico.com/index.php" />
<updated>2017-03-21T18:29:54+01:00</updated>

<author><name><![CDATA[Yubico Forum]]></name></author>
<id>https://forum.yubico.com/feed.php?f=23&amp;t=1143</id>
<entry>
<author><name><![CDATA[haukened]]></name></author>
<updated>2017-03-21T18:29:54+01:00</updated>
<published>2017-03-21T18:29:54+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9488#p9488</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9488#p9488"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9488#p9488"><![CDATA[
Hey guys,<br />If any of you are having issues getting this to work with the yubikey 4, i noticed on Linux Mint (so probably ubuntu too) that the yubikey now shows up as &quot;Yubico.com&quot; so you'll need to modify the /usr/local/bin/yubico script to grep for 'Yubico.com' not 'Yubikey'<br /><br />Cheers!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4745">haukened</a> — Tue Mar 21, 2017 6:29 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[lunika]]></name></author>
<updated>2017-03-04T22:16:00+01:00</updated>
<published>2017-03-04T22:16:00+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9443#p9443</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9443#p9443"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9443#p9443"><![CDATA[
Hi,<br /><br />I have this similar configuration, everything works fine except for the first time I login my machine, I can't use my yubikey but only the password.<br /><br />Do you have the same issue ? I used this guide <!-- m --><a class="postlink" href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">https://developers.yubico.com/yubico-pa ... ponse.html</a><!-- m --> and I set the mode as `sufficient` instead of `required`<br /><br />Thanks<br /><br /><div class="quotetitle">cecoates wrote:</div><div class="quotecontent"><br />I went for something slightly different for /etc/pam.d/common-auth, and thought it might help some other folks too (I commented out the defaults just in case I wanted to go back to them).<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">#<br /># /etc/pam.d/common-auth - authentication settings common to all services<br />#<br /># This file is included from other service-specific PAM config files,<br /># and should contain a list of the authentication modules that define<br /># the central authentication scheme for use on the system<br /># (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the<br /># traditional Unix authentication mechanisms.<br />#<br /># As of pam 1.0.1-6, this file is managed by pam-auth-update by default.<br /># To take advantage of this, it is recommended that you configure any<br /># local modules either before or after the default block, and use<br /># pam-auth-update to manage selection of other modules.  See<br /># pam-auth-update(8) for details.<br /><br /># here are the per-package modules (the &quot;Primary&quot; block)<br /># auth   &#91;success=1 default=ignore&#93;   pam_unix.so nullok_secure<br />auth  &#91;success=done new_authtok_reqd=done default=ignore&#93; pam_yubico.so mode=challenge-response<br />auth  sufficient      pam_unix.so nullok_secure try_first_pass<br /><br />auth  requisite       pam_deny.so<br />auth  required        pam_permit.so<br />auth  optional        pam_ecryptfs.so unwrap<br /><br /># here's the fallback if no module succeeds<br /># auth   requisite         pam_deny.so<br /><br /># prime the stack with a positive return value if there isn't one already;<br /># this avoids us returning an error just because nothing sets a success code<br /># since the modules above will each just jump around<br /># auth   required         pam_permit.so<br /><br /># and here are more per-package modules (the &quot;Additional&quot; block)<br /><br /># end of pam-auth-update config</div><br /><br />For my particular needs I went with &quot;sufficient&quot; for the challenge-response and password, instead of requiring just the Yubikey or both the Yubikey and the password. The reason being I wanted the option of using the Yubikey to speed things up, but being able to fallback to my password if need be. So if the challenge-response succeeds, the password isn't necessary (what I read to muddle through that: <!-- m --><a class="postlink" href="https://linux.die.net/man/5/pam.d">https://linux.die.net/man/5/pam.d</a><!-- m -->).<br /><br />You can also set it up to work with two different Yubikeys by running ykpamcfg -2 -v twice. I don't know for sure that you need to set them up with the same exact settings, but I was using the &quot;Program Multiple Yubikeys&quot; option to create a backup. So that may be something to keep in mind. <br /><br />I do know that even if you duplicate all the settings across two different Yubikeys, you still need to run ykpamcfg -2 -v again, and then you'll have two challenge files in your ~/.yubico/ directory. So do *not* assume that if you programmed multiple Yubikeys that both will be able to authenticate via the same ~/.yubico/ challenge file. The advice in the documentation to keep a root terminal open until you're absolutely sure it's working is very advisable.<br /><br />Interesting sidenote, if you have the above alternative setup, where either your password or your Yubikey can log you in, then all you need to do when the Yubikey is plugged in to unlock the screensaver is hit enter.<br /><br />However, the sudo vi /etc/udev/rules.d/85-yubikey.rules bit still confuses me. Where/how are people looking up what exact *.yubikey-rules to use for their system? I've seen FAQs and documentation that uses 69, 70, 85, 99... with no clear explanation of how anyone found out which one they're supposed to use/create. Is it related to your udev version? Your OS? Your Yubikey? All of the above?<br /></div><p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4716">lunika</a> — Sat Mar 04, 2017 10:16 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[BandonRandon]]></name></author>
<updated>2017-01-17T09:01:46+01:00</updated>
<published>2017-01-17T09:01:46+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9273#p9273</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9273#p9273"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9273#p9273"><![CDATA[
Quick note for those of you who are using an Ubuntu variant  (in my case Linux Mint 18) and using home folder encryption (note this is is in addition to home folder encryption). If you follow the steps in this guide you may not be able to log in at restart. This is because the home folder has not been decrypted yet. The solution is to follow the instructions here: <!-- m --><a class="postlink" href="https://developers.yubico.com/yubico-pam/Authentication_Using_Challenge-Response.html">https://developers.yubico.com/yubico-pa ... ponse.html</a><!-- m --><br /><br />In a nutshell:<br />1) Create a folder where you'd like to store your config file (anywhere outside of<strong> ~/username</strong> will work. <br />2) Set Permissions of that folder to be sticky <strong> chmod +t /path/to/folder</strong> and <strong>chmod 777 /path/to/folder</strong><br />3) Generate your key<strong> ykpamcfg -2 -v -p /path/to/folder</strong><br /><br />Next when you add the auth lines to the <strong>/etc/pam.d/common-auth</strong> make sure your challenge line looks like this:<br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">auth   required        pam_yubico.so mode=challenge-response chalresp_path=/path/to/folder</div><br />The difference between this and the original is we are defining <strong>chalresp_path </strong>with our path. <br /><br />That's it. I was banging my head against the wall and locked myself out of my computer a few times so thought I'd share.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4620">BandonRandon</a> — Tue Jan 17, 2017 9:01 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[cecoates]]></name></author>
<updated>2017-01-14T10:39:51+01:00</updated>
<published>2017-01-14T10:39:51+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9269#p9269</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9269#p9269"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=9269#p9269"><![CDATA[
I went for something slightly different for /etc/pam.d/common-auth, and thought it might help some other folks too (I commented out the defaults just in case I wanted to go back to them).<br /><br /><div class="codetitle"><b>Code:</b></div><div class="codecontent">#<br /># /etc/pam.d/common-auth - authentication settings common to all services<br />#<br /># This file is included from other service-specific PAM config files,<br /># and should contain a list of the authentication modules that define<br /># the central authentication scheme for use on the system<br /># (e.g., /etc/shadow, LDAP, Kerberos, etc.).  The default is to use the<br /># traditional Unix authentication mechanisms.<br />#<br /># As of pam 1.0.1-6, this file is managed by pam-auth-update by default.<br /># To take advantage of this, it is recommended that you configure any<br /># local modules either before or after the default block, and use<br /># pam-auth-update to manage selection of other modules.  See<br /># pam-auth-update(8) for details.<br /><br /># here are the per-package modules (the &quot;Primary&quot; block)<br /># auth   &#91;success=1 default=ignore&#93;   pam_unix.so nullok_secure<br />auth  &#91;success=done new_authtok_reqd=done default=ignore&#93; pam_yubico.so mode=challenge-response<br />auth  sufficient      pam_unix.so nullok_secure try_first_pass<br /><br />auth  requisite       pam_deny.so<br />auth  required        pam_permit.so<br />auth  optional        pam_ecryptfs.so unwrap<br /><br /># here's the fallback if no module succeeds<br /># auth   requisite         pam_deny.so<br /><br /># prime the stack with a positive return value if there isn't one already;<br /># this avoids us returning an error just because nothing sets a success code<br /># since the modules above will each just jump around<br /># auth   required         pam_permit.so<br /><br /># and here are more per-package modules (the &quot;Additional&quot; block)<br /><br /># end of pam-auth-update config</div><br /><br />For my particular needs I went with &quot;sufficient&quot; for the challenge-response and password, instead of requiring just the Yubikey or both the Yubikey and the password. The reason being I wanted the option of using the Yubikey to speed things up, but being able to fallback to my password if need be. So if the challenge-response succeeds, the password isn't necessary (what I read to muddle through that: <!-- m --><a class="postlink" href="https://linux.die.net/man/5/pam.d">https://linux.die.net/man/5/pam.d</a><!-- m -->).<br /><br />You can also set it up to work with two different Yubikeys by running ykpamcfg -2 -v twice. I don't know for sure that you need to set them up with the same exact settings, but I was using the &quot;Program Multiple Yubikeys&quot; option to create a backup. So that may be something to keep in mind. <br /><br />I do know that even if you duplicate all the settings across two different Yubikeys, you still need to run ykpamcfg -2 -v again, and then you'll have two challenge files in your ~/.yubico/ directory. So do *not* assume that if you programmed multiple Yubikeys that both will be able to authenticate via the same ~/.yubico/ challenge file. The advice in the documentation to keep a root terminal open until you're absolutely sure it's working is very advisable.<br /><br />Interesting sidenote, if you have the above alternative setup, where either your password or your Yubikey can log you in, then all you need to do when the Yubikey is plugged in to unlock the screensaver is hit enter.<br /><br />However, the sudo vi /etc/udev/rules.d/85-yubikey.rules bit still confuses me. Where/how are people looking up what exact *.yubikey-rules to use for their system? I've seen FAQs and documentation that uses 69, 70, 85, 99... with no clear explanation of how anyone found out which one they're supposed to use/create. Is it related to your udev version? Your OS? Your Yubikey? All of the above?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=4616">cecoates</a> — Sat Jan 14, 2017 10:39 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mfaine]]></name></author>
<updated>2015-05-20T03:14:01+01:00</updated>
<published>2015-05-20T03:14:01+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7338#p7338</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7338#p7338"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7338#p7338"><![CDATA[
Never mind.  I was able to switch my LUKS encryption to using yubikey-luks so I can use challenge response mode now.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1935">mfaine</a> — Wed May 20, 2015 3:14 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[henrik]]></name></author>
<updated>2015-05-13T11:42:01+01:00</updated>
<published>2015-05-13T11:42:01+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7315#p7315</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7315#p7315"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7315#p7315"><![CDATA[
I don't get it. Static password mode just types the password exactly like a keyboard would.<br /><br />Does the screensaver crash when the YubiKey types the password?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2968">henrik</a> — Wed May 13, 2015 11:42 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[mfaine]]></name></author>
<updated>2015-05-12T02:32:42+01:00</updated>
<published>2015-05-12T02:32:42+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7299#p7299</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7299#p7299"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=7299#p7299"><![CDATA[
Can anyone help me understand how to do this without using challenge response?  I need to use a static password.  I wouldn't mind using challenge response but I'm already using the second slot for static password that I use with the encrypted disk.  I've gotten it to work with lightdm-greeter, gnome-screensaver, the unity screensaver, and xscreensaver, but I can't get it to work with login.  It crashes every time.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=1935">mfaine</a> — Tue May 12, 2015 2:32 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Videl]]></name></author>
<updated>2014-04-22T16:23:01+01:00</updated>
<published>2014-04-22T16:23:01+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=5159#p5159</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=5159#p5159"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=5159#p5159"><![CDATA[
Hello guys, so I tried it and it worked perfectly until I restarted.<br />The error message was &quot;Insufficient permissions&quot; when authenticating with the Yubico key. I have an encrypted home partition, so I thought it was because of that but even when trying to log with root, I had the same error message.<br /><br />Any one have any idea?<br /><br />Thank you guys for the tutorial nonetheless, really handy. I will probably try it on other computers.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2884">Videl</a> — Tue Apr 22, 2014 4:23 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Aggraxis]]></name></author>
<updated>2014-03-22T04:54:58+01:00</updated>
<published>2014-03-22T04:54:58+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=5074#p5074</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=5074#p5074"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=5074#p5074"><![CDATA[
I just got my YubiKey a couple of days ago and came across this guide. I just wanted to pass on that I managed to pull this off (including the screen lock/unlock part). I have dabbled with Linux on and off over the years, so I'm not what you'd call an expert... just crazy enough to go poking until something breaks. <img src="https://forum.yubico.com/images/smilies/icon_e_smile.gif" alt=":)" title="Smile" /><br /><br />I followed these instructions to set up my ultrabook.  Everything works as described in this guide. Thank you guys very much for putting this info out there for us to find. I really appreciate the help.<br /><br />-Agg<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2852">Aggraxis</a> — Sat Mar 22, 2014 4:54 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[yubidoobydoo]]></name></author>
<updated>2014-01-07T01:18:10+01:00</updated>
<published>2014-01-07T01:18:10+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4772#p4772</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4772#p4772"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4772#p4772"><![CDATA[
<ul><li>Click settings</li><li>Enable USB Descriptor</li><li>Click Update Settings</li></ul><br />USB Descriptor.png<br /><ul><li>Select Configuration slot 2</li><li>Click update</li></ul>Update Settings.png<br /><br />Now follow the guide posted above.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2761">yubidoobydoo</a> — Tue Jan 07, 2014 1:18 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[yubidoobydoo]]></name></author>
<updated>2014-01-07T01:18:41+01:00</updated>
<published>2014-01-07T01:12:08+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4771#p4771</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4771#p4771"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4771#p4771"><![CDATA[
For those playing along at home, you need to enable USB Descriptor and HMAC-SHA1 Challenge-Response on Slot II.<br /><br />Screenshots from the <a href="http://www.yubico.com/products/services-software/personalization-tools/use/" class="postlink">yubikey personlisation tool</a><br /><br /><br /><ul><li>Select Challenge-Response tab</li><li>Select HMAC-SHA1</li></ul>Challenge Response.png<br /><ul><li>Select Configuration Slot 2</li><li>Click Generate</li><li>Click Write Configuration</li></ul>Program.png<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2761">yubidoobydoo</a> — Tue Jan 07, 2014 1:12 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Tom]]></name></author>
<updated>2013-11-28T09:12:05+01:00</updated>
<published>2013-11-28T09:12:05+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4671#p4671</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4671#p4671"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4671#p4671"><![CDATA[
Firmware version?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2195">Tom</a> — Thu Nov 28, 2013 9:12 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[PacoBell]]></name></author>
<updated>2013-11-28T07:24:59+01:00</updated>
<published>2013-11-28T07:24:59+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4670#p4670</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4670#p4670"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4670#p4670"><![CDATA[
Wait a sec, I can't seem to find the ID_SERIAL_SHORT after that command, either, and I don't know how to turn on the &quot;USB Descriptor serial # display&quot;. The closest I could find is &quot;ID_SERIAL=Yubico_Yubikey_NEO_OTP+CCID&quot;, but that's hardly unique. Is this a known issue with Neos?<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2619">PacoBell</a> — Thu Nov 28, 2013 7:24 am</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[wgwau]]></name></author>
<updated>2013-08-27T13:11:58+01:00</updated>
<published>2013-08-27T13:11:58+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4306#p4306</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4306#p4306"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4306#p4306"><![CDATA[
I've tried setting this up but whenever I run udev I can't get it to show ID_SERIAL_SHORT. I've turned on USB Descriptor serial # display, but nought. Can you advise?<br /><br />E: Nevermind, worked out the config wasn't saving automatically.<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2555">wgwau</a> — Tue Aug 27, 2013 1:11 pm</p><hr />
]]></content>
</entry>
<entry>
<author><name><![CDATA[Triqster]]></name></author>
<updated>2013-08-22T19:56:45+01:00</updated>
<published>2013-08-22T19:56:45+01:00</published>
<id>https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4295#p4295</id>
<link href="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4295#p4295"/>
<title type="html"><![CDATA[Re: [HOW TO] - [Linux / Debian ] Login, lock/unlock screensa]]></title>

<content type="html" xml:base="https://forum.yubico.com/viewtopic.php?t=1143&amp;p=4295#p4295"><![CDATA[
Posted in the wrong forum section, should be in:<br />Computer Logon - Windows | Linux | MacOS | freeBSD<br /><br />Can some mod please move it over there.<br /><br />Cheers in advance!<p>Statistics: Posted by <a href="https://forum.yubico.com/memberlist.php?mode=viewprofile&amp;u=2549">Triqster</a> — Thu Aug 22, 2013 7:56 pm</p><hr />
]]></content>
</entry>
</feed>