From ee9374041650ab72e9dd7eefb71a7a55485ca126 Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Sun, 27 Oct 2024 11:23:20 +0100 Subject: [PATCH 1/7] nitrokeys: remove redundancies; cleanups; feature-based structure --- source/_redirects/.htaccess | 180 +++++ source/_static/css/custom.css | 11 + source/components/fido2/2fa-nextcloud.rst | 7 - source/components/fido2/index.rst | 23 - .../components/fido2/linux/2fa-nextcloud.rst | 4 - source/components/fido2/linux/2fa-odoo.rst | 1 - .../fido2/linux/firmware-update.rst | 1 - source/components/fido2/linux/index.rst | 26 - source/components/fido2/linux/reset.rst | 1 - source/components/fido2/mac/2fa-nextcloud.rst | 4 - source/components/fido2/mac/2fa-odoo.rst | 1 - .../components/fido2/mac/firmware-update.rst | 1 - source/components/fido2/mac/index.rst | 13 - source/components/fido2/mac/reset.rst | 1 - .../fido2/shared/index-content2.rst.inc | 17 - .../fido2/windows/2fa-nextcloud.rst | 4 - source/components/fido2/windows/2fa-odoo.rst | 1 - .../fido2/windows/firmware-update.rst | 1 - .../images/enabling-u2f-on-firefox/1.png | Bin 11311 -> 0 bytes source/components/fido2/windows/index.rst | 13 - source/components/hsm/ipsec.rst.inc | 46 -- source/components/hsm/linux/apache2-tls.rst | 4 - .../hsm/linux/automatic-screen-lock.rst | 1 - .../hsm/linux/certificate-authority.rst | 1 - source/components/hsm/linux/gpa.rst | 1 - .../hsm/linux/hard-disk-encryption.rst | 1 - .../hsm/linux/import-keys-certs.rst | 4 - source/components/hsm/linux/index.rst | 30 - source/components/hsm/linux/ipsec.rst | 4 - .../components/hsm/linux/n-of-m-schemes.rst | 5 - source/components/hsm/linux/pkcs11-url.rst | 4 - source/components/hsm/linux/smime-outlook.rst | 1 - .../hsm/linux/smime-thunderbird.rst | 1 - source/components/hsm/linux/smime.rst | 1 - source/components/hsm/linux/stunnel.rst | 4 - source/components/hsm/mac/apache2-tls.rst | 4 - .../hsm/mac/certificate-authority.rst | 1 - source/components/hsm/mac/gpa.rst | 1 - .../hsm/mac/hard-disk-encryption.rst | 4 - .../components/hsm/mac/import-keys-certs.rst | 4 - source/components/hsm/mac/index.rst | 27 - source/components/hsm/mac/pkcs11-url.rst | 4 - source/components/hsm/mac/smime-outlook.rst | 1 - .../components/hsm/mac/smime-thunderbird.rst | 1 - source/components/hsm/mac/smime.rst | 1 - source/components/hsm/smime.rst.inc | 64 -- source/components/hsm/stunnel.rst.inc | 19 - source/components/hsm/windows/apache2-tls.rst | 4 - .../hsm/windows/certificate-authority.rst | 1 - source/components/hsm/windows/gpa.rst | 1 - .../hsm/windows/hard-disk-encryption.rst | 4 - .../hsm/windows/import-keys-certs.rst | 4 - source/components/hsm/windows/index.rst | 27 - source/components/hsm/windows/pkcs11-url.rst | 4 - .../components/hsm/windows/smart-policy.rst | 1 - .../components/hsm/windows/smime-outlook.rst | 1 - .../hsm/windows/smime-thunderbird.rst | 2 - source/components/hsm/windows/smime.rst | 8 - source/components/nitrokey3/index.rst | 35 - .../components/nitrokey3/linux/2fa-odoo.rst | 2 - source/components/nitrokey3/linux/adsk.rst | 1 - .../nitrokey3/linux/desktop-login.rst | 3 - .../nitrokey3/linux/firmware-update.rst | 16 - source/components/nitrokey3/linux/images | 1 - source/components/nitrokey3/linux/index.rst | 13 - .../components/nitrokey3/linux/keepassxc.rst | 2 - source/components/nitrokey3/linux/nitropy.rst | 1 - .../nitrokey3/linux/openpgp-keygen-backup.rst | 1 - .../nitrokey3/linux/openpgp-keygen-gpa.rst | 1 - .../linux/openpgp-keygen-on-device.rst | 1 - .../nitrokey3/linux/openpgp-outlook.rst | 1 - .../nitrokey3/linux/openpgp-thunderbird.rst | 1 - .../nitrokey3/linux/openpgp-uif.rst | 1 - source/components/nitrokey3/linux/openpgp.rst | 1 - source/components/nitrokey3/linux/reset.rst | 1 - .../components/nitrokey3/linux/set-pins.rst | 21 - .../nitrokey3/linux/smime-outlook.rst | 1 - .../nitrokey3/linux/smime-thunderbird.rst | 1 - source/components/nitrokey3/linux/smime.rst | 1 - .../nitrokey3/linux/troubleshooting.rst | 1 - source/components/nitrokey3/mac/2fa-odoo.rst | 2 - source/components/nitrokey3/mac/adsk.rst | 1 - .../nitrokey3/mac/firmware-update.rst | 1 - source/components/nitrokey3/mac/index.rst | 13 - source/components/nitrokey3/mac/keepassxc.rst | 2 - source/components/nitrokey3/mac/nitropy.rst | 1 - .../nitrokey3/mac/openpgp-keygen-backup.rst | 1 - .../nitrokey3/mac/openpgp-keygen-gpa.rst | 1 - .../mac/openpgp-keygen-on-device.rst | 1 - .../nitrokey3/mac/openpgp-outlook.rst | 1 - .../nitrokey3/mac/openpgp-thunderbird.rst | 1 - .../components/nitrokey3/mac/openpgp-uif.rst | 2 - source/components/nitrokey3/mac/openpgp.rst | 1 - source/components/nitrokey3/mac/reset.rst | 1 - source/components/nitrokey3/mac/set-pins.rst | 21 - .../nitrokey3/mac/smime-outlook.rst | 1 - .../nitrokey3/mac/smime-thunderbird.rst | 1 - source/components/nitrokey3/mac/smime.rst | 1 - .../nitrokey3/mac/troubleshooting.rst | 1 - .../nitrokey3/shared/openpgp.rst.inc | 10 - .../components/nitrokey3/windows/2fa-odoo.rst | 2 - source/components/nitrokey3/windows/adsk.rst | 1 - .../nitrokey3/windows/firmware-update.rst | 1 - .../windows/images/enabling-u2f-on-firefox | 1 - .../windows/images/passwordless-microsoft | 1 - source/components/nitrokey3/windows/index.rst | 14 - .../nitrokey3/windows/keepassxc.rst | 2 - .../nitrokey3/windows/openpgp-csp.rst | 2 - .../windows/openpgp-keygen-backup.rst | 1 - .../nitrokey3/windows/openpgp-keygen-gpa.rst | 1 - .../windows/openpgp-keygen-on-device.rst | 1 - .../nitrokey3/windows/openpgp-outlook.rst | 1 - .../nitrokey3/windows/openpgp-thunderbird.rst | 1 - .../nitrokey3/windows/openpgp-uif.rst | 1 - .../components/nitrokey3/windows/openpgp.rst | 1 - .../windows/passwordless-microsoft.rst | 4 - .../nitrokey3/windows/piv/index.rst | 22 - source/components/nitrokey3/windows/reset.rst | 1 - .../components/nitrokey3/windows/set-pins.rst | 24 - .../nitrokey3/windows/smime-outlook.rst | 1 - .../nitrokey3/windows/smime-thunderbird.rst | 1 - source/components/nitrokey3/windows/smime.rst | 9 - .../nitrokey3/windows/troubleshooting.rst | 1 - .../features/encrypted-storage/index.rst} | 29 +- .../images/passwordless-microsoft/1.png | Bin .../images/passwordless-microsoft/10.png | Bin .../images/passwordless-microsoft/11.png | Bin .../images/passwordless-microsoft/12.png | Bin .../images/passwordless-microsoft/2.png | Bin .../images/passwordless-microsoft/3.png | Bin .../images/passwordless-microsoft/4.png | Bin .../images/passwordless-microsoft/5.png | Bin .../images/passwordless-microsoft/6.png | Bin .../images/passwordless-microsoft/7.png | Bin .../images/passwordless-microsoft/8.png | Bin .../images/passwordless-microsoft/9.png | Bin .../nitrokeys/features/fido2/index.rst | 35 + .../nitrokeys/features/fido2/nextcloud.rst | 13 + .../fido2}/passwordless-microsoft.rst | 4 + .../nitrokeys/features/fido2/website.rst | 185 +++++ .../images/hidden}/format-dialog.png | Bin .../images/hidden}/format-tool.png | Bin .../images/hidden}/hidden-schema.svg | 0 .../hidden}/hidden-storage-partition.png | Bin .../hidden}/hidden-storage-passphrase.png | Bin .../images/hidden}/setup_hidden_volume.png | Bin .../features/hidden-storage/index.rst | 99 +++ .../features/hsm/apache2-tls.rst} | 6 +- .../features/hsm}/dnssec.rst | 4 + .../features/hsm/import-keys-certs.rst} | 4 + .../nitrokeys/features/hsm/index.rst | 44 ++ .../features}/hsm/n-of-m-schemes.rst | 7 + .../features/hsm/pkcs11-url.rst} | 6 +- .../components/nitrokeys/features/index.rst | 17 + .../features/misc}/automatic-screen-lock.rst | 25 + .../features/misc/ecc.rst} | 27 +- .../nitrokeys/features/misc/index.rst | 8 + .../openpgp-card/certificate-authority.rst} | 47 +- .../features/openpgp-card/change-pins.rst | 73 ++ .../desktop-login}/images/smart-policy/1.png | Bin .../desktop-login}/images/smart-policy/2.png | Bin .../desktop-login}/images/smart-policy/3.png | Bin .../desktop-login}/images/smart-policy/4.png | Bin .../desktop-login}/images/smart-policy/5.png | Bin .../desktop-login}/images/smart-policy/6.png | Bin .../openpgp-card/desktop-login/index.rst | 13 + .../openpgp-card/desktop-login/pam.rst} | 37 +- .../desktop-login/smart-policy.rst | 122 ++++ .../features/openpgp-card/eid.rst} | 43 +- .../fedora-gnupg-configuration.rst | 4 + .../features/openpgp-card}/gpa.rst | 43 +- .../images/luks}/luks_1.png | Bin .../images/luks}/luks_2.png | Bin .../images/luks}/luks_3.png | Bin .../images/luks}/luks_5.png | Bin .../images/luks}/luks_6.png | Bin .../images/luks}/luks_7.png | Bin .../hard-disk-encryption/index.rst} | 33 +- .../hard-disk-encryption/luks.rst} | 14 +- .../openpgp-card}/images/change-pins/1.png | Bin .../openpgp-card}/images/change-pins/2.png | Bin .../openpgp-card}/images/change-pins/3.png | Bin .../openpgp-card}/images/change-pins/4.png | Bin .../images/change-pins}/App-change-pin.png | Bin .../images/eidauthenticate/1.png | Bin .../images/eidauthenticate/2.png | Bin .../images/eidauthenticate/3.png | Bin .../images/eidauthenticate/4.png | Bin .../images/eidauthenticate/5.png | Bin .../images/eidauthenticate/6.png | Bin .../images/eidauthenticate/7.png | Bin .../images/eidauthenticate/8.png | Bin .../images/eidauthenticate/9.png | Bin .../openpgp-card/images/gpa-keygen}/1.png | Bin .../openpgp-card/images/gpa-keygen}/2.png | Bin .../openpgp-card/images/gpa-keygen}/3.png | Bin .../openpgp-card/images/gpa-keygen}/4.png | Bin .../openpgp-card/images/gpa-keygen}/5.png | Bin .../openpgp-card/images/gpa-keygen}/6.png | Bin .../openpgp-card/images/gpa-keygen}/7.png | Bin .../features/openpgp-card}/images/gpa/1.png | Bin .../features/openpgp-card}/images/gpa/2.png | Bin .../features/openpgp-card}/images/gpa/3.png | Bin .../features/openpgp-card}/images/gpa/4.png | Bin .../features/openpgp-card}/images/gpa/5.png | Bin .../features/openpgp-card}/images/gpa/6.png | Bin .../features/openpgp-card}/images/gpa/7.png | Bin .../features/openpgp-card}/images/gpa/8.png | Bin .../features/openpgp-card}/images/gpa/9.png | Bin .../openpgp-card}/images/openpgp-csp/1.png | Bin .../openpgp-card}/images/openpgp-csp/10.png | Bin .../openpgp-card}/images/openpgp-csp/11.png | Bin .../openpgp-card}/images/openpgp-csp/2.png | Bin .../openpgp-card}/images/openpgp-csp/3.png | Bin .../openpgp-card}/images/openpgp-csp/4.png | Bin .../openpgp-card}/images/openpgp-csp/5.png | Bin .../openpgp-card}/images/openpgp-csp/6.png | Bin .../openpgp-card}/images/openpgp-csp/7.png | Bin .../openpgp-card}/images/openpgp-csp/8.png | Bin .../openpgp-card}/images/openpgp-csp/9.png | Bin .../openpgp-card/images/outlook}/1.png | Bin .../openpgp-card/images/outlook}/2.png | Bin .../openpgp-card/images/outlook}/3.png | Bin .../openpgp-card/images/outlook}/4.png | Bin .../openpgp-card/images/thunderbird}/1.png | Bin .../openpgp-card/images/thunderbird}/10.png | Bin .../openpgp-card/images/thunderbird}/11.png | Bin .../openpgp-card/images/thunderbird}/12.png | Bin .../openpgp-card/images/thunderbird}/13.png | Bin .../openpgp-card/images/thunderbird}/14.png | Bin .../openpgp-card/images/thunderbird}/2.png | Bin .../openpgp-card/images/thunderbird}/3.png | Bin .../openpgp-card/images/thunderbird}/4.png | Bin .../openpgp-card/images/thunderbird}/5.png | Bin .../openpgp-card/images/thunderbird}/6.png | Bin .../openpgp-card/images/thunderbird}/7.png | Bin .../openpgp-card/images/thunderbird}/8.png | Bin .../openpgp-card/images/thunderbird}/9.png | Bin .../nitrokeys/features/openpgp-card/index.rst | 53 ++ .../nitrokeys/features/openpgp-card/ipsec.rst | 74 ++ .../features/openpgp-card}/openpgp-csp.rst | 26 +- .../openpgp-card/openpgp-keygen-backup.rst} | 18 +- .../openpgp-card/openpgp-keygen-gpa.rst} | 22 +- .../openpgp-keygen-on-device.rst} | 16 +- .../openpgp-card/openpgp-outlook.rst} | 12 +- .../openpgp-card/openpgp-thunderbird.rst} | 81 ++- .../openpgp-card/openvpn/easyrsa.rst} | 228 +++--- .../openvpn/images/viscosity}/viscosity-1.jpg | Bin .../openvpn/images/viscosity}/viscosity-2.jpg | Bin .../openvpn/images/viscosity}/viscosity-3.jpg | Bin .../openvpn/images/viscosity}/viscosity-4.jpg | Bin .../features/openpgp-card/openvpn/index.rst | 12 + .../openpgp-card/openvpn/viscosity.rst} | 12 +- .../features/openpgp-card/overview.rst | 87 +++ .../smime}/images/smime-outlook/1.png | Bin .../smime}/images/smime-outlook/2.png | Bin .../smime}/images/smime-outlook/3.png | Bin .../smime}/images/smime-thunderbird/1.png | Bin .../smime}/images/smime-thunderbird/2.png | Bin .../smime}/images/smime-thunderbird/3.png | Bin .../smime}/images/smime-thunderbird/4.png | Bin .../openpgp-card/smime}/images/smime/1.png | Bin .../features/openpgp-card/smime/index.rst} | 51 +- .../openpgp-card/smime/smime-outlook.rst} | 12 +- .../openpgp-card/smime/smime-thunderbird.rst} | 16 +- .../openpgp-card/ssh}/images/putty/1.png | Bin .../openpgp-card/ssh}/images/putty/2.png | Bin .../openpgp-card/ssh}/images/putty/3.png | Bin .../openpgp-card/ssh}/images/putty/4.png | Bin .../openpgp-card/ssh}/images/putty/5.png | Bin .../openpgp-card/ssh}/images/putty/6.png | Bin .../openpgp-card/ssh}/images/putty/7.png | Bin .../features/openpgp-card/ssh/index.rst} | 14 + .../features/openpgp-card/ssh/putty.rst} | 20 +- .../features/openpgp-card/stunnel.rst | 47 ++ .../features/openpgp-card/uif.rst} | 27 +- .../features/password-safe/index.rst | 32 + .../features}/piv/access_control.rst | 4 + .../features}/piv/certificate_management.rst | 8 +- .../features}/piv/factory_reset.rst | 6 +- .../client_logon_with_active_directory.rst | 10 +- .../features}/piv/guides/index.rst | 4 + .../nitrokeys/features/piv/index.rst | 46 ++ .../features}/piv/key_management.rst | 6 +- .../features/totp/general.rst} | 20 +- .../features/totp/google.rst} | 4 + .../features/totp/images/microsoft}/1.png | Bin .../features/totp/images/microsoft}/10.png | Bin .../features/totp/images/microsoft}/11.png | Bin .../features/totp/images/microsoft}/12.png | Bin .../features/totp/images/microsoft}/13.png | Bin .../features/totp/images/microsoft}/14.png | Bin .../features/totp/images/microsoft}/2.png | Bin .../features/totp/images/microsoft}/3.png | Bin .../features/totp/images/microsoft}/4.png | Bin .../features/totp/images/microsoft}/5.png | Bin .../features/totp/images/microsoft}/6.png | Bin .../features/totp/images/microsoft}/7.png | Bin .../features/totp/images/microsoft}/8.png | Bin .../features/totp/images/microsoft}/9.png | Bin .../features/totp/images/nextcloud}/1.png | Bin .../features/totp/images/nextcloud}/2.png | Bin .../features/totp/images/nextcloud}/3.png | Bin .../features/totp/images/nextcloud}/4.png | Bin .../features/totp/images/nextcloud}/5.png | Bin .../features/totp/images/nextcloud}/6.png | Bin .../features/totp/images/nextcloud}/7.png | Bin .../features/totp/images/nextcloud}/8.png | Bin .../features/totp/images/nextcloud}/9.png | Bin .../features/totp}/images/otp/1.png | Bin .../features/totp}/images/otp/2.png | Bin .../features/totp}/images/otp/3.png | Bin .../features/totp}/images/otp/4.png | Bin .../features/totp}/images/otp/5.png | Bin .../features/totp}/images/otp/6.png | Bin .../features/totp}/images/otp/7.png | Bin .../features/totp}/images/otp/8.png | Bin .../nitrokeys/features/totp/index.rst | 35 + .../features/totp/microsoft.rst} | 32 +- .../features/totp/nextcloud.rst} | 22 +- .../components/nitrokeys/features/u2f/2fa.rst | 36 + .../features/u2f}/desktop-login.rst | 18 +- .../u2f/images/desktop-login}/fidou2f-1.png | Bin .../u2f/images/desktop-login}/fidou2f-2.png | Bin .../u2f/images/desktop-login}/fidou2f-3.png | Bin .../u2f/images/desktop-login}/fidou2f-4.png | Bin .../u2f/images/desktop-login}/fidou2f-5.png | Bin .../images/desktop-login}/u2f-fido-pam-2.png | Bin .../nitrokeys/features/u2f/index.rst | 34 + .../features/u2f/odoo.rst} | 8 +- .../components/{ => nitrokeys}/fido2/faq.rst | 6 +- .../fido2/firmware-update.rst} | 1 - .../fido2/getting-started.rst} | 17 + source/components/nitrokeys/fido2/index.rst | 27 + .../windows => nitrokeys/fido2}/reset.rst | 20 +- source/components/{ => nitrokeys}/hsm/faq.rst | 6 +- .../nitrokeys/hsm/getting-started.rst | 40 ++ .../components/{ => nitrokeys}/hsm/index.rst | 12 +- source/components/nitrokeys/index.rst | 16 + .../nitrokey3/adsk.rst} | 6 +- .../{ => nitrokeys}/nitrokey3/faq.rst | 8 +- .../nitrokey3}/firmware-update-qubes.rst | 0 .../nitrokey3/firmware-update.rst} | 16 +- .../nitrokey3/getting-started.rst} | 3 + .../components/nitrokeys/nitrokey3/index.rst | 38 + .../nitrokey3}/nitropy.rst | 0 .../nitrokey3/overview.rst} | 26 +- .../nitrokey3/reset.rst} | 0 .../nitrokey3/set-pins.rst} | 4 +- .../nitrokey3/troubleshooting.rst} | 0 .../{nkpk => nitrokeys/passkey}/index.rst | 0 .../pro/factory-reset.rst} | 0 source/components/{ => nitrokeys}/pro/faq.rst | 8 +- .../pro/firmware-update.rst} | 36 +- .../nitrokeys/pro/getting-started.rst | 73 ++ source/components/nitrokeys/pro/index.rst | 32 + .../{ => nitrokeys}/start/factory-reset.rst | 2 +- .../components/{ => nitrokeys}/start/faq.rst | 8 +- .../start}/firmware-update.rst | 21 +- .../start/getting-started.rst} | 28 +- source/components/nitrokeys/start/index.rst | 27 + .../start/multiple-identities.rst} | 20 +- .../start/setting-kdf-do.rst} | 0 .../{ => nitrokeys}/storage/factory-reset.rst | 5 +- .../{ => nitrokeys}/storage/faq.rst | 8 +- .../storage/firmware-update-manually.rst | 28 +- .../nitrokeys/storage/firmware-update.rst | 104 +++ .../nitrokeys/storage/getting-started.rst | 78 ++ .../factory-reset-menu-item.png | Bin .../images/firmware-update-manually/1.png | Bin .../images/firmware-update-manually/10.png | Bin .../images/firmware-update-manually/11.png | Bin .../images/firmware-update-manually/12.png | Bin .../images/firmware-update-manually/13.png | Bin .../images/firmware-update-manually/2.png | Bin .../images/firmware-update-manually/3.png | Bin .../images/firmware-update-manually/4.png | Bin .../images/firmware-update-manually/5.png | Bin .../images/firmware-update-manually/6.png | Bin .../images/firmware-update-manually/7.png | Bin .../images/firmware-update-manually/8.png | Bin .../images/firmware-update-manually/9.png | Bin .../enable-firmware-update.png | Bin .../firmware-update}/nitrokey-update-tool.png | Bin .../getting-started}/Windows10-Systemtray.png | Bin source/components/nitrokeys/storage/index.rst | 32 + source/components/nitrokeys/u2f/index.rst | 8 + .../components/nitropad/qubes/change-pins.rst | 2 +- .../nitropad/ubuntu/change-pins.rst | 2 +- source/components/pro/2fa-odoo.rst.inc | 29 - source/components/pro/change-pins.rst.inc | 48 -- .../pro/hard-disk-encryption.rst.inc | 36 - source/components/pro/index.rst | 24 - source/components/pro/linux/2fa-google.rst | 1 - source/components/pro/linux/2fa-nextcloud.rst | 1 - source/components/pro/linux/2fa-odoo.rst | 1 - .../pro/linux/certificate-authority.rst | 1 - source/components/pro/linux/change-pins.rst | 1 - source/components/pro/linux/ecc.rst | 1 - source/components/pro/linux/factory-reset.rst | 1 - .../components/pro/linux/firmware-update.rst | 13 - source/components/pro/linux/gpa.rst | 1 - source/components/pro/linux/index.rst | 52 -- source/components/pro/linux/ipsec.rst | 4 - .../components/pro/linux/login-with-pam.rst | 4 - .../pro/linux/openpgp-keygen-backup.rst | 1 - .../pro/linux/openpgp-keygen-gpa.rst | 1 - .../pro/linux/openpgp-keygen-on-device.rst | 1 - .../components/pro/linux/openpgp-outlook.rst | 1 - .../pro/linux/openpgp-thunderbird.rst | 1 - source/components/pro/linux/openpgp.rst | 1 - source/components/pro/linux/otp.rst | 1 - source/components/pro/linux/smime-outlook.rst | 1 - .../pro/linux/smime-thunderbird.rst | 1 - source/components/pro/linux/smime.rst | 1 - source/components/pro/linux/ssh.rst | 4 - source/components/pro/linux/stunnel.rst | 4 - source/components/pro/mac/2fa-google.rst | 1 - source/components/pro/mac/2fa-nextcloud.rst | 1 - source/components/pro/mac/2fa-odoo.rst | 1 - source/components/pro/mac/change-pins.rst | 1 - source/components/pro/mac/ecc.rst | 1 - source/components/pro/mac/factory-reset.rst | 1 - source/components/pro/mac/firmware-update.rst | 1 - source/components/pro/mac/gpa.rst | 1 - .../pro/mac/hard-disk-encryption.rst | 4 - .../pro/mac/images/App-change-pin.png | Bin 21458 -> 0 bytes source/components/pro/mac/index.rst | 51 -- .../pro/mac/openpgp-keygen-backup.rst | 1 - .../components/pro/mac/openpgp-keygen-gpa.rst | 1 - .../pro/mac/openpgp-keygen-on-device.rst | 1 - source/components/pro/mac/openpgp-outlook.rst | 1 - .../pro/mac/openpgp-thunderbird.rst | 1 - source/components/pro/mac/openpgp.rst | 2 - source/components/pro/mac/otp.rst | 1 - source/components/pro/mac/smime-outlook.rst | 1 - .../components/pro/mac/smime-thunderbird.rst | 1 - source/components/pro/mac/smime.rst | 1 - source/components/pro/openpgp.rst.inc | 6 - source/components/pro/smart-policy.rst.inc | 97 --- source/components/pro/windows/2fa-google.rst | 1 - .../components/pro/windows/2fa-nextcloud.rst | 1 - source/components/pro/windows/2fa-odoo.rst | 1 - .../pro/windows/certificate-authority.rst | 1 - source/components/pro/windows/change-pins.rst | 1 - source/components/pro/windows/ecc.rst | 1 - .../pro/windows/eidauthenticate.rst | 1 - .../components/pro/windows/factory-reset.rst | 1 - .../pro/windows/firmware-update.rst | 1 - source/components/pro/windows/gpa.rst | 1 - .../pro/windows/hard-disk-encryption.rst | 4 - .../pro/windows/images/App-change-pin.png | Bin 21458 -> 0 bytes source/components/pro/windows/index.rst | 46 -- .../pro/windows/openpgp-keygen-backup.rst | 1 - .../pro/windows/openpgp-keygen-gpa.rst | 1 - .../pro/windows/openpgp-keygen-on-device.rst | 1 - .../pro/windows/openpgp-outlook.rst | 1 - .../pro/windows/openpgp-thunderbird.rst | 1 - source/components/pro/windows/openpgp.rst | 1 - .../pro/windows/openvpn-easyrsa.rst | 674 ----------------- source/components/pro/windows/otp.rst | 1 - source/components/pro/windows/putty.rst | 1 - .../components/pro/windows/smart-policy.rst | 1 - .../components/pro/windows/smime-outlook.rst | 1 - .../pro/windows/smime-thunderbird.rst | 1 - source/components/pro/windows/smime.rst | 9 - source/components/start/index.rst | 23 - .../components/start/linux/factory-reset.rst | 1 - source/components/start/linux/gpa.rst | 1 - source/components/start/linux/ipsec.rst | 4 - .../components/start/linux/login-with-pam.rst | 4 - .../start/linux/multiple-identities.rst | 1 - .../start/linux/openpgp-keygen-backup.rst | 1 - .../start/linux/openpgp-keygen-gpa.rst | 1 - .../start/linux/openpgp-keygen-on-device.rst | 1 - .../start/linux/openpgp-outlook.rst | 1 - .../start/linux/openpgp-thunderbird.rst | 1 - source/components/start/linux/openpgp.rst | 1 - .../components/start/linux/setting-kdf-do.rst | 1 - .../components/start/linux/smime-outlook.rst | 1 - .../start/linux/smime-thunderbird.rst | 1 - source/components/start/linux/smime.rst | 1 - source/components/start/linux/ssh.rst | 4 - source/components/start/linux/stunnel.rst | 4 - source/components/start/mac/factory-reset.rst | 1 - source/components/start/mac/gpa.rst | 1 - source/components/start/mac/index.rst | 58 -- .../start/mac/multiple-identities.rst | 1 - .../start/mac/openpgp-keygen-backup.rst | 1 - .../start/mac/openpgp-keygen-gpa.rst | 1 - .../start/mac/openpgp-keygen-on-device.rst | 1 - .../components/start/mac/openpgp-outlook.rst | 1 - .../start/mac/openpgp-thunderbird.rst | 1 - source/components/start/mac/openpgp.rst | 1 - .../components/start/mac/setting-kdf-do.rst | 1 - source/components/start/mac/smime-outlook.rst | 1 - .../start/mac/smime-thunderbird.rst | 1 - source/components/start/mac/smime.rst | 1 - .../start/windows/factory-reset.rst | 1 - source/components/start/windows/gpa.rst | 1 - source/components/start/windows/index.rst | 57 -- .../start/windows/multiple-identities.rst | 1 - .../start/windows/openpgp-keygen-backup.rst | 1 - .../start/windows/openpgp-keygen-gpa.rst | 1 - .../windows/openpgp-keygen-on-device.rst | 1 - .../start/windows/openpgp-outlook.rst | 1 - .../start/windows/openpgp-thunderbird.rst | 1 - source/components/start/windows/openpgp.rst | 1 - source/components/start/windows/putty.rst | 1 - .../start/windows/setting-kdf-do.rst | 1 - .../start/windows/smime-outlook.rst | 1 - .../start/windows/smime-thunderbird.rst | 1 - source/components/start/windows/smime.rst | 1 - source/components/storage/hidden.rst | 42 -- source/components/storage/index.rst | 23 - .../components/storage/linux/2fa-google.rst | 1 - .../storage/linux/2fa-nextcloud.rst | 1 - source/components/storage/linux/2fa-odoo.rst | 1 - .../storage/linux/automatic-screen-lock.rst | 1 - .../storage/linux/certificate-authority.rst | 1 - .../components/storage/linux/change-pins.rst | 1 - .../storage/linux/disk-encryption-luks.rst | 1 - source/components/storage/linux/ecc.rst | 1 - .../linux/encrypted-mobile-storage.rst | 4 - .../storage/linux/factory-reset.rst | 4 - .../linux/firmware-update-manually.rst | 4 - .../storage/linux/firmware-update.rst | 42 -- source/components/storage/linux/gpa.rst | 1 - .../storage/linux/hard-disk-encryption.rst | 1 - source/components/storage/linux/hidden.rst | 15 - source/components/storage/linux/index.rst | 49 -- source/components/storage/linux/ipsec.rst | 4 - .../storage/linux/login-with-pam.rst | 4 - .../storage/linux/openpgp-keygen-backup.rst | 1 - .../storage/linux/openpgp-keygen-gpa.rst | 1 - .../linux/openpgp-keygen-on-device.rst | 1 - .../storage/linux/openpgp-outlook.rst | 1 - .../storage/linux/openpgp-thunderbird.rst | 1 - source/components/storage/linux/openpgp.rst | 1 - .../storage/linux/openvpn-easyrsa.rst | 678 ------------------ source/components/storage/linux/otp.rst | 1 - .../storage/linux/smime-outlook.rst | 1 - .../storage/linux/smime-thunderbird.rst | 1 - source/components/storage/linux/smime.rst | 1 - source/components/storage/linux/ssh.rst | 4 - source/components/storage/linux/stunnel.rst | 4 - source/components/storage/mac/2fa-google.rst | 1 - .../components/storage/mac/2fa-nextcloud.rst | 1 - source/components/storage/mac/2fa-odoo.rst | 1 - source/components/storage/mac/change-pins.rst | 1 - source/components/storage/mac/ecc.rst | 1 - .../storage/mac/eidauthenticate.rst | 1 - .../storage/mac/encrypted-mobile-storage.rst | 4 - .../components/storage/mac/factory-reset.rst | 4 - .../storage/mac/firmware-update-manually.rst | 4 - .../storage/mac/firmware-update.rst | 1 - source/components/storage/mac/gpa.rst | 1 - .../storage/mac/hard-disk-encryption.rst | 4 - source/components/storage/mac/hidden.rst | 12 - source/components/storage/mac/index.rst | 52 -- .../storage/mac/openpgp-keygen-backup.rst | 1 - .../storage/mac/openpgp-keygen-gpa.rst | 1 - .../storage/mac/openpgp-keygen-on-device.rst | 1 - .../storage/mac/openpgp-outlook.rst | 1 - .../storage/mac/openpgp-thunderbird.rst | 1 - source/components/storage/mac/openpgp.rst | 1 - source/components/storage/mac/otp.rst | 1 - .../components/storage/mac/smime-outlook.rst | 1 - .../storage/mac/smime-thunderbird.rst | 1 - source/components/storage/mac/smime.rst | 1 - .../components/storage/windows/2fa-google.rst | 1 - .../storage/windows/2fa-microsoft.rst | 1 - .../storage/windows/2fa-nextcloud.rst | 1 - .../components/storage/windows/2fa-odoo.rst | 1 - .../storage/windows/change-pins.rst | 1 - source/components/storage/windows/ecc.rst | 1 - .../storage/windows/eidauthenticate.rst | 1 - .../windows/encrypted-mobile-storage.rst | 4 - .../storage/windows/factory-reset.rst | 4 - .../windows/firmware-update-manually.rst | 4 - .../storage/windows/firmware-update.rst | 44 -- source/components/storage/windows/gpa.rst | 1 - .../storage/windows/hard-disk-encryption.rst | 4 - source/components/storage/windows/hidden.rst | 19 - source/components/storage/windows/index.rst | 46 -- .../storage/windows/openpgp-csp.rst | 2 - .../storage/windows/openpgp-keygen-backup.rst | 1 - .../storage/windows/openpgp-keygen-gpa.rst | 1 - .../windows/openpgp-keygen-on-device.rst | 1 - .../storage/windows/openpgp-outlook.rst | 1 - .../storage/windows/openpgp-thunderbird.rst | 1 - source/components/storage/windows/openpgp.rst | 1 - source/components/storage/windows/otp.rst | 1 - source/components/storage/windows/putty.rst | 1 - .../storage/windows/smart-policy.rst | 1 - .../storage/windows/smime-outlook.rst | 1 - .../storage/windows/smime-thunderbird.rst | 1 - source/components/storage/windows/smime.rst | 9 - source/components/u2f/index.rst | 15 - source/components/u2f/linux/2fa-nextcloud.rst | 4 - source/components/u2f/linux/2fa-odoo.rst | 1 - source/components/u2f/linux/desktop-login.rst | 1 - source/components/u2f/linux/index.rst | 27 - source/components/u2f/mac/2fa-nextcloud.rst | 4 - source/components/u2f/mac/2fa-odoo.rst | 1 - source/components/u2f/mac/index.rst | 13 - .../components/u2f/shared/index-content1.rst | 25 - .../components/u2f/windows/2fa-nextcloud.rst | 4 - source/components/u2f/windows/2fa-odoo.rst | 1 - source/components/u2f/windows/index.rst | 16 - source/index.rst | 9 +- 611 files changed, 2618 insertions(+), 3748 deletions(-) delete mode 100644 source/components/fido2/2fa-nextcloud.rst delete mode 100644 source/components/fido2/index.rst delete mode 100644 source/components/fido2/linux/2fa-nextcloud.rst delete mode 100644 source/components/fido2/linux/2fa-odoo.rst delete mode 100644 source/components/fido2/linux/firmware-update.rst delete mode 100644 source/components/fido2/linux/index.rst delete mode 100644 source/components/fido2/linux/reset.rst delete mode 100644 source/components/fido2/mac/2fa-nextcloud.rst delete mode 100644 source/components/fido2/mac/2fa-odoo.rst delete mode 100644 source/components/fido2/mac/firmware-update.rst delete mode 100644 source/components/fido2/mac/index.rst delete mode 100644 source/components/fido2/mac/reset.rst delete mode 100644 source/components/fido2/shared/index-content2.rst.inc delete mode 100644 source/components/fido2/windows/2fa-nextcloud.rst delete mode 100644 source/components/fido2/windows/2fa-odoo.rst delete mode 100644 source/components/fido2/windows/firmware-update.rst delete mode 100644 source/components/fido2/windows/images/enabling-u2f-on-firefox/1.png delete mode 100644 source/components/fido2/windows/index.rst delete mode 100644 source/components/hsm/ipsec.rst.inc delete mode 100644 source/components/hsm/linux/apache2-tls.rst delete mode 100644 source/components/hsm/linux/automatic-screen-lock.rst delete mode 100644 source/components/hsm/linux/certificate-authority.rst delete mode 100644 source/components/hsm/linux/gpa.rst delete mode 100644 source/components/hsm/linux/hard-disk-encryption.rst delete mode 100644 source/components/hsm/linux/import-keys-certs.rst delete mode 100644 source/components/hsm/linux/index.rst delete mode 100644 source/components/hsm/linux/ipsec.rst delete mode 100644 source/components/hsm/linux/n-of-m-schemes.rst delete mode 100644 source/components/hsm/linux/pkcs11-url.rst delete mode 100644 source/components/hsm/linux/smime-outlook.rst delete mode 100644 source/components/hsm/linux/smime-thunderbird.rst delete mode 100644 source/components/hsm/linux/smime.rst delete mode 100644 source/components/hsm/linux/stunnel.rst delete mode 100644 source/components/hsm/mac/apache2-tls.rst delete mode 100644 source/components/hsm/mac/certificate-authority.rst delete mode 100644 source/components/hsm/mac/gpa.rst delete mode 100644 source/components/hsm/mac/hard-disk-encryption.rst delete mode 100644 source/components/hsm/mac/import-keys-certs.rst delete mode 100644 source/components/hsm/mac/index.rst delete mode 100644 source/components/hsm/mac/pkcs11-url.rst delete mode 100644 source/components/hsm/mac/smime-outlook.rst delete mode 100644 source/components/hsm/mac/smime-thunderbird.rst delete mode 100644 source/components/hsm/mac/smime.rst delete mode 100644 source/components/hsm/smime.rst.inc delete mode 100644 source/components/hsm/stunnel.rst.inc delete mode 100644 source/components/hsm/windows/apache2-tls.rst delete mode 100644 source/components/hsm/windows/certificate-authority.rst delete mode 100644 source/components/hsm/windows/gpa.rst delete mode 100644 source/components/hsm/windows/hard-disk-encryption.rst delete mode 100644 source/components/hsm/windows/import-keys-certs.rst delete mode 100644 source/components/hsm/windows/index.rst delete mode 100644 source/components/hsm/windows/pkcs11-url.rst delete mode 100644 source/components/hsm/windows/smart-policy.rst delete mode 100644 source/components/hsm/windows/smime-outlook.rst delete mode 100644 source/components/hsm/windows/smime-thunderbird.rst delete mode 100644 source/components/hsm/windows/smime.rst delete mode 100644 source/components/nitrokey3/index.rst delete mode 100644 source/components/nitrokey3/linux/2fa-odoo.rst delete mode 100644 source/components/nitrokey3/linux/adsk.rst delete mode 100644 source/components/nitrokey3/linux/desktop-login.rst delete mode 100644 source/components/nitrokey3/linux/firmware-update.rst delete mode 120000 source/components/nitrokey3/linux/images delete mode 100644 source/components/nitrokey3/linux/index.rst delete mode 100644 source/components/nitrokey3/linux/keepassxc.rst delete mode 100644 source/components/nitrokey3/linux/nitropy.rst delete mode 100644 source/components/nitrokey3/linux/openpgp-keygen-backup.rst delete mode 100644 source/components/nitrokey3/linux/openpgp-keygen-gpa.rst delete mode 100644 source/components/nitrokey3/linux/openpgp-keygen-on-device.rst delete mode 100644 source/components/nitrokey3/linux/openpgp-outlook.rst delete mode 100644 source/components/nitrokey3/linux/openpgp-thunderbird.rst delete mode 100644 source/components/nitrokey3/linux/openpgp-uif.rst delete mode 100644 source/components/nitrokey3/linux/openpgp.rst delete mode 100644 source/components/nitrokey3/linux/reset.rst delete mode 100644 source/components/nitrokey3/linux/set-pins.rst delete mode 100644 source/components/nitrokey3/linux/smime-outlook.rst delete mode 100644 source/components/nitrokey3/linux/smime-thunderbird.rst delete mode 100644 source/components/nitrokey3/linux/smime.rst delete mode 100644 source/components/nitrokey3/linux/troubleshooting.rst delete mode 100644 source/components/nitrokey3/mac/2fa-odoo.rst delete mode 100644 source/components/nitrokey3/mac/adsk.rst delete mode 100644 source/components/nitrokey3/mac/firmware-update.rst delete mode 100644 source/components/nitrokey3/mac/index.rst delete mode 100644 source/components/nitrokey3/mac/keepassxc.rst delete mode 100644 source/components/nitrokey3/mac/nitropy.rst delete mode 100644 source/components/nitrokey3/mac/openpgp-keygen-backup.rst delete mode 100644 source/components/nitrokey3/mac/openpgp-keygen-gpa.rst delete mode 100644 source/components/nitrokey3/mac/openpgp-keygen-on-device.rst delete mode 100644 source/components/nitrokey3/mac/openpgp-outlook.rst delete mode 100644 source/components/nitrokey3/mac/openpgp-thunderbird.rst delete mode 100644 source/components/nitrokey3/mac/openpgp-uif.rst delete mode 100644 source/components/nitrokey3/mac/openpgp.rst delete mode 100644 source/components/nitrokey3/mac/reset.rst delete mode 100644 source/components/nitrokey3/mac/set-pins.rst delete mode 100644 source/components/nitrokey3/mac/smime-outlook.rst delete mode 100644 source/components/nitrokey3/mac/smime-thunderbird.rst delete mode 100644 source/components/nitrokey3/mac/smime.rst delete mode 100644 source/components/nitrokey3/mac/troubleshooting.rst delete mode 100644 source/components/nitrokey3/shared/openpgp.rst.inc delete mode 100644 source/components/nitrokey3/windows/2fa-odoo.rst delete mode 100644 source/components/nitrokey3/windows/adsk.rst delete mode 100644 source/components/nitrokey3/windows/firmware-update.rst delete mode 120000 source/components/nitrokey3/windows/images/enabling-u2f-on-firefox delete mode 120000 source/components/nitrokey3/windows/images/passwordless-microsoft delete mode 100644 source/components/nitrokey3/windows/index.rst delete mode 100644 source/components/nitrokey3/windows/keepassxc.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-csp.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-keygen-backup.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-keygen-gpa.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-keygen-on-device.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-outlook.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-thunderbird.rst delete mode 100644 source/components/nitrokey3/windows/openpgp-uif.rst delete mode 100644 source/components/nitrokey3/windows/openpgp.rst delete mode 100644 source/components/nitrokey3/windows/passwordless-microsoft.rst delete mode 100644 source/components/nitrokey3/windows/piv/index.rst delete mode 100644 source/components/nitrokey3/windows/reset.rst delete mode 100644 source/components/nitrokey3/windows/set-pins.rst delete mode 100644 source/components/nitrokey3/windows/smime-outlook.rst delete mode 100644 source/components/nitrokey3/windows/smime-thunderbird.rst delete mode 100644 source/components/nitrokey3/windows/smime.rst delete mode 100644 source/components/nitrokey3/windows/troubleshooting.rst rename source/components/{storage/encrypted-mobile-storage.rst => nitrokeys/features/encrypted-storage/index.rst} (57%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/1.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/10.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/11.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/12.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/2.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/3.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/4.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/5.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/6.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/7.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/8.png (100%) rename source/components/{fido2/windows => nitrokeys/features/fido2}/images/passwordless-microsoft/9.png (100%) create mode 100644 source/components/nitrokeys/features/fido2/index.rst create mode 100644 source/components/nitrokeys/features/fido2/nextcloud.rst rename source/components/{fido2/windows => nitrokeys/features/fido2}/passwordless-microsoft.rst (96%) create mode 100644 source/components/nitrokeys/features/fido2/website.rst rename source/components/{storage/windows/images => nitrokeys/features/hidden-storage/images/hidden}/format-dialog.png (100%) rename source/components/{storage/windows/images => nitrokeys/features/hidden-storage/images/hidden}/format-tool.png (100%) rename source/components/{storage/images => nitrokeys/features/hidden-storage/images/hidden}/hidden-schema.svg (100%) rename source/components/{storage/linux/images => nitrokeys/features/hidden-storage/images/hidden}/hidden-storage-partition.png (100%) rename source/components/{storage/images => nitrokeys/features/hidden-storage/images/hidden}/hidden-storage-passphrase.png (100%) rename source/components/{storage/images => nitrokeys/features/hidden-storage/images/hidden}/setup_hidden_volume.png (100%) create mode 100644 source/components/nitrokeys/features/hidden-storage/index.rst rename source/components/{hsm/apache2-tls.rst.inc => nitrokeys/features/hsm/apache2-tls.rst} (97%) rename source/components/{hsm/linux => nitrokeys/features/hsm}/dnssec.rst (89%) rename source/components/{hsm/import-keys-certs.rst.inc => nitrokeys/features/hsm/import-keys-certs.rst} (97%) create mode 100644 source/components/nitrokeys/features/hsm/index.rst rename source/components/{ => nitrokeys/features}/hsm/n-of-m-schemes.rst (94%) rename source/components/{hsm/pkcs11-url.rst.inc => nitrokeys/features/hsm/pkcs11-url.rst} (95%) create mode 100644 source/components/nitrokeys/features/index.rst rename source/components/{pro/linux => nitrokeys/features/misc}/automatic-screen-lock.rst (76%) rename source/components/{pro/ecc.rst.inc => nitrokeys/features/misc/ecc.rst} (91%) create mode 100644 source/components/nitrokeys/features/misc/index.rst rename source/components/{hsm/certificate-authority.rst.inc => nitrokeys/features/openpgp-card/certificate-authority.rst} (97%) create mode 100644 source/components/nitrokeys/features/openpgp-card/change-pins.rst rename source/components/{pro => nitrokeys/features/openpgp-card/desktop-login}/images/smart-policy/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/desktop-login}/images/smart-policy/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/desktop-login}/images/smart-policy/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/desktop-login}/images/smart-policy/4.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/desktop-login}/images/smart-policy/5.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/desktop-login}/images/smart-policy/6.png (100%) create mode 100644 source/components/nitrokeys/features/openpgp-card/desktop-login/index.rst rename source/components/{pro/login-with-pam.rst.inc => nitrokeys/features/openpgp-card/desktop-login/pam.rst} (61%) create mode 100644 source/components/nitrokeys/features/openpgp-card/desktop-login/smart-policy.rst rename source/components/{pro/eidauthenticate.rst.inc => nitrokeys/features/openpgp-card/eid.rst} (67%) rename source/components/{nitrokey3/linux => nitrokeys/features/openpgp-card}/fedora-gnupg-configuration.rst (97%) rename source/components/{pro => nitrokeys/features/openpgp-card}/gpa.rst (68%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks}/luks_1.png (100%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks}/luks_2.png (100%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks}/luks_3.png (100%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks}/luks_5.png (100%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks}/luks_6.png (100%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks}/luks_7.png (100%) rename source/components/{pro/linux/hard-disk-encryption.rst => nitrokeys/features/openpgp-card/hard-disk-encryption/index.rst} (86%) rename source/components/{pro/linux/disk-encryption-luks.rst => nitrokeys/features/openpgp-card/hard-disk-encryption/luks.rst} (96%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/change-pins/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/change-pins/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/change-pins/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/change-pins/4.png (100%) rename source/components/{pro/linux/images => nitrokeys/features/openpgp-card/images/change-pins}/App-change-pin.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/4.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/5.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/6.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/7.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/8.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/eidauthenticate/9.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/1.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/2.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/3.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/4.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/5.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/6.png (100%) rename source/components/{pro/images/openpgp-keygen-gpa => nitrokeys/features/openpgp-card/images/gpa-keygen}/7.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/4.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/5.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/6.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/7.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/8.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card}/images/gpa/9.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/1.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/10.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/11.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/2.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/3.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/4.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/5.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/6.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/7.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/8.png (100%) rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/images/openpgp-csp/9.png (100%) rename source/components/{pro/windows/images/openpgp-outlook => nitrokeys/features/openpgp-card/images/outlook}/1.png (100%) rename source/components/{pro/windows/images/openpgp-outlook => nitrokeys/features/openpgp-card/images/outlook}/2.png (100%) rename source/components/{pro/windows/images/openpgp-outlook => nitrokeys/features/openpgp-card/images/outlook}/3.png (100%) rename source/components/{pro/windows/images/openpgp-outlook => nitrokeys/features/openpgp-card/images/outlook}/4.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/1.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/10.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/11.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/12.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/13.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/14.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/2.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/3.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/4.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/5.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/6.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/7.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/8.png (100%) rename source/components/{pro/images/openpgp-thunderbird => nitrokeys/features/openpgp-card/images/thunderbird}/9.png (100%) create mode 100644 source/components/nitrokeys/features/openpgp-card/index.rst create mode 100644 source/components/nitrokeys/features/openpgp-card/ipsec.rst rename source/components/{pro/windows => nitrokeys/features/openpgp-card}/openpgp-csp.rst (81%) rename source/components/{pro/openpgp-keygen-backup.rst.inc => nitrokeys/features/openpgp-card/openpgp-keygen-backup.rst} (98%) rename source/components/{pro/openpgp-keygen-gpa.rst.inc => nitrokeys/features/openpgp-card/openpgp-keygen-gpa.rst} (84%) rename source/components/{pro/openpgp-keygen-on-device.rst.inc => nitrokeys/features/openpgp-card/openpgp-keygen-on-device.rst} (98%) rename source/components/{pro/openpgp-outlook.rst.inc => nitrokeys/features/openpgp-card/openpgp-outlook.rst} (81%) rename source/components/{pro/openpgp-thunderbird.rst.inc => nitrokeys/features/openpgp-card/openpgp-thunderbird.rst} (71%) rename source/components/{pro/linux/openvpn-easyrsa.rst => nitrokeys/features/openpgp-card/openvpn/easyrsa.rst} (74%) rename source/components/{pro/windows/images/openvpn-viscosity => nitrokeys/features/openpgp-card/openvpn/images/viscosity}/viscosity-1.jpg (100%) rename source/components/{pro/windows/images/openvpn-viscosity => nitrokeys/features/openpgp-card/openvpn/images/viscosity}/viscosity-2.jpg (100%) rename source/components/{pro/windows/images/openvpn-viscosity => nitrokeys/features/openpgp-card/openvpn/images/viscosity}/viscosity-3.jpg (100%) rename source/components/{pro/windows/images/openvpn-viscosity => nitrokeys/features/openpgp-card/openvpn/images/viscosity}/viscosity-4.jpg (100%) create mode 100644 source/components/nitrokeys/features/openpgp-card/openvpn/index.rst rename source/components/{pro/windows/openvpn-viscosity.rst => nitrokeys/features/openpgp-card/openvpn/viscosity.rst} (93%) create mode 100644 source/components/nitrokeys/features/openpgp-card/overview.rst rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-outlook/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-outlook/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-outlook/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-thunderbird/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-thunderbird/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-thunderbird/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime-thunderbird/4.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/smime}/images/smime/1.png (100%) rename source/components/{pro/smime.rst.inc => nitrokeys/features/openpgp-card/smime/index.rst} (60%) rename source/components/{pro/smime-outlook.rst.inc => nitrokeys/features/openpgp-card/smime/smime-outlook.rst} (86%) rename source/components/{pro/smime-thunderbird.rst.inc => nitrokeys/features/openpgp-card/smime/smime-thunderbird.rst} (78%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/1.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/2.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/3.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/4.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/5.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/6.png (100%) rename source/components/{pro => nitrokeys/features/openpgp-card/ssh}/images/putty/7.png (100%) rename source/components/{pro/ssh.rst => nitrokeys/features/openpgp-card/ssh/index.rst} (93%) rename source/components/{pro/putty.rst.inc => nitrokeys/features/openpgp-card/ssh/putty.rst} (83%) create mode 100644 source/components/nitrokeys/features/openpgp-card/stunnel.rst rename source/components/{nitrokey3/shared/openpgp-uif.rst.inc => nitrokeys/features/openpgp-card/uif.rst} (55%) create mode 100644 source/components/nitrokeys/features/password-safe/index.rst rename source/components/{nitrokey3/windows => nitrokeys/features}/piv/access_control.rst (97%) rename source/components/{nitrokey3/windows => nitrokeys/features}/piv/certificate_management.rst (86%) rename source/components/{nitrokey3/windows => nitrokeys/features}/piv/factory_reset.rst (80%) rename source/components/{nitrokey3/windows => nitrokeys/features}/piv/guides/client_logon_with_active_directory.rst (98%) rename source/components/{nitrokey3/windows => nitrokeys/features}/piv/guides/index.rst (53%) create mode 100644 source/components/nitrokeys/features/piv/index.rst rename source/components/{nitrokey3/windows => nitrokeys/features}/piv/key_management.rst (97%) rename source/components/{pro/otp.rst.inc => nitrokeys/features/totp/general.rst} (88%) rename source/components/{pro/2fa-google.rst.inc => nitrokeys/features/totp/google.rst} (94%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/1.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/10.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/11.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/12.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/13.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/14.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/2.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/3.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/4.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/5.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/6.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/7.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/8.png (100%) rename source/components/{pro/windows/images/2fa-microsoft => nitrokeys/features/totp/images/microsoft}/9.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/1.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/2.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/3.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/4.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/5.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/6.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/7.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/8.png (100%) rename source/components/{pro/images/2fa-nextcloud => nitrokeys/features/totp/images/nextcloud}/9.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/1.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/2.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/3.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/4.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/5.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/6.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/7.png (100%) rename source/components/{pro => nitrokeys/features/totp}/images/otp/8.png (100%) create mode 100644 source/components/nitrokeys/features/totp/index.rst rename source/components/{pro/windows/2fa-microsoft.rst => nitrokeys/features/totp/microsoft.rst} (53%) rename source/components/{pro/2fa-nextcloud.rst.inc => nitrokeys/features/totp/nextcloud.rst} (71%) create mode 100644 source/components/nitrokeys/features/u2f/2fa.rst rename source/components/{fido2/linux => nitrokeys/features/u2f}/desktop-login.rst (95%) rename source/components/{fido2/linux/images => nitrokeys/features/u2f/images/desktop-login}/fidou2f-1.png (100%) rename source/components/{fido2/linux/images => nitrokeys/features/u2f/images/desktop-login}/fidou2f-2.png (100%) rename source/components/{fido2/linux/images => nitrokeys/features/u2f/images/desktop-login}/fidou2f-3.png (100%) rename source/components/{fido2/linux/images => nitrokeys/features/u2f/images/desktop-login}/fidou2f-4.png (100%) rename source/components/{fido2/linux/images => nitrokeys/features/u2f/images/desktop-login}/fidou2f-5.png (100%) rename source/components/{fido2/linux/images => nitrokeys/features/u2f/images/desktop-login}/u2f-fido-pam-2.png (100%) create mode 100644 source/components/nitrokeys/features/u2f/index.rst rename source/components/{fido2/2fa-odoo.rst.inc => nitrokeys/features/u2f/odoo.rst} (88%) rename source/components/{ => nitrokeys}/fido2/faq.rst (86%) rename source/components/{fido2/shared/firmware-update.rst.inc => nitrokeys/fido2/firmware-update.rst} (93%) rename source/components/{fido2/shared/index-content1.rst.inc => nitrokeys/fido2/getting-started.rst} (94%) create mode 100644 source/components/nitrokeys/fido2/index.rst rename source/components/{fido2/windows => nitrokeys/fido2}/reset.rst (67%) rename source/components/{ => nitrokeys}/hsm/faq.rst (97%) create mode 100644 source/components/nitrokeys/hsm/getting-started.rst rename source/components/{ => nitrokeys}/hsm/index.rst (50%) create mode 100644 source/components/nitrokeys/index.rst rename source/components/{nitrokey3/adsk.rst.inc => nitrokeys/nitrokey3/adsk.rst} (97%) rename source/components/{ => nitrokeys}/nitrokey3/faq.rst (94%) rename source/components/{nitrokey3/linux => nitrokeys/nitrokey3}/firmware-update-qubes.rst (100%) rename source/components/{nitrokey3/firmware-update.rst.inc => nitrokeys/nitrokey3/firmware-update.rst} (84%) rename source/components/{nitrokey3/shared/main.rst => nitrokeys/nitrokey3/getting-started.rst} (97%) create mode 100644 source/components/nitrokeys/nitrokey3/index.rst rename source/components/{nitrokey3/shared => nitrokeys/nitrokey3}/nitropy.rst (100%) rename source/components/{nitrokey3/features.rst => nitrokeys/nitrokey3/overview.rst} (78%) rename source/components/{nitrokey3/shared/reset.rst.inc => nitrokeys/nitrokey3/reset.rst} (100%) rename source/components/{nitrokey3/shared/set-pins.rst.inc => nitrokeys/nitrokey3/set-pins.rst} (98%) rename source/components/{nitrokey3/troubleshooting.rst.inc => nitrokeys/nitrokey3/troubleshooting.rst} (100%) rename source/components/{nkpk => nitrokeys/passkey}/index.rst (100%) rename source/components/{pro/factory-reset.rst.inc => nitrokeys/pro/factory-reset.rst} (100%) rename source/components/{ => nitrokeys}/pro/faq.rst (94%) rename source/components/{pro/firmware-update.rst.inc => nitrokeys/pro/firmware-update.rst} (58%) create mode 100644 source/components/nitrokeys/pro/getting-started.rst create mode 100644 source/components/nitrokeys/pro/index.rst rename source/components/{ => nitrokeys}/start/factory-reset.rst (97%) rename source/components/{ => nitrokeys}/start/faq.rst (87%) rename source/components/{start/linux => nitrokeys/start}/firmware-update.rst (83%) rename source/components/{start/linux/index.rst => nitrokeys/start/getting-started.rst} (80%) create mode 100644 source/components/nitrokeys/start/index.rst rename source/components/{start/multiple-identities.rst.inc => nitrokeys/start/multiple-identities.rst} (79%) rename source/components/{start/setting-kdf-do.rst.inc => nitrokeys/start/setting-kdf-do.rst} (100%) rename source/components/{ => nitrokeys}/storage/factory-reset.rst (95%) rename source/components/{ => nitrokeys}/storage/faq.rst (97%) rename source/components/{ => nitrokeys}/storage/firmware-update-manually.rst (79%) create mode 100644 source/components/nitrokeys/storage/firmware-update.rst create mode 100644 source/components/nitrokeys/storage/getting-started.rst rename source/components/{storage/images => nitrokeys/storage/images/factory-reset}/factory-reset-menu-item.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/1.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/10.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/11.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/12.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/13.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/2.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/3.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/4.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/5.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/6.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/7.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/8.png (100%) rename source/components/{ => nitrokeys}/storage/images/firmware-update-manually/9.png (100%) rename source/components/{storage/images => nitrokeys/storage/images/firmware-update}/enable-firmware-update.png (100%) rename source/components/{storage/windows/images => nitrokeys/storage/images/firmware-update}/nitrokey-update-tool.png (100%) rename source/components/{storage/windows/images => nitrokeys/storage/images/getting-started}/Windows10-Systemtray.png (100%) create mode 100644 source/components/nitrokeys/storage/index.rst create mode 100644 source/components/nitrokeys/u2f/index.rst delete mode 100644 source/components/pro/2fa-odoo.rst.inc delete mode 100644 source/components/pro/change-pins.rst.inc delete mode 100644 source/components/pro/hard-disk-encryption.rst.inc delete mode 100644 source/components/pro/index.rst delete mode 100644 source/components/pro/linux/2fa-google.rst delete mode 100644 source/components/pro/linux/2fa-nextcloud.rst delete mode 100644 source/components/pro/linux/2fa-odoo.rst delete mode 100644 source/components/pro/linux/certificate-authority.rst delete mode 100644 source/components/pro/linux/change-pins.rst delete mode 100644 source/components/pro/linux/ecc.rst delete mode 100644 source/components/pro/linux/factory-reset.rst delete mode 100644 source/components/pro/linux/firmware-update.rst delete mode 100644 source/components/pro/linux/gpa.rst delete mode 100644 source/components/pro/linux/index.rst delete mode 100644 source/components/pro/linux/ipsec.rst delete mode 100644 source/components/pro/linux/login-with-pam.rst delete mode 100644 source/components/pro/linux/openpgp-keygen-backup.rst delete mode 100644 source/components/pro/linux/openpgp-keygen-gpa.rst delete mode 100644 source/components/pro/linux/openpgp-keygen-on-device.rst delete mode 100644 source/components/pro/linux/openpgp-outlook.rst delete mode 100644 source/components/pro/linux/openpgp-thunderbird.rst delete mode 100644 source/components/pro/linux/openpgp.rst delete mode 100644 source/components/pro/linux/otp.rst delete mode 100644 source/components/pro/linux/smime-outlook.rst delete mode 100644 source/components/pro/linux/smime-thunderbird.rst delete mode 100644 source/components/pro/linux/smime.rst delete mode 100644 source/components/pro/linux/ssh.rst delete mode 100644 source/components/pro/linux/stunnel.rst delete mode 100644 source/components/pro/mac/2fa-google.rst delete mode 100644 source/components/pro/mac/2fa-nextcloud.rst delete mode 100644 source/components/pro/mac/2fa-odoo.rst delete mode 100644 source/components/pro/mac/change-pins.rst delete mode 100644 source/components/pro/mac/ecc.rst delete mode 100644 source/components/pro/mac/factory-reset.rst delete mode 100644 source/components/pro/mac/firmware-update.rst delete mode 100644 source/components/pro/mac/gpa.rst delete mode 100644 source/components/pro/mac/hard-disk-encryption.rst delete mode 100644 source/components/pro/mac/images/App-change-pin.png delete mode 100644 source/components/pro/mac/index.rst delete mode 100644 source/components/pro/mac/openpgp-keygen-backup.rst delete mode 100644 source/components/pro/mac/openpgp-keygen-gpa.rst delete mode 100644 source/components/pro/mac/openpgp-keygen-on-device.rst delete mode 100644 source/components/pro/mac/openpgp-outlook.rst delete mode 100644 source/components/pro/mac/openpgp-thunderbird.rst delete mode 100644 source/components/pro/mac/openpgp.rst delete mode 100644 source/components/pro/mac/otp.rst delete mode 100644 source/components/pro/mac/smime-outlook.rst delete mode 100644 source/components/pro/mac/smime-thunderbird.rst delete mode 100644 source/components/pro/mac/smime.rst delete mode 100644 source/components/pro/openpgp.rst.inc delete mode 100644 source/components/pro/smart-policy.rst.inc delete mode 100644 source/components/pro/windows/2fa-google.rst delete mode 100644 source/components/pro/windows/2fa-nextcloud.rst delete mode 100644 source/components/pro/windows/2fa-odoo.rst delete mode 100644 source/components/pro/windows/certificate-authority.rst delete mode 100644 source/components/pro/windows/change-pins.rst delete mode 100644 source/components/pro/windows/ecc.rst delete mode 100644 source/components/pro/windows/eidauthenticate.rst delete mode 100644 source/components/pro/windows/factory-reset.rst delete mode 100644 source/components/pro/windows/firmware-update.rst delete mode 100644 source/components/pro/windows/gpa.rst delete mode 100644 source/components/pro/windows/hard-disk-encryption.rst delete mode 100644 source/components/pro/windows/images/App-change-pin.png delete mode 100644 source/components/pro/windows/index.rst delete mode 100644 source/components/pro/windows/openpgp-keygen-backup.rst delete mode 100644 source/components/pro/windows/openpgp-keygen-gpa.rst delete mode 100644 source/components/pro/windows/openpgp-keygen-on-device.rst delete mode 100644 source/components/pro/windows/openpgp-outlook.rst delete mode 100644 source/components/pro/windows/openpgp-thunderbird.rst delete mode 100644 source/components/pro/windows/openpgp.rst delete mode 100644 source/components/pro/windows/openvpn-easyrsa.rst delete mode 100644 source/components/pro/windows/otp.rst delete mode 100644 source/components/pro/windows/putty.rst delete mode 100644 source/components/pro/windows/smart-policy.rst delete mode 100644 source/components/pro/windows/smime-outlook.rst delete mode 100644 source/components/pro/windows/smime-thunderbird.rst delete mode 100644 source/components/pro/windows/smime.rst delete mode 100644 source/components/start/index.rst delete mode 100644 source/components/start/linux/factory-reset.rst delete mode 100644 source/components/start/linux/gpa.rst delete mode 100644 source/components/start/linux/ipsec.rst delete mode 100644 source/components/start/linux/login-with-pam.rst delete mode 100644 source/components/start/linux/multiple-identities.rst delete mode 100644 source/components/start/linux/openpgp-keygen-backup.rst delete mode 100644 source/components/start/linux/openpgp-keygen-gpa.rst delete mode 100644 source/components/start/linux/openpgp-keygen-on-device.rst delete mode 100644 source/components/start/linux/openpgp-outlook.rst delete mode 100644 source/components/start/linux/openpgp-thunderbird.rst delete mode 100644 source/components/start/linux/openpgp.rst delete mode 100644 source/components/start/linux/setting-kdf-do.rst delete mode 100644 source/components/start/linux/smime-outlook.rst delete mode 100644 source/components/start/linux/smime-thunderbird.rst delete mode 100644 source/components/start/linux/smime.rst delete mode 100644 source/components/start/linux/ssh.rst delete mode 100644 source/components/start/linux/stunnel.rst delete mode 100644 source/components/start/mac/factory-reset.rst delete mode 100644 source/components/start/mac/gpa.rst delete mode 100644 source/components/start/mac/index.rst delete mode 100644 source/components/start/mac/multiple-identities.rst delete mode 100644 source/components/start/mac/openpgp-keygen-backup.rst delete mode 100644 source/components/start/mac/openpgp-keygen-gpa.rst delete mode 100644 source/components/start/mac/openpgp-keygen-on-device.rst delete mode 100644 source/components/start/mac/openpgp-outlook.rst delete mode 100644 source/components/start/mac/openpgp-thunderbird.rst delete mode 100644 source/components/start/mac/openpgp.rst delete mode 100644 source/components/start/mac/setting-kdf-do.rst delete mode 100644 source/components/start/mac/smime-outlook.rst delete mode 100644 source/components/start/mac/smime-thunderbird.rst delete mode 100644 source/components/start/mac/smime.rst delete mode 100644 source/components/start/windows/factory-reset.rst delete mode 100644 source/components/start/windows/gpa.rst delete mode 100644 source/components/start/windows/index.rst delete mode 100644 source/components/start/windows/multiple-identities.rst delete mode 100644 source/components/start/windows/openpgp-keygen-backup.rst delete mode 100644 source/components/start/windows/openpgp-keygen-gpa.rst delete mode 100644 source/components/start/windows/openpgp-keygen-on-device.rst delete mode 100644 source/components/start/windows/openpgp-outlook.rst delete mode 100644 source/components/start/windows/openpgp-thunderbird.rst delete mode 100644 source/components/start/windows/openpgp.rst delete mode 100644 source/components/start/windows/putty.rst delete mode 100644 source/components/start/windows/setting-kdf-do.rst delete mode 100644 source/components/start/windows/smime-outlook.rst delete mode 100644 source/components/start/windows/smime-thunderbird.rst delete mode 100644 source/components/start/windows/smime.rst delete mode 100644 source/components/storage/hidden.rst delete mode 100644 source/components/storage/index.rst delete mode 100644 source/components/storage/linux/2fa-google.rst delete mode 100644 source/components/storage/linux/2fa-nextcloud.rst delete mode 100644 source/components/storage/linux/2fa-odoo.rst delete mode 100644 source/components/storage/linux/automatic-screen-lock.rst delete mode 100644 source/components/storage/linux/certificate-authority.rst delete mode 100644 source/components/storage/linux/change-pins.rst delete mode 100644 source/components/storage/linux/disk-encryption-luks.rst delete mode 100644 source/components/storage/linux/ecc.rst delete mode 100644 source/components/storage/linux/encrypted-mobile-storage.rst delete mode 100644 source/components/storage/linux/factory-reset.rst delete mode 100644 source/components/storage/linux/firmware-update-manually.rst delete mode 100644 source/components/storage/linux/firmware-update.rst delete mode 100644 source/components/storage/linux/gpa.rst delete mode 100644 source/components/storage/linux/hard-disk-encryption.rst delete mode 100644 source/components/storage/linux/hidden.rst delete mode 100644 source/components/storage/linux/index.rst delete mode 100644 source/components/storage/linux/ipsec.rst delete mode 100644 source/components/storage/linux/login-with-pam.rst delete mode 100644 source/components/storage/linux/openpgp-keygen-backup.rst delete mode 100644 source/components/storage/linux/openpgp-keygen-gpa.rst delete mode 100644 source/components/storage/linux/openpgp-keygen-on-device.rst delete mode 100644 source/components/storage/linux/openpgp-outlook.rst delete mode 100644 source/components/storage/linux/openpgp-thunderbird.rst delete mode 100644 source/components/storage/linux/openpgp.rst delete mode 100644 source/components/storage/linux/openvpn-easyrsa.rst delete mode 100644 source/components/storage/linux/otp.rst delete mode 100644 source/components/storage/linux/smime-outlook.rst delete mode 100644 source/components/storage/linux/smime-thunderbird.rst delete mode 100644 source/components/storage/linux/smime.rst delete mode 100644 source/components/storage/linux/ssh.rst delete mode 100644 source/components/storage/linux/stunnel.rst delete mode 100644 source/components/storage/mac/2fa-google.rst delete mode 100644 source/components/storage/mac/2fa-nextcloud.rst delete mode 100644 source/components/storage/mac/2fa-odoo.rst delete mode 100644 source/components/storage/mac/change-pins.rst delete mode 100644 source/components/storage/mac/ecc.rst delete mode 100644 source/components/storage/mac/eidauthenticate.rst delete mode 100644 source/components/storage/mac/encrypted-mobile-storage.rst delete mode 100644 source/components/storage/mac/factory-reset.rst delete mode 100644 source/components/storage/mac/firmware-update-manually.rst delete mode 100644 source/components/storage/mac/firmware-update.rst delete mode 100644 source/components/storage/mac/gpa.rst delete mode 100644 source/components/storage/mac/hard-disk-encryption.rst delete mode 100644 source/components/storage/mac/hidden.rst delete mode 100644 source/components/storage/mac/index.rst delete mode 100644 source/components/storage/mac/openpgp-keygen-backup.rst delete mode 100644 source/components/storage/mac/openpgp-keygen-gpa.rst delete mode 100644 source/components/storage/mac/openpgp-keygen-on-device.rst delete mode 100644 source/components/storage/mac/openpgp-outlook.rst delete mode 100644 source/components/storage/mac/openpgp-thunderbird.rst delete mode 100644 source/components/storage/mac/openpgp.rst delete mode 100644 source/components/storage/mac/otp.rst delete mode 100644 source/components/storage/mac/smime-outlook.rst delete mode 100644 source/components/storage/mac/smime-thunderbird.rst delete mode 100644 source/components/storage/mac/smime.rst delete mode 100644 source/components/storage/windows/2fa-google.rst delete mode 100644 source/components/storage/windows/2fa-microsoft.rst delete mode 100644 source/components/storage/windows/2fa-nextcloud.rst delete mode 100644 source/components/storage/windows/2fa-odoo.rst delete mode 100644 source/components/storage/windows/change-pins.rst delete mode 100644 source/components/storage/windows/ecc.rst delete mode 100644 source/components/storage/windows/eidauthenticate.rst delete mode 100644 source/components/storage/windows/encrypted-mobile-storage.rst delete mode 100644 source/components/storage/windows/factory-reset.rst delete mode 100644 source/components/storage/windows/firmware-update-manually.rst delete mode 100644 source/components/storage/windows/firmware-update.rst delete mode 100644 source/components/storage/windows/gpa.rst delete mode 100644 source/components/storage/windows/hard-disk-encryption.rst delete mode 100644 source/components/storage/windows/hidden.rst delete mode 100644 source/components/storage/windows/index.rst delete mode 100644 source/components/storage/windows/openpgp-csp.rst delete mode 100644 source/components/storage/windows/openpgp-keygen-backup.rst delete mode 100644 source/components/storage/windows/openpgp-keygen-gpa.rst delete mode 100644 source/components/storage/windows/openpgp-keygen-on-device.rst delete mode 100644 source/components/storage/windows/openpgp-outlook.rst delete mode 100644 source/components/storage/windows/openpgp-thunderbird.rst delete mode 100644 source/components/storage/windows/openpgp.rst delete mode 100644 source/components/storage/windows/otp.rst delete mode 100644 source/components/storage/windows/putty.rst delete mode 100644 source/components/storage/windows/smart-policy.rst delete mode 100644 source/components/storage/windows/smime-outlook.rst delete mode 100644 source/components/storage/windows/smime-thunderbird.rst delete mode 100644 source/components/storage/windows/smime.rst delete mode 100644 source/components/u2f/index.rst delete mode 100644 source/components/u2f/linux/2fa-nextcloud.rst delete mode 100644 source/components/u2f/linux/2fa-odoo.rst delete mode 100644 source/components/u2f/linux/desktop-login.rst delete mode 100644 source/components/u2f/linux/index.rst delete mode 100644 source/components/u2f/mac/2fa-nextcloud.rst delete mode 100644 source/components/u2f/mac/2fa-odoo.rst delete mode 100644 source/components/u2f/mac/index.rst delete mode 100644 source/components/u2f/shared/index-content1.rst delete mode 100644 source/components/u2f/windows/2fa-nextcloud.rst delete mode 100644 source/components/u2f/windows/2fa-odoo.rst delete mode 100644 source/components/u2f/windows/index.rst diff --git a/source/_redirects/.htaccess b/source/_redirects/.htaccess index 07027bb405..9b30326452 100644 --- a/source/_redirects/.htaccess +++ b/source/_redirects/.htaccess @@ -15,4 +15,184 @@ #========= RedirectMatch 302 "(/[a-z][a-z])?/path/to/old_article.html$" "$1/path/to/new_article.html" +#Nitrokey FIDO2 +RedirectMatch 301 "(/[a-z][a-z])?/fido2/(mac/|windows/|linux/)?2fa-nextcloud.html$" "$1/nitrokeys/features/fido2/nextcloud.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/(mac/|windows/|linux/)?2fa-odoo.html$" "$1/nitrokeys/features/u2f/odoo.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/index.html$" "$1/nitrokeys/fido2/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/faq.html$" "$1/nitrokeys/fido2/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/(mac/|windows/|linux/)?firmware-update.html$" "$1/nitrokeys/fido2/firmware-update.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/fido2/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/(mac/|windows/|linux/)reset.html$" "$1/nitrokeys/fido2/reset.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/linux/desktop-login.html$" "$1/nitrokeys/features/u2f/desktop-login.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/windows/passwordless-microsoft.html$" "$1/nitrokeys/features/fido2/passwordless-microsoft.html" +#Nitrokey Passkey +RedirectMatch 301 "(/[a-z][a-z])?/nkpk/index.html$" "$1/nitrokeys/passkey/index.html" +#Nitrokey HSM2 not done +RedirectMatch 301 "(/[a-z][a-z])?/hsm/index.html$" "$1/nitrokeys/hsm/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/faq.html$" "$1/nitrokeys/hsm/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/n-of-m-schemes.html$" "$1/nitrokeys/features/hsm/n-of-m-schemes.html" +#Nitrokey U2F +RedirectMatch 301 "(/[a-z][a-z])?/u2f/index.html$" "$1/nitrokeys/u2f/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/u2f/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/u2f/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/u2f/(mac/|windows/|linux/)?2fa-nextcloud.html$" "$1/nitrokeys/features/fido2/nextcloud.html" +RedirectMatch 301 "(/[a-z][a-z])?/u2f/(mac/|windows/|linux/)?2fa-odoo.html$" "$1/nitrokeys/features/u2f/odoo.html" +RedirectMatch 301 "(/[a-z][a-z])?/fido2/linux/desktop-login.html$" "$1/nitrokeys/features/u2f/desktop-login.html" +#Nitrokey Storage +RedirectMatch 301 "(/[a-z][a-z])?/storage/index.html$" "$1/nitrokeys/storage/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)?factory-reset.html$" "$1/nitrokeys/storage/factory-reset.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/encrypted-mobile-storage.html$" "$1/nitrokeys/features/encrypted-storage/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/faq.html$" "$1/nitrokeys/storage/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/hidden.html$" "$1/nitrokeys/features/hidden-storage/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)?firmware-update-manually.html$" "$1/nitrokeys/storage/firmware-update-manually.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)?firmware-update.html$" "$1/nitrokeys/storage/firmware-update.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)?2fa-nextcloud.html$" "$1/nitrokeys/features/totp/nextcloud.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)?2fa-odoo.html$" "$1/nitrokeys/features/u2f/odoo.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/linux/desktop-login.html$" "$1/nitrokeys/features/u2f/desktop-login.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/storage/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)smime-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)smime-outlook.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)smime.html$" "$1/nitrokeys/features/openpgp-card/smime/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp.html$" "$1/nitrokeys/features/openpgp-card/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/openpgp-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp-outlook.html$" "$1/nitrokeys/features/openpgp-card/openpgp-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp-keygen-on-device.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp-keygen-gpa.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp-keygen-backup.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-backup.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openpgp-csp.html$" "$1/nitrokeys/features/openpgp-card/openpgp-csp.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/windows/smart-policy.html$" "$1/nitrokeys/features/openpgp-card/desktop-login/smart-policy.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/windows/putty.html$" "$1/nitrokeys/features/openpgp-card/ssh/putty.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)ssh.html$" "$1/nitrokeys/features/openpgp-card/ssh/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)otp.html$" "$1/nitrokeys/features/totp/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)hidden.html$" "$1/nitrokeys/features/hidden-storage/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)hard-disk-encryption.html$" "$1/nitrokeys/features/openpgp-card/hard-disk-encryption/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)disk-encryption-luks.html$" "$1/nitrokeys/features/openpgp-card/hard-disk-encryption/luks.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)gpa.html$" "$1/nitrokeys/features/openpgp-card/gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)encrypted-mobile-storage.html$" "$1/nitrokeys/features/encrypted-storage/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)eid-authenticate.html$" "$1/nitrokeys/features/openpgp-card/eid.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)ecc.html$" "$1/nitrokeys/features/misc/ecc.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)change-pins.html$" "$1/nitrokeys/features/openpgp-card/change-pins.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)2fa-microsoft.html$" "$1/nitrokeys/features/totp/microsoft.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)2fa-google.html$" "$1/nitrokeys/features/totp/google.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)automatic-screen-lock.html$" "$1/nitrokeys/features/misc/automatic-screen-lock.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)certificate-authority.html$" "$1/nitrokeys/features/openpgp-card/certificate-authority.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)openvpn-easyrsa.html$" "$1/nitrokeys/features/openpgp-card/openvpn/easyrsa.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)stunnel.html$" "$1/nitrokeys/features/openpgp-card/stunnel.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)ipsec.html$" "$1/nitrokeys/features/openpgp-card/ipsec.html" +RedirectMatch 301 "(/[a-z][a-z])?/storage/(mac/|windows/|linux/)login-with-pam.html$" "$1/nitrokeys/features/openpgp-card/desktop-login/pam.html" +#Nitrokey Start +RedirectMatch 301 "(/[a-z][a-z])?/start/index.html$" "$1/nitrokeys/start/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/start/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/faq.html$" "$1/nitrokeys/start/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)?factory-reset.html$" "$1/nitrokeys/start/factory-reset.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)smime-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)smime-outlook.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)smime.html$" "$1/nitrokeys/features/openpgp-card/smime/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp.html$" "$1/nitrokeys/features/openpgp-card/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/openpgp-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp-outlook.html$" "$1/nitrokeys/features/openpgp-card/openpgp-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp-keygen-on-device.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp-keygen-gpa.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp-keygen-backup.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-backup.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)openpgp-csp.html$" "$1/nitrokeys/features/openpgp-card/openpgp-csp.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/windows/putty.html$" "$1/nitrokeys/features/openpgp-card/ssh/putty.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)ssh.html$" "$1/nitrokeys/features/openpgp-card/ssh/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)gpa.html$" "$1/nitrokeys/features/openpgp-card/gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)stunnel.html$" "$1/nitrokeys/features/openpgp-card/stunnel.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)ipsec.html$" "$1/nitrokeys/features/openpgp-card/ipsec.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)login-with-pam.html$" "$1/nitrokeys/features/openpgp-card/desktop-login/pam.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/linux/firmware-update.html$" "$1/nitrokeys/start/firmware-update.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)?setting-kdf-do.html$" "$1/nitrokeys/start/setting-kdf-do.html" +RedirectMatch 301 "(/[a-z][a-z])?/start/(mac/|windows/|linux/)?multiple-identities.html$" "$1/nitrokeys/start/multiple-identities.html" +#Nitrokey Pro +RedirectMatch 301 "(/[a-z][a-z])?/pro/index.html$" "$1/nitrokeys/pro/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/pro/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/faq.html$" "$1/nitrokeys/pro/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)?factory-reset.html$" "$1/nitrokeys/pro/factory-reset.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)?firmware-update.html$" "$1/nitrokeys/pro/firmware-update.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)smime-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)smime-outlook.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)smime.html$" "$1/nitrokeys/features/openpgp-card/smime/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp.html$" "$1/nitrokeys/features/openpgp-card/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/openpgp-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp-outlook.html$" "$1/nitrokeys/features/openpgp-card/openpgp-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp-keygen-on-device.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp-keygen-gpa.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp-keygen-backup.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-backup.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openpgp-csp.html$" "$1/nitrokeys/features/openpgp-card/openpgp-csp.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/windows/putty.html$" "$1/nitrokeys/features/openpgp-card/ssh/putty.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)?ssh.html$" "$1/nitrokeys/features/openpgp-card/ssh/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)?gpa.html$" "$1/nitrokeys/features/openpgp-card/gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)stunnel.html$" "$1/nitrokeys/features/openpgp-card/stunnel.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)ipsec.html$" "$1/nitrokeys/features/openpgp-card/ipsec.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)login-with-pam.html$" "$1/nitrokeys/features/openpgp-card/desktop-login/pam.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openvpn-easyrsa.html$" "$1/nitrokeys/features/openpgp-card/openvpn/easyrsa.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)openvpn-viscosity.html$" "$1/nitrokeys/features/openpgp-card/openvpn/viscosity.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)change-pins.html$" "$1/nitrokeys/features/openpgp-card/change-pins.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)certificate-authority.html$" "$1/nitrokeys/features/openpgp-card/certificate-authority.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)ecc.html$" "$1/nitrokeys/features/misc/ecc.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)eid-authenticate.html$" "$1/nitrokeys/features/openpgp-card/eid.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/windows/smart-policy.html$" "$1/nitrokeys/features/openpgp-card/desktop-login/smart-policy.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)hard-disk-encryption.html$" "$1/nitrokeys/features/openpgp-card/hard-disk-encryption/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)disk-encryption-luks.html$" "$1/nitrokeys/features/openpgp-card/hard-disk-encryption/luks.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)otp.html$" "$1/nitrokeys/features/totp/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)2fa-microsoft.html$" "$1/nitrokeys/features/totp/microsoft.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)2fa-google.html$" "$1/nitrokeys/features/totp/google.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)?2fa-nextcloud.html$" "$1/nitrokeys/features/fido2/nextcloud.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)?2fa-odoo.html$" "$1/nitrokeys/features/u2f/odoo.html" +RedirectMatch 301 "(/[a-z][a-z])?/pro/(mac/|windows/|linux/)automatic-screen-lock.html$" "$1/nitrokeys/features/misc/automatic-screen-lock.html" +#Nitrokey 3 +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/index.html$" "$1/nitrokeys/nitrokey3/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/nitrokey3/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/faq.html$" "$1/nitrokeys/nitrokey3/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/features.html$" "$1/nitrokeys/nitrokey3/overview.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?firmware-update.html$" "$1/nitrokeys/nitrokey3/firmware-update.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?adsk.html$" "$1/nitrokeys/nitrokey3/adsk.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?reset.html$" "$1/nitrokeys/nitrokey3/reset.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?set-pins.html$" "$1/nitrokeys/nitrokey3/set-pins.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?troubleshooting.html$" "$1/nitrokeys/nitrokey3/troubleshooting.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?nitropy.html$" "$1/nitrokeys/nitrokey3/nitropy.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/shared/main.html$" "$1/nitrokeys/nitrokey3/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/linux/firmware-update-qubes.html$" "$1/nitrokeys/nitrokey3/firmware-update-qubes.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)?2fa-odoo.html$" "$1/nitrokeys/features/u2f/odoo.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/linux/desktop-login.html$" "$1/nitrokeys/features/u2f/desktop-login.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/linux/fedora-gnupg-configuration.html$" "$1/nitrokeys/features/openpgp-card/fedora-gnupg-configuration.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/passwordless-microsoft.html$" "$1/nitrokeys/features/fido2/passwordless-microsoft.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)keepassxc.html$" "$1/nitrokeys/features/password-safe/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)smime-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)smime-outlook.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)smime.html$" "$1/nitrokeys/features/openpgp-card/smime/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp.html$" "$1/nitrokeys/features/openpgp-card/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/openpgp-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-outlook.html$" "$1/nitrokeys/features/openpgp-card/openpgp-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-keygen-on-device.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-keygen-gpa.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-keygen-backup.html$" "$1/nitrokeys/features/openpgp-card/openpgp-keygen-backup.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-csp.html$" "$1/nitrokeys/features/openpgp-card/openpgp-csp.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/(mac/|windows/|linux/)openpgp-uif.html$" "$1/nitrokeys/features/openpgp-card/uif.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/index.html$" "$1/nitrokeys/features/piv/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/access_control.html$" "$1/nitrokeys/features/piv/access_control.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/certificate-management.html$" "$1/nitrokeys/features/piv/certificate-management.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/factory_reset.html$" "$1/nitrokeys/features/piv/factory_reset.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/key_management.html$" "$1/nitrokeys/features/piv/key_management.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/guides/index.html$" "$1/nitrokeys/features/piv/guides/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/nitrokey3/windows/piv/guides/client_logon_with_active_directory.html$" "$1/nitrokeys/features/piv/guides/client_logon_with_active_directory.html" +#Nitrokey HSM +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)index.html$" "$1/nitrokeys/hsm/getting-started.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/index.html$" "$1/nitrokeys/hsm/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/faq.html$" "$1/nitrokeys/hsm/faq.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)smime.html$" "$1/nitrokeys/features/openpgp-card/smime/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)smime-thunderbird.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-thunderbird.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)smime-outlook.html$" "$1/nitrokeys/features/openpgp-card/smime/smime-outlook.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)pkcs11-url.html$" "$1/nitrokeys/features/hsm/pkcs11-url.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)import-keys-certs.html$" "$1/nitrokeys/features/hsm/import-keys-certs.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)certificate-authority.html$" "$1/nitrokeys/features/openpgp-card/certificate-authority.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)apache2-tls.html$" "$1/nitrokeys/features/hsm/apache2-tls.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/windows/smart-policy.html$" "$1/nitrokeys/features/openpgp-card/desktop-login/smart-policy.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)?n-of-m-schemes.html$" "$1/nitrokeys/features/hsm/n-of-m-schemes.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)hard-disk-encryption.html$" "$1/nitrokeys/features/openpgp-card/hard-disk-encryption/index.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)ipsec.html$" "$1/nitrokeys/features/openpgp-card/ipsec.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)gpa.html$" "$1/nitrokeys/features/openpgp-card/gpa.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)stunnel.html$" "$1/nitrokeys/features/openpgp-card/stunnel.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)automatic-screen-lock.html$" "$1/nitrokeys/features/misc/automatic-screen-lock.html" +RedirectMatch 301 "(/[a-z][a-z])?/hsm/(mac/|windows/|linux/)dnssec.html$" "$1/nitrokeys/features/hsm/dnssec.html" diff --git a/source/_static/css/custom.css b/source/_static/css/custom.css index a7d799f203..767623efe5 100644 --- a/source/_static/css/custom.css +++ b/source/_static/css/custom.css @@ -718,3 +718,14 @@ article ul li { #breadcrumbs a:last-child:after { display: none; } + +.products-table td p { + text-align: center; + font-size: 1.25em !important; + margin: 0 !important; +} +.products-table td { + padding: 0 !important; +} + + diff --git a/source/components/fido2/2fa-nextcloud.rst b/source/components/fido2/2fa-nextcloud.rst deleted file mode 100644 index 2f5bdee469..0000000000 --- a/source/components/fido2/2fa-nextcloud.rst +++ /dev/null @@ -1,7 +0,0 @@ - -These are the basic steps for registering the Nitrokey FIDO2 as a second factor or setting up passwordless login of a Nextcloud account. - -.. raw:: html - - - diff --git a/source/components/fido2/index.rst b/source/components/fido2/index.rst deleted file mode 100644 index 37bfb22c4d..0000000000 --- a/source/components/fido2/index.rst +++ /dev/null @@ -1,23 +0,0 @@ -Nitrokey FIDO2 -============== - -.. contents:: :local: - -First check the: - -.. toctree:: - :maxdepth: 1 - :glob: - - Frequently Asked Questions - -or choose your operating system: - -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - diff --git a/source/components/fido2/linux/2fa-nextcloud.rst b/source/components/fido2/linux/2fa-nextcloud.rst deleted file mode 100644 index d71d6f6144..0000000000 --- a/source/components/fido2/linux/2fa-nextcloud.rst +++ /dev/null @@ -1,4 +0,0 @@ -Two-Factor Authentication And Passwordless Login For Nextcloud Accounts -======================================================================= - -.. include:: ../2fa-nextcloud.rst diff --git a/source/components/fido2/linux/2fa-odoo.rst b/source/components/fido2/linux/2fa-odoo.rst deleted file mode 100644 index 374fbfa5dc..0000000000 --- a/source/components/fido2/linux/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-odoo.rst.inc diff --git a/source/components/fido2/linux/firmware-update.rst b/source/components/fido2/linux/firmware-update.rst deleted file mode 100644 index a24e2be178..0000000000 --- a/source/components/fido2/linux/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/firmware-update.rst.inc diff --git a/source/components/fido2/linux/index.rst b/source/components/fido2/linux/index.rst deleted file mode 100644 index 7a78f34194..0000000000 --- a/source/components/fido2/linux/index.rst +++ /dev/null @@ -1,26 +0,0 @@ -FIDO2 With Linux -================ - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/index-content1.rst.inc - -Troubleshooting ---------------- - -If the Nitrokey is not detected, proceed the following: - -1. Copy this file - `41-nitrokey.rules `__ - to ``/etc/udev/rules.d/``. In very rare cases, the system will need - the `older - version `__ - of this file. -2. Restart udev via ``sudo service udev restart`` or ``udevadm control --reload-rules && udevadm trigger`` if you are using Fedora. diff --git a/source/components/fido2/linux/reset.rst b/source/components/fido2/linux/reset.rst deleted file mode 100644 index fdfea9ff6b..0000000000 --- a/source/components/fido2/linux/reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/index-content2.rst.inc diff --git a/source/components/fido2/mac/2fa-nextcloud.rst b/source/components/fido2/mac/2fa-nextcloud.rst deleted file mode 100644 index d71d6f6144..0000000000 --- a/source/components/fido2/mac/2fa-nextcloud.rst +++ /dev/null @@ -1,4 +0,0 @@ -Two-Factor Authentication And Passwordless Login For Nextcloud Accounts -======================================================================= - -.. include:: ../2fa-nextcloud.rst diff --git a/source/components/fido2/mac/2fa-odoo.rst b/source/components/fido2/mac/2fa-odoo.rst deleted file mode 100644 index 374fbfa5dc..0000000000 --- a/source/components/fido2/mac/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-odoo.rst.inc diff --git a/source/components/fido2/mac/firmware-update.rst b/source/components/fido2/mac/firmware-update.rst deleted file mode 100644 index a24e2be178..0000000000 --- a/source/components/fido2/mac/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/firmware-update.rst.inc diff --git a/source/components/fido2/mac/index.rst b/source/components/fido2/mac/index.rst deleted file mode 100644 index 553cd2c90f..0000000000 --- a/source/components/fido2/mac/index.rst +++ /dev/null @@ -1,13 +0,0 @@ -FIDO2 With macOS -================ - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/index-content1.rst.inc diff --git a/source/components/fido2/mac/reset.rst b/source/components/fido2/mac/reset.rst deleted file mode 100644 index fdfea9ff6b..0000000000 --- a/source/components/fido2/mac/reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/index-content2.rst.inc diff --git a/source/components/fido2/shared/index-content2.rst.inc b/source/components/fido2/shared/index-content2.rst.inc deleted file mode 100644 index 53e137388d..0000000000 --- a/source/components/fido2/shared/index-content2.rst.inc +++ /dev/null @@ -1,17 +0,0 @@ -Nitrokey Reset --------------- - -.. contents:: :local: - -Factory Reset operation regenerates the secret material stored on the Nitrokey FIDO U2F / Nitrokey FIDO2, which makes it a completely new key logic-side. New owner cannot use it to login to account of the previous one. In case of the FIDO2 Resident Keys the material is erased. - -To avoid accidental and malicious reset of the Nitrokey, the required -touch confirmation time for the FIDO2 reset operation is longer and with -a distinct LED behavior (red LED light) than normal operations. To reset -the Nitrokey FIDO2, confirm by touching the touch button for at least 5 -seconds until the green or blue LED lights up. - -Nitrokey FIDO2 could be reset by: - -* pynitrokey tool: ``nitropy fido2 reset`` (requires Administrator rights to execute) -* Google Chrome: `Manage security keys` via the direct link: `chrome://settings/securityKeys` diff --git a/source/components/fido2/windows/2fa-nextcloud.rst b/source/components/fido2/windows/2fa-nextcloud.rst deleted file mode 100644 index d71d6f6144..0000000000 --- a/source/components/fido2/windows/2fa-nextcloud.rst +++ /dev/null @@ -1,4 +0,0 @@ -Two-Factor Authentication And Passwordless Login For Nextcloud Accounts -======================================================================= - -.. include:: ../2fa-nextcloud.rst diff --git a/source/components/fido2/windows/2fa-odoo.rst b/source/components/fido2/windows/2fa-odoo.rst deleted file mode 100644 index 374fbfa5dc..0000000000 --- a/source/components/fido2/windows/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-odoo.rst.inc diff --git a/source/components/fido2/windows/firmware-update.rst b/source/components/fido2/windows/firmware-update.rst deleted file mode 100644 index a24e2be178..0000000000 --- a/source/components/fido2/windows/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/firmware-update.rst.inc diff --git a/source/components/fido2/windows/images/enabling-u2f-on-firefox/1.png b/source/components/fido2/windows/images/enabling-u2f-on-firefox/1.png deleted file mode 100644 index 150e64d2d69cbdf644deb76e8eb4d2fb8fc9236d..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 11311 zcmeHt1y>x+*6t8OAP_uA(1Z{OAwY1KAi*UN+(Lr8`^-S_BtQtk-Q6L$ySokk65N?V zhZ(-+J@>okoO{pr1MXV4R>SnF?yl;p-g`gKeyYOMRAljSsc=Cc5Wc*ev^ofMFAD_1 zcz|;cs9Em9y9It8I?Cy~fItLYcYhc$tOV2`&{L4S^xF@f$p=eN9Sx6Ej$;o4$Y-_t z7$$*!Shg|}wS6_n;`IIN&r_vSDY3ux<|~976i*cP4iI0L+;S(JuIGXVO!Yiq1lAS` zDQ<{@YV`Is=7mwc9L3wuteHe=FUQjFeIcr@hbG@J1QPv}=vYH}Un3qeGq1qIlA}FZ zR^X!8VYXVYdJGnmx4H4q;Qd-f)13a+guQj@?fqAwp)?Rfa(`+Sv-*9f{nNg4BW}?qM}jpLpS4(EaD`jP3ituV`8FVYEDj0s;Z-^&})t8 z4SF!*y{YM+pDz@X)yatKixVAGbUpdb!*V`r^uM55v3>)8Dwx0R zsrxST%~$|>9vKj~Km(@~mv>+efxZ{GI-SIxg_a%`%`rsV6>KAg^f%jj`i-dh?F}kT zPj)6P5GKYtbr(YkRf@5%NBa64?d_zcWAO=md_K|9G}lV`N)}fsre~O0IAAzlBc6b$ z!rz5@nPi}xYj30HSv=`)&f|K-mm5%q%L_-srr)G_GH^^dvKv!43F8j#2Glt@d3V4! zqJwjIeWFD~MMOn^B9>fo+{1to+RLmTHXdL88B8rA{Ok0$4&i8=>R*4}jb=Ar&r&eq z`(CNxliMSBY++;Rhq6oLG1s^k4U0R$Va&ol-^QvuY==mrvZj1p20EZ4r6c`;<+b9Q zYn9+@Gx|cL*nP)Sv(d#4+QCXQ5WB;If1+58QawM*`4OHrG=)w0%6b2H;OI2jAZTMb zdyW~;W+)<)16h7VDdIvJXrW3s!KO{l)J@~L#0;)-_adq5J_0`8!%AvDo-Kum#mN1@2TRUc|t&gFO zAt&{&aC|*w@+3#Eh0&?N4&} zxQs@`>x|lk8n=oWwepB%Tpx*wa$xG**6UF!-IklHsuzbagSw6iuJnW*TWp%QCh4#- zijB*tC5_Lc&x+C_&gOojb<#}UNW>aC6~nlDT&M&2#0|`Uw-ZmH*0x~Ey+`v^blA4O zNK<}e;}y*!ExX0KaZeNXb8>q6mGtzd7Me2Br9(2CAcARdZJq^3)UZNL)obdZ1X9$N zcz-XX@v|&oD8Ie6S7e{xluDF-GVk)GUy<0Gr9d~~mlZr`p!o9>e0_5Cr_?TP{o>dg z85ZzFRhs>q{E-AO>+yE5FswcCqXh;RYhEC{e4G&e^}11VIBZE;`j5JS^C1vsfY1}2 z8X77$6#qX4ppv{sAe_NqyMpJ`FDi|U9Vk} bAo|GfU$B34sna~IXdJH~w&7#KL$ zMNj)k!r!g$lZ5s?WF$##CW$0w1Vf>>DZ(Cl`ufOgZzK{aEZhjXypms9S`rm){t^(7 zr<}BTcqnF_GeOCz;sFFd&NJHl`g%bg9@p>u)|wL@?(WM?UR5tN3k#i{ z;DKK(AR!^4sa-TSA)W7qAv{Mh4rt6`IB{cZi+{ju(vmoH>GD>Z2g8bo>e=cGk}x!9 zxJKttpU?5?TRS^Def@=GK^I9$NfD9PZu8T-=-AlUBJHvVSXeT$vOYdO!VP*318;t;hCD55j&fbH2JmcO-Fag$;sK?-cG^(3wSSCY3Vsb#&F^c)s>aoADpVv zplo$32ZyvV{EtJC#+zl8HkOu_*47G&iquv^d&&u1FWA^h3JMA`GTI|fEsIYUMTiqt zdpkTWnC{-##>R$%-M|tR+N=xoBQLKyGc&VXzaF@79EHy`b>fRWw*vr$$6hI)5c`Bv z`5KsLgL>zUg1r53FaOBMQ4LkL;^HR6YC9%UKWqH?_l1C7Zesk*TgTO{P64w-L`_Xi zmATBkh^6@4FBT2+;je`yC2k)A08=z=#*kl`pP!$ZVTzU!a;N6fH3iS}-Q3)wqMmPGhXfAgm$umIhoz*Xkdcu^;37{?Pgibo zkI`T$as3Rnmyf@WiXr!7v@4^dqhl0uQj*4co0OO^)r^ffewW{B2pNfFffu#DrauN* zir(WLQxA;D@@&FAY-;$~M@B2`uH>nvuFepVO@EV7G73Sq-hWI%0X?6$=q#Oq!L$qv zipMRvxVUVWW5be@X$HL>KY3!cq0eo)1$b?6GhV9GP%G+uVMY@V1enRQXU|GXN&t(T zX~mULS67#j3Cij~4<&F11qFcuReYVDojp8iB{N>Ku)KfyxY6SX0!-n)6+Px>$ZV-0 z$bEnASz&qW4OS^y-1jCf{x9rdQIV(uM;sgyXt(oOzIwB&F zM2>n`u0F@uR)g46AMb_*Sc~?{#{jYUU8Ae+{HU$*sD+x0EXO!LH5Kxwk9d80cX!vw z=b*-AYeeYHPKX)mzPywpFzFAlv2}H(88>CA^xE6s@-a3iB_(Bbv@|v%FIsOYCEVT5 z0cI2!1o&qE-z6x>XEa$5xo3RzyTl2_^!>BZB{QtXCN96DW&ggA$a^GPZvGk^=L8Mg zm?Y0Sr-1d+YF^qioA2{@?JTXx(@jxAe!VVDBW|d=BGjZS)5g++oqcD~^orVT`~lQg zsGE->%lpHW3N#>O?8oBLn;u&QhCO5CqsAf0A! zUcb!D%%4Ahf@m!$wm|_tZFuC2z@=nSpPtR^qr*cCA~LcXtI1Iqtc4IavBhDfmC#7} zlJ28dAT;|F4yT>|^^DiYhu+f%`KTrpAV+Nr3wgD(u{H-ZWaqsRw2jbKVL>l{vCVLR zXc4zu&yQ8M*$!bIpPiAZ&eig*4Q3s~K_I#Goz5`){7Z_aeCdz4U-;AATHS|(ji0{6 zhMIVHK-45Df(Tq%Ed7wi#qY6c35VSd@@snX!4_)d#r^Ukr3HEfASBJQNI18qrl!S6 za=qK0ma1xGIpfo(65G81y;RCkZ$=(Af_!~_&4J6N{Xe_9q%C6iEQ_>CUa_#$d!A&X zloRkTPdeUQpw~J>r0|z6&d*^_;2;r^MS3y731cMZkXKg^O&s)vH#Rmvso)vc9%&U7 z74N&!AoYpP&uIuRusq~286}V!4*i28B>EiF(+RsxJ@-;1(QF z2XQ-P7)t#=vh!Wr_@$mRh3Qt;5HNuPs4knWo&$V z10U75=X~{QU_beWMI#pnIO{`TPY-U`W9x6Y*bA8E##fmt+DX_ONa z6JNi61&LfNx-iiv0q6%5(7?bzpc`-{S?#Zv`ar(WOMi?0tJ}FMtA2(WDTc})>T~(! zEf4mlwvGeO+UaLaO`vgENChB?GsVMzya^jJfjL zzo_gY()xIK8Z%$D8dYgBRaejx2;a)GtH@nsW->e*#J-3^aHb_Bu;k8rc`L?dgKtib z1_wFZJvta;rzRMds&&80K(WJdv~|DkKxe- zXZz(obDbfCK^kWe2t;09p6~HfMkhnV6yBxlD3TWT?7Y0axNQw%N&-$@mt^%2X;JU( zgK7M*u{@|KX3$toRT^L6ZX3~- zWmTt#In2Z8;J@_&bSY%)liEUfIWGRl{%vKQm}?}{-7&g)b^b8A<2$4wX|i5|xKt#zJBsQXU1y==&7PjYE7?5e!^SMa_*Cmz^G&n5rQw}xNkIgzu;|T&_~p{W zwY$nzR?jA<}|sb#!}!Orqm#3R3O3o)pq(Fe_GI{dQVDM&GA!Ttn4R=Dyg`)neKZt zY#=c)G33S3N(&fyey{+Xa3FSq^175MCu`RJx@T-m54vum{8}!lHs+dC$gK)BoKrIb zpJ}otaoyjlwwh!&Y{=HS(63WYB|2ZIb)e{29zZT*sudyi_4I7()Fo8^?z`D3QneGy&+dX$K0dzZk?=L>XoaZF_Eufb^TcFs8I7 ziO&B9>OD4Fi2-cD`0*pH6+^RunU7}lWvrZ*CB04HT#Q|bkkJd>XPipY6nw81ym?yt zY`F)y`HFQil6)NItfMwPbES3Y<@(B2Ug_JnY(zCDWM1D$gP-)mNtY?TsCiN!ih6>8 z;m&e2Ij(g8E`eYTUEdUx(rxnWPvEv-eZ_9SSmz|oVNhdzW|0OyhuM@Ryyj1hF>4}Q zP^1yuv-l%_eLZze|B98>VhHCUAz|(DJrIzvbR3>8`yA=kC-n669JSaurL;P_?9Wx4 zo;sUMBr7o~s;C$>d)J`&t95G+W!8cfq@L`e6;$%Zuhv57*^Qd&Je>+R&XUfxYmP48 ztiDHmC~I6kBxLd`TFVPIroWl$8|m#ZVefXus&!aFk4HlO?7vDjF<9J=q}jbb+v}ip z2E8_@Q>&9*uK3&=NT>rUYd%kOWPp}eS&Xvjlz*JamM2N6D46#a6chvjED&4#O(RTh zfrFi0%;#K5f8m0B<{>~9Jx@q%?1L5-7ip-dgeIu=d7kbF3k!1?HO0rq^6jTpQ4`lR z+#+@+@yK5v!{II;tJvi-)E<)`(prb$;3lR5wy~MS6;T+)BW4sNECG0tQr-wS@dvla1eLh z9xKtW1+oPbE?w2pvuKE~6J!Fj&iAVFgOFD~hsW=F2+CV~7Ik^)iTztX!c1x+(u0&` zC;X@4g^{K!o4a}KgBT5sPp`oETczD9#>+0doOQ7SNoUP7|4hDw(Mlf#p zL(~p`YT$DQ(rZF&h}d@xDWe8*V&b)p4YxJP`C{GoT)Nq3RVUNCkeo{N=5WIme5-OJ-J2fcecJ&k|r<_`NU!H3HyAXw%sk-Xl!K#x;2t=r!OpH6Vi+A@9*DR-C}lg zae<$n5)cr$_m!CThkeIPl~?77N=Qz!2w8q_Ai874@P@#%M`T>ud@<5uDAIO^M>L1#pqIp)+6*%8nCM*4^9sakr zWsauv0zM=ofs*%~RP}j+l$bc|$-k;!e5s{*M+XO*1&8_5s1f$S(9k{^FV8yc`}YA- zzZ>^GFWbQmQ0xM|JUs;(iGW5Zrf2h7z>Qv;LvK(&Pk6jUPX6HO>({m$12O6a2%xta{?lo5@q#JUS7$y7%jw39G1u~G*LDHj z6ePsN^R~L}SA+@G||_fQ|vA%uINs zq@;VhyTx{yYqhhp?(S}G?ryXZ&~+>?OusTdad=UC7@uG^ zPt}J>DynhWG{5;I;FtgURltKwRST?aQ?s0H2p!@cs0L;RbMg&|*v5YFfPmmEH#fKa zgb;LTU4zIq{B%q zy(=w**u{fYh{M$B7!Y#b&1cC{xuv~Z3XzT6x9v~d+v((w`(0~1pdmv2!;Q+aSW_ZO znByr>R_8x;$LL9{6hME^9T(PZL1_p;;l_}{zDtTpr`x)wfTT{0Y|&^88N25{m>f9V z=KB5f^Ya0!%h7sMSy1p$LPKLR&KOdlRV3?~VHj}3(h5!S2^v?Cmi}C@>e%g1s=0^0 zu5g2*=73YI5Y~OG;oYMB4u1L}r0a5;>L8Th>H3cr7lO{>W*#2MkILm#YZ}QMb?`|y z#givb0Gwmz;Bc_FC&0%C(wbg+=*>wK&*W3+E|xFM%b!IR=td5`^$ppY?`x$iIRe81 z9UqUQInWD+nf=~9J&hfYX7j{R{`NdACxfbFPA*x*bhOx=l%gMbY|8Fx0`zchPvB0N zv;3{kdXw`gK0yGd@b~u*3kw?+fe*2kHJuJ|kLrBCim!J8lwAVQac13^dHNW{FWN$K0#`qx)4iTLNjr9r*LEs?A zM$S+Y#g8KWm$zQa99zS9eKH2`-Yu>&b@0d0HISqmLRT&Q0?y9Pc0NNG%f9tpcjHZ1 z+@L|L-4sUmK|BVnU&L?T7lwm}mcSd5u>nOd0C(TtcQEGD{n_f4BZ{v8(30~e$m{88 z-l0@f{D#~0^);}<)tgIq7pGhgVBz^MJJS*Qi}>2&xS;grW-t#Q=i|SFRmFSxYe0Ah z?xVuJwPyS0+9R;i2*gYCe~p*(o(kUl{IyQ5XW~Fun%g@#aPgpbG+FX&a8UseMZrzB zP|1Cx`VVbxa4%fXF<{~ZRYRI@Jbz*PNT+x)i}yg38N`xB=qLh+l`eFXqX z`=XeX6Ccyi{F#}_P2?LMo$n?B-f+F(L!mqXB+l+n?%I2Gjif&n`IlwWf4;iLiZ498 zN|BO`!PA(*6Hod}#bQFj|G3yO{MGHT?4O)rSnq_Ojj;lL#kGu9*`eCk=cf~!W50?K z0$DF&&?7H{qz4^!9?ebn@UBZ4t|mX9BghSD_$#!D&wK1BgdPWw%+tic`FSn3XdhPU z3Z|V5@n!uHS^?kP#r-uxqHf~od|DfIEA1U(nPfRJKdV2$LPoAq0+(J%ZL+Z1*I&iO z0wA`n5f(pz!8J~?%opsUtOS%C(}`phw0e3)_o{PPt&^m(CR6lDqEZlHV&H4n_1>A< zHC&v@{hmC&$Mt%!d;J>>Y>s?b^pdunFar zHz*WliMKiIN;NH^YEyh6@8Gpk>x-_m(Y-TOm8#=r{l7$^Fttmi( zxu!C+1Byxho1LfcI@SEp^9TXOvT3nBaakZu< zQbEgmv2E!QW?InuNZl15_u-V{jYa=XkFCAkadK)MbJxDQMH3P(VFT|vE&nB$Ak6w48Ho3?)Hkf1TorQMXEvy(pB;oYO@$)6D zcRyNVRfvT%PPmjLyvyd8av}MLQi};ZJKcF&1R_fOgrjeDX}i|gRETFd3?uVX zoA!%KgwCAW$?=nFFis*M~9vwqM?C*b!iaI+|c_Rx3fQK;$9^IwVE|FK`6Yp@qMo^x2tHg zCD-_&w5BR(h(PwUuI}^dbw^NoQrv=bNd+s9(8%=Pb5W<~t*Kv;V;oYy5@gd%k%>`t zY`ZtJAo6@v$KYCT+P|}5ycBQ^S6R^_il5i&1H|=fk0reqS1AZi$PBjK9u{@8C2M$H zmfyU}&d5+tTA^*-Q}uN6_t9>d(POz?E_G+6?#JJWQZvZ-(WgtUvAK6LP{E9V;#* zNf%cIfYr96@Vrf3sndhn8h?KcT0P3~%X461Oys1CbfmQ7#1>+V=^(y7RCLgNU6k?A za>(60W|!_LSW%k1Cb@`bsQY>5N$)ct>N6^IxNY18Rp$zBTxp(r00K|}#;&Makc;Q0 zokuz@@DHAz+5IGV&4|V+Pfkt_cf3}Ctu>bWbr_d}osoi#j{pR7 zZn`z{3HTdi{?l%nf5O85&H(1)Z>C|I+bV6%4+6nlbbL{PxjFHLUyfRco3<})bpGUk zebJA#K3LKpEd;vxOK=!LDV!S>vrb;v&@P8bDD!T9ZbMtmv05KTxFJh23P>6UE8!oX z1au~Z(pV265k+Gu-v%^4H_w~Q8Edlo!dH_*s6LLX;~0}v&X^cJJ>+eR<5U$|WTolk z6_*b+n21O0D6SUmh3?}~f5VUXh0-h;J9BvTArxQQlO%m_ruNjR)6^9Qr`o4GeZ%y{ z>B|IocRC^dW4s<-s*gv@?5%ur|ZFJ<9sWh`HuhkR&X5@psjC~3;SA* zp?Rfs55z=ht8nXJT8g!fF@4+*8q>)D&y4NMjbQyyBsxzsT7*v=%J9DGdT?)y_UYIm z;XRb!Z?v{U`hwkZPg`?lza``1qLE!Li|h$)bx4vA$0o%teyLYz0Kql%oosUdL@N4? zkohoVHJ&b83T#glmSTc{tT1)m+fr@kS4FaDu_Tv{1RSv}!aIbM9;JcHw%Yj}E=k=a zZIWEY?O`FRA3$mv_$%O-R#<+QI!_4`W_d2#0Ot)<``NSd^AnVXcosnXWB9Z<=|9wa*I9+Dj7B?OPn zJ4)c2<$s>}gW21qmPRd|X(8wR%$R~rCfd=lRPwc-gzHwO{)LPHE4fBEgBNA<%Yt%5 zQ`3VBzk(K+Imc`~yX>3X^UPcdjesb!V*OqNlY1F&ItMWrGgxNFSf2PJe_)>a_#KOO z;>Og&*04uDki;N^n^8vmAfDw}^vg$2XL&Fhn%Vhm+a%ZGE5Ft^!+LUyKRcH{LK-3P z*k&I+avFPr;@0z$2#?<&OwJJJ50xH$lcV^9OV}9jE;QbPpDLWtTje?@@PF@8R&q6EG(3y}*(3y`Wn48O<%H4_hyLMoy4O zrA(?i^Wo!|QS)exaEjElh&lFBXnaYm;$u<|Gzvux2uZwS_a)CU8BULAb0Ft7&aaXr(wzKbpX}zC`6v zd*)kBq;j87%4zoqf$l~f@9T>_ne>IU%b+g z!0PbJ&GBTWINEM`nikoe34Fr8jE;^MqM={H>x1R3PpNDp$M6SxsY=`lkEA~qQYa{Z z(wQ(St}E^v;$z~Hdak7yfP%*kRN69gLT4$oKDEFwG&S{nF*o(bAo*CC!rB*vmag)m zVOkG;{SWUS9HEQ?+{?bL1iBFir?kJ?Jh#4L=HoTXd5isR{^FB)2IOYQV3^hV0j+CR z=LDzC`J39~`nQbkKOI_2P&uO39$fSEI_4C&^`zF7AyGt4^ND=R8IiOAd{FX zT6pWxTb~vQEaQ==XFv`>JEC;0j0|o%jRDv*cEFi diff --git a/source/components/fido2/windows/index.rst b/source/components/fido2/windows/index.rst deleted file mode 100644 index cb732798f3..0000000000 --- a/source/components/fido2/windows/index.rst +++ /dev/null @@ -1,13 +0,0 @@ -Nitrokey FIDO2 With Windows -=========================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/index-content1.rst.inc diff --git a/source/components/hsm/ipsec.rst.inc b/source/components/hsm/ipsec.rst.inc deleted file mode 100644 index 4fe4c78568..0000000000 --- a/source/components/hsm/ipsec.rst.inc +++ /dev/null @@ -1,46 +0,0 @@ -.. contents:: :local: - -`Strong Swan `__ works using the `PKCS#11 driver `__. Basically follow these steps: - -1. Generate a key on Nitrokey via pkcs11-tool. In this example it's a 4096 bit RSA key. - -.. code-block:: bash - - $ pkcs11-tool --module /usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so -l -k --key-type rsa:4096 --id 10 --label 'Staging Access' - -2. Generate a certificate signing request via openssl + pkcs11 module - -.. code-block:: bash - - $ openssl - OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/x86_64-linux-gnu/engines-1.1/pkcs11.so -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre MODULE_PATH:/usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so - OpenSSL> req -engine pkcs11 -sha256 -new -key id_10 -keyform engine -out user@email.com-staging-cert.csr -subj '/C=GB/L=Cambridge/O=Organization/OU=Staging Access/CN=user@email.com/emailAddress=user@email.com' - -3. Sign the certificate with your certificate authority - -4. Convert the certificate to DER - -.. code-block:: bash - - $ openssl x509 -in user@email.com-staging-cert.csr -out user@email.com-staging-cert.der -outform DER - -5. Import the certificate into the Nitrokey via pkcs11-tool - -.. code-block:: bash - - $ pkcs11-tool --module /usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so -l -y cert -w user@email.com-staging-cert.der --id 10 --label 'Staging Access' - -6. Configure Strongswan to load opensc-pkcs11 module then to load the certificate on Nitrokey. Edit /etc/strongswan.d/charon/pkcs11.conf and add the following module: - -.. code-block:: bash - - modules { - Nitrokey { - path = /usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so - } - } - - -7. Initiate the VPN connection via IPSec/Strongswan, then prompt for Nitrokey PIN - -8. VPN is now connected diff --git a/source/components/hsm/linux/apache2-tls.rst b/source/components/hsm/linux/apache2-tls.rst deleted file mode 100644 index 9d6b689cb1..0000000000 --- a/source/components/hsm/linux/apache2-tls.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../apache2-tls.rst.inc - diff --git a/source/components/hsm/linux/automatic-screen-lock.rst b/source/components/hsm/linux/automatic-screen-lock.rst deleted file mode 100644 index d8f8332ad1..0000000000 --- a/source/components/hsm/linux/automatic-screen-lock.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/linux/automatic-screen-lock.rst diff --git a/source/components/hsm/linux/certificate-authority.rst b/source/components/hsm/linux/certificate-authority.rst deleted file mode 100644 index d414fc892f..0000000000 --- a/source/components/hsm/linux/certificate-authority.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../certificate-authority.rst.inc diff --git a/source/components/hsm/linux/gpa.rst b/source/components/hsm/linux/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/hsm/linux/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/hsm/linux/hard-disk-encryption.rst b/source/components/hsm/linux/hard-disk-encryption.rst deleted file mode 100644 index 95e1694368..0000000000 --- a/source/components/hsm/linux/hard-disk-encryption.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/linux/hard-disk-encryption.rst diff --git a/source/components/hsm/linux/import-keys-certs.rst b/source/components/hsm/linux/import-keys-certs.rst deleted file mode 100644 index 95ee7978a4..0000000000 --- a/source/components/hsm/linux/import-keys-certs.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../import-keys-certs.rst.inc - diff --git a/source/components/hsm/linux/index.rst b/source/components/hsm/linux/index.rst deleted file mode 100644 index edb30900b2..0000000000 --- a/source/components/hsm/linux/index.rst +++ /dev/null @@ -1,30 +0,0 @@ -Nitrokey HSM with GNU/Linux -=========================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Install `OpenSC `__. You need - at least version 0.19. You can find recent builds for debian-based - systems like Ubuntu - `here `__ if your system - does not have the newest version of OpenSC. Alternatively, install - `this `__ - driver (`source `__). -2. Define SO-PIN and PIN of your own choices. See `these - instructions `__. - Afterwards you can begin to `generate new - keys `__. - -Your Nitrokey is now ready to use. - -* There is `nitrotool `__ as a more comfortable frontend to OpenSC. (hsmwiz) -* Embedded Systems: For systems with minimal memory footprint a read/only PKCS#11 module is provided by the `sc-hsm-embedded `__ project. -* `This PKCS#11 module `__ is useful for deployments where key generation at the user's workplace is not required. The PKCS#11 module also supports major electronic signature cards available in the German market. -* OpenSCDP: The SmartCard-HSM is fully integrated with `OpenSCDP `__, the open smart card development platform. See the `public support scripts `__ for details. diff --git a/source/components/hsm/linux/ipsec.rst b/source/components/hsm/linux/ipsec.rst deleted file mode 100644 index 4e0695fd04..0000000000 --- a/source/components/hsm/linux/ipsec.rst +++ /dev/null @@ -1,4 +0,0 @@ -IPsec -===== - -.. include:: ../ipsec.rst.inc diff --git a/source/components/hsm/linux/n-of-m-schemes.rst b/source/components/hsm/linux/n-of-m-schemes.rst deleted file mode 100644 index 37e1d8d430..0000000000 --- a/source/components/hsm/linux/n-of-m-schemes.rst +++ /dev/null @@ -1,5 +0,0 @@ -N-of-m Schemes -============== - -.. include:: ../n-of-m-schemes.rst - diff --git a/source/components/hsm/linux/pkcs11-url.rst b/source/components/hsm/linux/pkcs11-url.rst deleted file mode 100644 index 5ad8f40b7a..0000000000 --- a/source/components/hsm/linux/pkcs11-url.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../pkcs11-url.rst.inc - diff --git a/source/components/hsm/linux/smime-outlook.rst b/source/components/hsm/linux/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/hsm/linux/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/hsm/linux/smime-thunderbird.rst b/source/components/hsm/linux/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/hsm/linux/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/hsm/linux/smime.rst b/source/components/hsm/linux/smime.rst deleted file mode 100644 index 9a7ca24e7c..0000000000 --- a/source/components/hsm/linux/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime.rst.inc diff --git a/source/components/hsm/linux/stunnel.rst b/source/components/hsm/linux/stunnel.rst deleted file mode 100644 index 263c7fdc22..0000000000 --- a/source/components/hsm/linux/stunnel.rst +++ /dev/null @@ -1,4 +0,0 @@ -Stunnel -======= - -.. include:: ../stunnel.rst.inc diff --git a/source/components/hsm/mac/apache2-tls.rst b/source/components/hsm/mac/apache2-tls.rst deleted file mode 100644 index 9d6b689cb1..0000000000 --- a/source/components/hsm/mac/apache2-tls.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../apache2-tls.rst.inc - diff --git a/source/components/hsm/mac/certificate-authority.rst b/source/components/hsm/mac/certificate-authority.rst deleted file mode 100644 index d414fc892f..0000000000 --- a/source/components/hsm/mac/certificate-authority.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../certificate-authority.rst.inc diff --git a/source/components/hsm/mac/gpa.rst b/source/components/hsm/mac/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/hsm/mac/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/hsm/mac/hard-disk-encryption.rst b/source/components/hsm/mac/hard-disk-encryption.rst deleted file mode 100644 index 97111bfd66..0000000000 --- a/source/components/hsm/mac/hard-disk-encryption.rst +++ /dev/null @@ -1,4 +0,0 @@ -Hard Disk Encryption -=========================== - -.. include:: ../../pro/hard-disk-encryption.rst.inc diff --git a/source/components/hsm/mac/import-keys-certs.rst b/source/components/hsm/mac/import-keys-certs.rst deleted file mode 100644 index 95ee7978a4..0000000000 --- a/source/components/hsm/mac/import-keys-certs.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../import-keys-certs.rst.inc - diff --git a/source/components/hsm/mac/index.rst b/source/components/hsm/mac/index.rst deleted file mode 100644 index 66fe944024..0000000000 --- a/source/components/hsm/mac/index.rst +++ /dev/null @@ -1,27 +0,0 @@ -Nitrokey HSM with macOS -======================= - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Install `OpenSC `__. - Alternatively, install - `this `__ - driver (`source `__). -2. Define SO-PIN and PIN of your own choices. See `these - instructions `__. - Afterwards you can begin to `generate new - keys `__. - -Your Nitrokey is now ready to use. - -* There is `nitrotool `__ as a more comfortable frontend to OpenSC. (hsmwiz) -* Embedded Systems: For systems with minimal memory footprint a read/only PKCS#11 module is provided by the `sc-hsm-embedded `__ project. -* `This PKCS#11 module `__ is useful for deployments where key generation at the user's workplace is not required. The PKCS#11 module also supports major electronic signature cards available in the German market. -* OpenSCDP: The SmartCard-HSM is fully integrated with `OpenSCDP `__, the open smart card development platform. See the `public support scripts `__ for details. diff --git a/source/components/hsm/mac/pkcs11-url.rst b/source/components/hsm/mac/pkcs11-url.rst deleted file mode 100644 index 5ad8f40b7a..0000000000 --- a/source/components/hsm/mac/pkcs11-url.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../pkcs11-url.rst.inc - diff --git a/source/components/hsm/mac/smime-outlook.rst b/source/components/hsm/mac/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/hsm/mac/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/hsm/mac/smime-thunderbird.rst b/source/components/hsm/mac/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/hsm/mac/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/hsm/mac/smime.rst b/source/components/hsm/mac/smime.rst deleted file mode 100644 index 9a7ca24e7c..0000000000 --- a/source/components/hsm/mac/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime.rst.inc diff --git a/source/components/hsm/smime.rst.inc b/source/components/hsm/smime.rst.inc deleted file mode 100644 index 6f5038a91c..0000000000 --- a/source/components/hsm/smime.rst.inc +++ /dev/null @@ -1,64 +0,0 @@ -S/MIME Email Encryption -======================= - -.. contents:: :local: - -Prerequisites -------------- - -There are two widely used standards for email encryption. - -- OpenPGP/GnuPG is popular among individuals, - -- S/MIME/X.509 is mostly used by enterprises. - -The Nitrokey HSM 2 currently supports the S/MIME/X.509 standard. This page describes the usage of S/MIME email encryption. - -You need to purchase a S/MIME certificate (e.g. at `CERTUM `__) or may already got one by your company. Furthermore, you need to install `OpenSC `__ on your System. While GNU/Linux users usually can install OpenSC over the package manager (e.g. ``sudo apt install opensc`` on Ubuntu), macOS and Windows users can download the installation files from the `OpenSC `__ page. - -Import Existing Key and Certificate ------------------------------------ - -The following instructions are based on the `wiki of OpenSC `__. We will assume, that you already got a key-certificate pair as a .p12 file. Please have a look at the wiki page, if you got a separate key and certificate file. - -To open the Windows command line please push the Windows-key and R-key. Now type ‘cmd.exe’ in the text field and hit enter. To open a Terminal on macOS or GNU/Linux please use the application search (e.g. spotlight on macOS). - -To make these commands as simple as possible, the .p12 file needs to be in your home folder. On Windows this is usually ``C:\Users\yourusername`` and on macOS and GNU/Linux system it will be ``/home/yourusername``. If you do not store the .p12 file there, you have to adapt the path in the commands below. Please plug in the Nitrokey before submitting the commands. - -Assuming that your key-certificate file reads ‘myprivate.p12’ the commands for Windows looks like this: - -.. code-block:: bash - - "C:\Program Files\OpenSC Project\OpenSC\tools\pkcs15-init" --delete-objects privkey,pubkey --id 3 --store-private-key myprivate.p12 --format pkcs12 --auth-id 3 --verify-pin - "C:\Program Files\OpenSC Project\OpenSC\tools\pkcs15-init" --delete-objects privkey,pubkey --id 2 --store-private-key myprivate.p12 --format pkcs12 --auth-id 3 --verify-pin - -and on macOS and GNU/Linux it will be - -.. code-block:: bash - - $ pkcs15-init --delete-objects privkey,pubkey --id 3 --store-private-key myprivate.p12 --format pkcs12 --auth-id 3 --verify-pin - $ pkcs15-init --delete-objects privkey,pubkey --id 2 --store-private-key myprivate.p12 --format pkcs12 --auth-id 3 --verify-pin - -The two commands copy the key-certificate pair to the slot 2 (needed for decrypting emails) and slot 3 (needed for signing). The output looks on both systems something like this: - -.. figure:: /components/pro/images/smime/1.png - :alt: img1 - - - -Please note that there will be error messages that can be safely ignored (see output example above). You now have the key-certificate pair loaded on the Nitrokey. - -Usage ------ - -You can find further information about the usage on these pages: - -- for using `S/MIME encryption on - Thunderbird `_ - -- for using `S/MIME encryption on - Outlook `_ - -- for using - `Evolution `__, - an email client for the Gnome Desktop on Linux systems diff --git a/source/components/hsm/stunnel.rst.inc b/source/components/hsm/stunnel.rst.inc deleted file mode 100644 index 4869e58c9f..0000000000 --- a/source/components/hsm/stunnel.rst.inc +++ /dev/null @@ -1,19 +0,0 @@ -.. contents:: :local: - -`Stunnel `__ works as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. - -Stunnel is able to load OpenSC PKCS#11 engine using this configuration: - -.. code-block:: bash - - engine=dynamic - engineCtrl=SO_PATH:/usr/lib/opensc/engine_pkcs11.so - engineCtrl=ID:pkcs11 - engineCtrl=LIST_ADD:1 - engineCtrl=LOAD - engineCtrl=MODULE_PATH:/usr/lib/pkcs11/opensc-pkcs11.so - engineCtrl=INIT - - [service] - engineNum=1 - key=id_45 diff --git a/source/components/hsm/windows/apache2-tls.rst b/source/components/hsm/windows/apache2-tls.rst deleted file mode 100644 index 9d6b689cb1..0000000000 --- a/source/components/hsm/windows/apache2-tls.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../apache2-tls.rst.inc - diff --git a/source/components/hsm/windows/certificate-authority.rst b/source/components/hsm/windows/certificate-authority.rst deleted file mode 100644 index d414fc892f..0000000000 --- a/source/components/hsm/windows/certificate-authority.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../certificate-authority.rst.inc diff --git a/source/components/hsm/windows/gpa.rst b/source/components/hsm/windows/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/hsm/windows/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/hsm/windows/hard-disk-encryption.rst b/source/components/hsm/windows/hard-disk-encryption.rst deleted file mode 100644 index 7a15e069ec..0000000000 --- a/source/components/hsm/windows/hard-disk-encryption.rst +++ /dev/null @@ -1,4 +0,0 @@ -Hard Disk Encryption -=========================== - -.. include:: ../../pro/hard-disk-encryption.rst.inc diff --git a/source/components/hsm/windows/import-keys-certs.rst b/source/components/hsm/windows/import-keys-certs.rst deleted file mode 100644 index 95ee7978a4..0000000000 --- a/source/components/hsm/windows/import-keys-certs.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../import-keys-certs.rst.inc - diff --git a/source/components/hsm/windows/index.rst b/source/components/hsm/windows/index.rst deleted file mode 100644 index b508ac7ff0..0000000000 --- a/source/components/hsm/windows/index.rst +++ /dev/null @@ -1,27 +0,0 @@ -Nitrokey HSM With Windows -========================= - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Install `OpenSC `__. - Alternatively, install - `this `__ - driver (`source `__). -2. Define SO-PIN and PIN of your own choices. See `these - instructions `__. - Afterwards you can begin to `generate new - keys `__. - -Your Nitrokey is now ready to use. - -* There is `nitrotool `__ as a more comfortable frontend to OpenSC. (hsmwiz) -* Embedded Systems: For systems with minimal memory footprint a read/only PKCS#11 module is provided by the `sc-hsm-embedded `__ project. -* `This PKCS#11 module `__ is useful for deployments where key generation at the user's workplace is not required. The PKCS#11 module also supports major electronic signature cards available in the German market. -* OpenSCDP: The SmartCard-HSM is fully integrated with `OpenSCDP `__, the open smart card development platform. See the `public support scripts `__ for details. diff --git a/source/components/hsm/windows/pkcs11-url.rst b/source/components/hsm/windows/pkcs11-url.rst deleted file mode 100644 index 5ad8f40b7a..0000000000 --- a/source/components/hsm/windows/pkcs11-url.rst +++ /dev/null @@ -1,4 +0,0 @@ - - -.. include:: ../pkcs11-url.rst.inc - diff --git a/source/components/hsm/windows/smart-policy.rst b/source/components/hsm/windows/smart-policy.rst deleted file mode 100644 index 7f85805135..0000000000 --- a/source/components/hsm/windows/smart-policy.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smart-policy.rst.inc diff --git a/source/components/hsm/windows/smime-outlook.rst b/source/components/hsm/windows/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/hsm/windows/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/hsm/windows/smime-thunderbird.rst b/source/components/hsm/windows/smime-thunderbird.rst deleted file mode 100644 index 2167f1b220..0000000000 --- a/source/components/hsm/windows/smime-thunderbird.rst +++ /dev/null @@ -1,2 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc - diff --git a/source/components/hsm/windows/smime.rst b/source/components/hsm/windows/smime.rst deleted file mode 100644 index 7080df4aeb..0000000000 --- a/source/components/hsm/windows/smime.rst +++ /dev/null @@ -1,8 +0,0 @@ -.. include:: ../smime.rst.inc - :end-line: 20 - -.. note:: - Windows users with 64-bit system (standard) need to install both, the 32-bit and the 64-bit version of OpenSC! - -.. include:: ../smime.rst.inc - :start-line: 20 diff --git a/source/components/nitrokey3/index.rst b/source/components/nitrokey3/index.rst deleted file mode 100644 index c14556df2d..0000000000 --- a/source/components/nitrokey3/index.rst +++ /dev/null @@ -1,35 +0,0 @@ -Nitrokey 3 -========== - -.. contents:: :local: - -The Nitrokey 3 currently supports: - -* FIDO2 -* Password-Safe & One-Time Passwords (OTP) -* OpenPGP Card (`Secure Element Backend or Software Backend`_) - -Additional features like PIV are available in test firmware releases. See the `release notes`_ on GitHub for more information. - -.. _Secure Element Backend or Software Backend: faq#how-can-I-use-the-se050-secure-element -.. _release notes: https://github.com/Nitrokey/nitrokey-3-firmware/releases - -First check the: - -.. toctree:: - :maxdepth: 1 - :glob: - - Frequently Asked Questions - features - -Or choose your operating system: - -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - diff --git a/source/components/nitrokey3/linux/2fa-odoo.rst b/source/components/nitrokey3/linux/2fa-odoo.rst deleted file mode 100644 index b4591596e0..0000000000 --- a/source/components/nitrokey3/linux/2fa-odoo.rst +++ /dev/null @@ -1,2 +0,0 @@ - -.. include:: ../../fido2/2fa-odoo.rst.inc diff --git a/source/components/nitrokey3/linux/adsk.rst b/source/components/nitrokey3/linux/adsk.rst deleted file mode 100644 index 00ce644292..0000000000 --- a/source/components/nitrokey3/linux/adsk.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../nitrokey3/adsk.rst.inc diff --git a/source/components/nitrokey3/linux/desktop-login.rst b/source/components/nitrokey3/linux/desktop-login.rst deleted file mode 100644 index 11e6d5e5c6..0000000000 --- a/source/components/nitrokey3/linux/desktop-login.rst +++ /dev/null @@ -1,3 +0,0 @@ - -.. include:: ../../fido2/linux/desktop-login.rst - diff --git a/source/components/nitrokey3/linux/firmware-update.rst b/source/components/nitrokey3/linux/firmware-update.rst deleted file mode 100644 index ba622ba13a..0000000000 --- a/source/components/nitrokey3/linux/firmware-update.rst +++ /dev/null @@ -1,16 +0,0 @@ -.. include:: ../firmware-update.rst.inc - -Troubleshooting: ----------------- - -**Issue:** I get ``permission denied for /dev/hidrawX`` during update. - This likely means your user has not the needed permissions to - read/write the device. Please make sure you have set up the correct - `udev-rules`_. Download this `udev-rules`_ set and place it in your - udev rules directory (e.g., ``/etc/udev/rules.d``). Then remove - your Nitrokey 3 from the USB slot and run: - ``udevadm control --reload-rules && udevadm trigger`` or reboot - your machine. Afterwards the update should work without the - permission issue. - -.. _udev-rules: https://raw.githubusercontent.com/Nitrokey/libnitrokey/master/data/41-nitrokey.rules diff --git a/source/components/nitrokey3/linux/images b/source/components/nitrokey3/linux/images deleted file mode 120000 index c7bda842dd..0000000000 --- a/source/components/nitrokey3/linux/images +++ /dev/null @@ -1 +0,0 @@ -../../fido2/linux/images/ \ No newline at end of file diff --git a/source/components/nitrokey3/linux/index.rst b/source/components/nitrokey3/linux/index.rst deleted file mode 100644 index 18d9b204cf..0000000000 --- a/source/components/nitrokey3/linux/index.rst +++ /dev/null @@ -1,13 +0,0 @@ -Nitrokey 3 With Linux -=========================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/main.rst diff --git a/source/components/nitrokey3/linux/keepassxc.rst b/source/components/nitrokey3/linux/keepassxc.rst deleted file mode 100644 index 148bcb82bd..0000000000 --- a/source/components/nitrokey3/linux/keepassxc.rst +++ /dev/null @@ -1,2 +0,0 @@ - -.. include:: ../../software/nk-app2/keepassxc.rst diff --git a/source/components/nitrokey3/linux/nitropy.rst b/source/components/nitrokey3/linux/nitropy.rst deleted file mode 100644 index 4cb4985709..0000000000 --- a/source/components/nitrokey3/linux/nitropy.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/nitropy.rst diff --git a/source/components/nitrokey3/linux/openpgp-keygen-backup.rst b/source/components/nitrokey3/linux/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/nitrokey3/linux/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/nitrokey3/linux/openpgp-keygen-gpa.rst b/source/components/nitrokey3/linux/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/nitrokey3/linux/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/nitrokey3/linux/openpgp-keygen-on-device.rst b/source/components/nitrokey3/linux/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/nitrokey3/linux/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/nitrokey3/linux/openpgp-outlook.rst b/source/components/nitrokey3/linux/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/nitrokey3/linux/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/nitrokey3/linux/openpgp-thunderbird.rst b/source/components/nitrokey3/linux/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/nitrokey3/linux/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/nitrokey3/linux/openpgp-uif.rst b/source/components/nitrokey3/linux/openpgp-uif.rst deleted file mode 100644 index 05f0ae6925..0000000000 --- a/source/components/nitrokey3/linux/openpgp-uif.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/openpgp-uif.rst.inc diff --git a/source/components/nitrokey3/linux/openpgp.rst b/source/components/nitrokey3/linux/openpgp.rst deleted file mode 100644 index ce0f581887..0000000000 --- a/source/components/nitrokey3/linux/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/openpgp.rst.inc diff --git a/source/components/nitrokey3/linux/reset.rst b/source/components/nitrokey3/linux/reset.rst deleted file mode 100644 index 3454a004c3..0000000000 --- a/source/components/nitrokey3/linux/reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/reset.rst.inc diff --git a/source/components/nitrokey3/linux/set-pins.rst b/source/components/nitrokey3/linux/set-pins.rst deleted file mode 100644 index 9c6dfe6d81..0000000000 --- a/source/components/nitrokey3/linux/set-pins.rst +++ /dev/null @@ -1,21 +0,0 @@ -.. include:: ../shared/set-pins.rst.inc - :start-after: start-header - :end-before: end-header -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-header - :end-before: end-fido2-header -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-nitropy - :end-before: end-fido2-nitropy -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-chromeium - :end-before: end-fido2-chromeium -.. include:: ../shared/set-pins.rst.inc - :start-after: start-passwords-otp-secrets - :end-before: end-passwords-otp-secrets -.. include:: ../shared/set-pins.rst.inc - :start-after: start-openpgp-card - :end-before: end-openpgp-card -.. include:: ../shared/set-pins.rst.inc - :start-after: start-piv-card - :end-before: end-piv-card diff --git a/source/components/nitrokey3/linux/smime-outlook.rst b/source/components/nitrokey3/linux/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/nitrokey3/linux/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/nitrokey3/linux/smime-thunderbird.rst b/source/components/nitrokey3/linux/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/nitrokey3/linux/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/nitrokey3/linux/smime.rst b/source/components/nitrokey3/linux/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/nitrokey3/linux/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/nitrokey3/linux/troubleshooting.rst b/source/components/nitrokey3/linux/troubleshooting.rst deleted file mode 100644 index 71e54fdba1..0000000000 --- a/source/components/nitrokey3/linux/troubleshooting.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../nitrokey3/troubleshooting.rst.inc diff --git a/source/components/nitrokey3/mac/2fa-odoo.rst b/source/components/nitrokey3/mac/2fa-odoo.rst deleted file mode 100644 index b4591596e0..0000000000 --- a/source/components/nitrokey3/mac/2fa-odoo.rst +++ /dev/null @@ -1,2 +0,0 @@ - -.. include:: ../../fido2/2fa-odoo.rst.inc diff --git a/source/components/nitrokey3/mac/adsk.rst b/source/components/nitrokey3/mac/adsk.rst deleted file mode 100644 index 00ce644292..0000000000 --- a/source/components/nitrokey3/mac/adsk.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../nitrokey3/adsk.rst.inc diff --git a/source/components/nitrokey3/mac/firmware-update.rst b/source/components/nitrokey3/mac/firmware-update.rst deleted file mode 100644 index 97c722b20c..0000000000 --- a/source/components/nitrokey3/mac/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../firmware-update.rst.inc diff --git a/source/components/nitrokey3/mac/index.rst b/source/components/nitrokey3/mac/index.rst deleted file mode 100644 index be61a80b8a..0000000000 --- a/source/components/nitrokey3/mac/index.rst +++ /dev/null @@ -1,13 +0,0 @@ -Nitrokey 3 With macOS -===================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/main.rst diff --git a/source/components/nitrokey3/mac/keepassxc.rst b/source/components/nitrokey3/mac/keepassxc.rst deleted file mode 100644 index 148bcb82bd..0000000000 --- a/source/components/nitrokey3/mac/keepassxc.rst +++ /dev/null @@ -1,2 +0,0 @@ - -.. include:: ../../software/nk-app2/keepassxc.rst diff --git a/source/components/nitrokey3/mac/nitropy.rst b/source/components/nitrokey3/mac/nitropy.rst deleted file mode 100644 index 4cb4985709..0000000000 --- a/source/components/nitrokey3/mac/nitropy.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/nitropy.rst diff --git a/source/components/nitrokey3/mac/openpgp-keygen-backup.rst b/source/components/nitrokey3/mac/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/nitrokey3/mac/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/nitrokey3/mac/openpgp-keygen-gpa.rst b/source/components/nitrokey3/mac/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/nitrokey3/mac/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/nitrokey3/mac/openpgp-keygen-on-device.rst b/source/components/nitrokey3/mac/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/nitrokey3/mac/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/nitrokey3/mac/openpgp-outlook.rst b/source/components/nitrokey3/mac/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/nitrokey3/mac/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/nitrokey3/mac/openpgp-thunderbird.rst b/source/components/nitrokey3/mac/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/nitrokey3/mac/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/nitrokey3/mac/openpgp-uif.rst b/source/components/nitrokey3/mac/openpgp-uif.rst deleted file mode 100644 index 3a7dcc6aa7..0000000000 --- a/source/components/nitrokey3/mac/openpgp-uif.rst +++ /dev/null @@ -1,2 +0,0 @@ -.. include:: ../shared/openpgp-uif.rst.inc - diff --git a/source/components/nitrokey3/mac/openpgp.rst b/source/components/nitrokey3/mac/openpgp.rst deleted file mode 100644 index ce0f581887..0000000000 --- a/source/components/nitrokey3/mac/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/openpgp.rst.inc diff --git a/source/components/nitrokey3/mac/reset.rst b/source/components/nitrokey3/mac/reset.rst deleted file mode 100644 index 3454a004c3..0000000000 --- a/source/components/nitrokey3/mac/reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/reset.rst.inc diff --git a/source/components/nitrokey3/mac/set-pins.rst b/source/components/nitrokey3/mac/set-pins.rst deleted file mode 100644 index 9c6dfe6d81..0000000000 --- a/source/components/nitrokey3/mac/set-pins.rst +++ /dev/null @@ -1,21 +0,0 @@ -.. include:: ../shared/set-pins.rst.inc - :start-after: start-header - :end-before: end-header -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-header - :end-before: end-fido2-header -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-nitropy - :end-before: end-fido2-nitropy -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-chromeium - :end-before: end-fido2-chromeium -.. include:: ../shared/set-pins.rst.inc - :start-after: start-passwords-otp-secrets - :end-before: end-passwords-otp-secrets -.. include:: ../shared/set-pins.rst.inc - :start-after: start-openpgp-card - :end-before: end-openpgp-card -.. include:: ../shared/set-pins.rst.inc - :start-after: start-piv-card - :end-before: end-piv-card diff --git a/source/components/nitrokey3/mac/smime-outlook.rst b/source/components/nitrokey3/mac/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/nitrokey3/mac/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/nitrokey3/mac/smime-thunderbird.rst b/source/components/nitrokey3/mac/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/nitrokey3/mac/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/nitrokey3/mac/smime.rst b/source/components/nitrokey3/mac/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/nitrokey3/mac/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/nitrokey3/mac/troubleshooting.rst b/source/components/nitrokey3/mac/troubleshooting.rst deleted file mode 100644 index 71e54fdba1..0000000000 --- a/source/components/nitrokey3/mac/troubleshooting.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../nitrokey3/troubleshooting.rst.inc diff --git a/source/components/nitrokey3/shared/openpgp.rst.inc b/source/components/nitrokey3/shared/openpgp.rst.inc deleted file mode 100644 index c7efd1430d..0000000000 --- a/source/components/nitrokey3/shared/openpgp.rst.inc +++ /dev/null @@ -1,10 +0,0 @@ -OpenPGP Email Encryption -======================== - -.. contents:: :local: - -.. note:: - OpenPGP support was introduced with the `1.4.0 release of the Nitrokey 3 `_ firmware. - If you have an older version, `update your firmware `_ - -.. include:: ../../shared/openpgp.rst.inc diff --git a/source/components/nitrokey3/windows/2fa-odoo.rst b/source/components/nitrokey3/windows/2fa-odoo.rst deleted file mode 100644 index b4591596e0..0000000000 --- a/source/components/nitrokey3/windows/2fa-odoo.rst +++ /dev/null @@ -1,2 +0,0 @@ - -.. include:: ../../fido2/2fa-odoo.rst.inc diff --git a/source/components/nitrokey3/windows/adsk.rst b/source/components/nitrokey3/windows/adsk.rst deleted file mode 100644 index 00ce644292..0000000000 --- a/source/components/nitrokey3/windows/adsk.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../nitrokey3/adsk.rst.inc diff --git a/source/components/nitrokey3/windows/firmware-update.rst b/source/components/nitrokey3/windows/firmware-update.rst deleted file mode 100644 index 97c722b20c..0000000000 --- a/source/components/nitrokey3/windows/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../firmware-update.rst.inc diff --git a/source/components/nitrokey3/windows/images/enabling-u2f-on-firefox b/source/components/nitrokey3/windows/images/enabling-u2f-on-firefox deleted file mode 120000 index 93ed840643..0000000000 --- a/source/components/nitrokey3/windows/images/enabling-u2f-on-firefox +++ /dev/null @@ -1 +0,0 @@ -../../../fido2/windows/images/enabling-u2f-on-firefox \ No newline at end of file diff --git a/source/components/nitrokey3/windows/images/passwordless-microsoft b/source/components/nitrokey3/windows/images/passwordless-microsoft deleted file mode 120000 index 0164bec391..0000000000 --- a/source/components/nitrokey3/windows/images/passwordless-microsoft +++ /dev/null @@ -1 +0,0 @@ -../../../fido2/windows/images/passwordless-microsoft \ No newline at end of file diff --git a/source/components/nitrokey3/windows/index.rst b/source/components/nitrokey3/windows/index.rst deleted file mode 100644 index 12fbaee4f2..0000000000 --- a/source/components/nitrokey3/windows/index.rst +++ /dev/null @@ -1,14 +0,0 @@ -Nitrokey 3 With Windows -=========================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - piv/index.rst - -.. include:: ../shared/main.rst diff --git a/source/components/nitrokey3/windows/keepassxc.rst b/source/components/nitrokey3/windows/keepassxc.rst deleted file mode 100644 index 148bcb82bd..0000000000 --- a/source/components/nitrokey3/windows/keepassxc.rst +++ /dev/null @@ -1,2 +0,0 @@ - -.. include:: ../../software/nk-app2/keepassxc.rst diff --git a/source/components/nitrokey3/windows/openpgp-csp.rst b/source/components/nitrokey3/windows/openpgp-csp.rst deleted file mode 100644 index 947e69d379..0000000000 --- a/source/components/nitrokey3/windows/openpgp-csp.rst +++ /dev/null @@ -1,2 +0,0 @@ -.. include:: ../../pro/windows/openpgp-csp.rst - diff --git a/source/components/nitrokey3/windows/openpgp-keygen-backup.rst b/source/components/nitrokey3/windows/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/nitrokey3/windows/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/nitrokey3/windows/openpgp-keygen-gpa.rst b/source/components/nitrokey3/windows/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/nitrokey3/windows/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/nitrokey3/windows/openpgp-keygen-on-device.rst b/source/components/nitrokey3/windows/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/nitrokey3/windows/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/nitrokey3/windows/openpgp-outlook.rst b/source/components/nitrokey3/windows/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/nitrokey3/windows/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/nitrokey3/windows/openpgp-thunderbird.rst b/source/components/nitrokey3/windows/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/nitrokey3/windows/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/nitrokey3/windows/openpgp-uif.rst b/source/components/nitrokey3/windows/openpgp-uif.rst deleted file mode 100644 index 05f0ae6925..0000000000 --- a/source/components/nitrokey3/windows/openpgp-uif.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/openpgp-uif.rst.inc diff --git a/source/components/nitrokey3/windows/openpgp.rst b/source/components/nitrokey3/windows/openpgp.rst deleted file mode 100644 index ce0f581887..0000000000 --- a/source/components/nitrokey3/windows/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/openpgp.rst.inc diff --git a/source/components/nitrokey3/windows/passwordless-microsoft.rst b/source/components/nitrokey3/windows/passwordless-microsoft.rst deleted file mode 100644 index d934d793b4..0000000000 --- a/source/components/nitrokey3/windows/passwordless-microsoft.rst +++ /dev/null @@ -1,4 +0,0 @@ - - - -.. include:: ../../fido2/windows/passwordless-microsoft.rst diff --git a/source/components/nitrokey3/windows/piv/index.rst b/source/components/nitrokey3/windows/piv/index.rst deleted file mode 100644 index cbcc6557cc..0000000000 --- a/source/components/nitrokey3/windows/piv/index.rst +++ /dev/null @@ -1,22 +0,0 @@ -PIV (Personal Identity Verification) -==================================== - -.. warning:: - The PIV application of the Nitrokey 3 is currently considered unstable and is not available on the stable firmware releases. - To obtain that functionality it is required to install a test firmware. - Subsequent firmware updates may lead to loss of data and cryptographic keys. - Please refer to `the firmware update documentation <../firmware-update.html#firmware-release-types>`__ for more information. - -The *Personal Identity Verfication* (PIV) is based on the NIST special publication `SP 800-73 `__. - -.. toctree:: - :hidden: - :maxdepth: 1 - :glob: - - access_control.rst - certificate_management.rst - factory_reset.rst - key_management.rst - - guides/index.rst diff --git a/source/components/nitrokey3/windows/reset.rst b/source/components/nitrokey3/windows/reset.rst deleted file mode 100644 index 3454a004c3..0000000000 --- a/source/components/nitrokey3/windows/reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../shared/reset.rst.inc diff --git a/source/components/nitrokey3/windows/set-pins.rst b/source/components/nitrokey3/windows/set-pins.rst deleted file mode 100644 index 5d41ae818e..0000000000 --- a/source/components/nitrokey3/windows/set-pins.rst +++ /dev/null @@ -1,24 +0,0 @@ -.. include:: ../shared/set-pins.rst.inc - :start-after: start-header - :end-before: end-header -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-header - :end-before: end-fido2-header -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-nitropy - :end-before: end-fido2-nitropy -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-windows-settings-application - :end-before: start-fido2-windows-settings-application -.. include:: ../shared/set-pins.rst.inc - :start-after: start-fido2-chromeium - :end-before: end-fido2-chromeium -.. include:: ../shared/set-pins.rst.inc - :start-after: start-passwords-otp-secrets - :end-before: end-passwords-otp-secrets -.. include:: ../shared/set-pins.rst.inc - :start-after: start-openpgp-card - :end-before: end-openpgp-card -.. include:: ../shared/set-pins.rst.inc - :start-after: start-piv-card - :end-before: end-piv-card diff --git a/source/components/nitrokey3/windows/smime-outlook.rst b/source/components/nitrokey3/windows/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/nitrokey3/windows/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/nitrokey3/windows/smime-thunderbird.rst b/source/components/nitrokey3/windows/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/nitrokey3/windows/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/nitrokey3/windows/smime.rst b/source/components/nitrokey3/windows/smime.rst deleted file mode 100644 index cd746658c8..0000000000 --- a/source/components/nitrokey3/windows/smime.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. include:: ../../pro/smime.rst.inc - :end-line: 20 - -.. note:: - Windows users with 64-bit system (standard) need to install both, the 32-bit and the 64-bit version of OpenSC! - -.. include:: ../../pro/smime.rst.inc - :start-line: 20 - diff --git a/source/components/nitrokey3/windows/troubleshooting.rst b/source/components/nitrokey3/windows/troubleshooting.rst deleted file mode 100644 index 71e54fdba1..0000000000 --- a/source/components/nitrokey3/windows/troubleshooting.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../nitrokey3/troubleshooting.rst.inc diff --git a/source/components/storage/encrypted-mobile-storage.rst b/source/components/nitrokeys/features/encrypted-storage/index.rst similarity index 57% rename from source/components/storage/encrypted-mobile-storage.rst rename to source/components/nitrokeys/features/encrypted-storage/index.rst index 3495423960..469934c1d0 100644 --- a/source/components/storage/encrypted-mobile-storage.rst +++ b/source/components/nitrokeys/features/encrypted-storage/index.rst @@ -1,3 +1,29 @@ +Encrypted Mobile Storage +======================== + +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + Prior of using the encrypted mobile storage you need to install and initialize the Nitrokey Storage and download the latest `Nitrokey App `__. 1. Start the Nitrokey App. @@ -8,4 +34,5 @@ Prior of using the encrypted mobile storage you need to install and initialize t 6. To remove or lock the encrypted volume you should unmount/eject it first. 7. Afterwards you can disconnect the Nitrokey or select "lock encrypted volume" from the Nitrokey App menu. -The Nitrokey Storage is able to create hidden volumes as well. Please have a look at the corresponding instructions for `hidden volumes `_. +The Nitrokey Storage is able to create hidden volumes as well. Please have a look at the corresponding instructions for `hidden volumes <../hidden-storage/index.html>`_. + diff --git a/source/components/fido2/windows/images/passwordless-microsoft/1.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/1.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/1.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/1.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/10.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/10.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/10.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/10.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/11.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/11.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/11.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/11.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/12.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/12.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/12.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/12.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/2.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/2.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/2.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/2.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/3.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/3.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/3.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/3.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/4.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/4.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/4.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/4.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/5.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/5.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/5.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/5.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/6.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/6.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/6.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/6.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/7.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/7.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/7.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/7.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/8.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/8.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/8.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/8.png diff --git a/source/components/fido2/windows/images/passwordless-microsoft/9.png b/source/components/nitrokeys/features/fido2/images/passwordless-microsoft/9.png similarity index 100% rename from source/components/fido2/windows/images/passwordless-microsoft/9.png rename to source/components/nitrokeys/features/fido2/images/passwordless-microsoft/9.png diff --git a/source/components/nitrokeys/features/fido2/index.rst b/source/components/nitrokeys/features/fido2/index.rst new file mode 100644 index 0000000000..e97bb27a1c --- /dev/null +++ b/source/components/nitrokeys/features/fido2/index.rst @@ -0,0 +1,35 @@ +FIDO2 +===== + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ✓ + - ✓ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ +.. section products-end + +.. toctree:: + :maxdepth: 1 + :glob: + + Website Login + Nextcloud Login + Passwordless Microsoft Login (Windows only) \ No newline at end of file diff --git a/source/components/nitrokeys/features/fido2/nextcloud.rst b/source/components/nitrokeys/features/fido2/nextcloud.rst new file mode 100644 index 0000000000..0d3eda183d --- /dev/null +++ b/source/components/nitrokeys/features/fido2/nextcloud.rst @@ -0,0 +1,13 @@ +Two-Factor Authentication And Passwordless Login For Nextcloud Accounts +======================================================================= + +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + +These are the basic steps for registering the Nitrokey as a second factor or setting up passwordless login of a Nextcloud account. + +.. raw:: html + + + diff --git a/source/components/fido2/windows/passwordless-microsoft.rst b/source/components/nitrokeys/features/fido2/passwordless-microsoft.rst similarity index 96% rename from source/components/fido2/windows/passwordless-microsoft.rst rename to source/components/nitrokeys/features/fido2/passwordless-microsoft.rst index 61919f8be2..982945373a 100644 --- a/source/components/fido2/windows/passwordless-microsoft.rst +++ b/source/components/nitrokeys/features/fido2/passwordless-microsoft.rst @@ -1,6 +1,10 @@ Passwordless Authentication With Microsoft ========================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: The Nitrokey FIDO2 supports password-less authentication, where entering a password is replaced by logging in with the Nitrokey FIDO2 and a PIN. diff --git a/source/components/nitrokeys/features/fido2/website.rst b/source/components/nitrokeys/features/fido2/website.rst new file mode 100644 index 0000000000..a35f009d74 --- /dev/null +++ b/source/components/nitrokeys/features/fido2/website.rst @@ -0,0 +1,185 @@ +2FA Website Login +================= + +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + +.. contents:: :local: + + +The Nitrokey FIDO2 supports two-factor authentication (2FA) and +passwordless authentication: + +- With **passwordless authentication**, entering a password is replaced + by logging in with the Nitrokey FIDO2 and a PIN. + +- With **two-factor authentication** (2FA), the Nitrokey FIDO2 is + checked in addition to the password. + +The Nitrokey FIDO2 can be used with any current browser. + +.. important:: + + The Nitrokey App can not be used for the Nitrokey FIDO2. + +.. tip:: + + `Check online `__ if your Nitrokey + FIDO2 has the latest firmware installed. + +Passwordless Authentication +--------------------------- + +1. Open a web page that supports FIDO2 (for example + `Google `__). +2. Log in to the website and go to “Passkeys and security keys” in the security + settings of your account. +3. Click on Create passkey. +4. Click on Use a different device. +5. Follow the prompts to set a PIN for your Nitrokey FIDO2. +6. Touch the button of your Nitrokey FIDO2 when prompted. +7. Once you have successfully configured the device, you will need to + activate your Nitrokey FIDO2 this way each time you log in, after + entering your PIN. + + +Touch Button And LED Behavior +----------------------------- + +The first FIDO operation is automatically accepted within two seconds +after connecting Nitrokey FIDO2. In this case touching the touch button +is not required. + +Multiple operations can be accepted by a single touch. For this, keep +the touch button touched for up to 10 seconds. + +To avoid accidental and malicious reset of the Nitrokey, the required +touch confirmation time for the FIDO2 reset operation is longer and with +a distinct LED behavior (red LED light) than normal operations. To reset +the Nitrokey FIDO2, confirm by touching the touch button for at least 5 +seconds until the green or blue LED lights up. + ++-----------------+-----------------+-----------------+-----------------+ +| LED Color | Event | Time Period | Comments | ++=================+=================+=================+=================+ +| Any (blinking) | Awaiting for | Until touch is | | +| | touch | confirmed or | | +| | | timed out | | ++-----------------+-----------------+-----------------+-----------------+ +| Any (blinking | Touch detected, | Until touch is | | +| faster) | counting | confirmed or | | +| | seconds | timed out | | ++-----------------+-----------------+-----------------+-----------------+ +| White (blinks) | Touch request | | Requires 1 | +| | for FIDO | | second touch to | +| | registration or | | complete; | +| | authentication | | timeout is | +| | operation | | usually about | +| | | | 30 seconds | ++-----------------+-----------------+-----------------+-----------------+ +| Yellow (blinks) | Touch request | | Requires 5 | +| | for | | seconds touch | +| | configuration | | to complete; | +| | operation | | e.g. used for | +| | | | activating | +| | | | firmware update | +| | | | mode | ++-----------------+-----------------+-----------------+-----------------+ +| Red (blinks) | Touch request | Available only | Requires 5 | +| | for reset | during the very | seconds touch | +| | operation | first 10 | to complete; | +| | | seconds after | e.g. used for | +| | | Nitrokey is | FIDO2 reset | +| | | powered | operation | ++-----------------+-----------------+-----------------+-----------------+ +| Green | Touch accepted, | After touch was | For the FIDO | +| (constant) | Nitrokey is | registered, 10 | registration or | +| | active and | seconds timeout | authentication | +| | accepting | | operations | +| | further FIDO2 | | after a | +| | operations | | confirmation | +| | | | Nitrokey enters | +| | | | into | +| | | | “activation” | +| | | | mode, | +| | | | auto-accepting | +| | | | any following | +| | | | mentioned | +| | | | operations | +| | | | until touch | +| | | | button is | +| | | | released, but | +| | | | not longer than | +| | | | 10 seconds | ++-----------------+-----------------+-----------------+-----------------+ +| Blue (constant) | Touch consumed | Until touch is | Touch | +| | - accepted and | released | consumption | +| | used up by the | | here means, | +| | operation | | that without | +| | | | releasing the | +| | | | touch button, | +| | | | and touching | +| | | | again the | +| | | | Nitrokey will | +| | | | not confirm any | +| | | | new operations | ++-----------------+-----------------+-----------------+-----------------+ +| White (single | Nitrokey ready | 0.5 seconds | | +| blink) | to work | after powering | | +| | | up | | ++-----------------+-----------------+-----------------+-----------------+ +| (no LED signal) | Nitrokey is | | | +| | idle | | | +| | | | | ++-----------------+-----------------+-----------------+-----------------+ +| (no LED signal) | Auto-accept | Within first 2 | Nitrokey is | +| | single FIDO | seconds after | automatically | +| | registration or | powering up | accepting any | +| | authentication | | single FIDO | +| | operation | | registration or | +| | | | authentication | +| | | | operation upon | +| | | | insertion event | +| | | | - the latter is | +| | | | treated as an | +| | | | equivalent of | +| | | | the touch | +| | | | button | +| | | | registration | +| | | | signal (user | +| | | | presence); the | +| | | | conf | +| | | | iguration/reset | +| | | | operations are | +| | | | not accepted | ++-----------------+-----------------+-----------------+-----------------+ +| All colors | Nitrokey is in | Active until | If the firmware | +| | Firmware Update | firmware update | update fails, | +| | mode | operation is | the Nitrokey | +| | | successful, or | will stay in | +| | | until | the this mode | +| | | reinsertion | until the | +| | | | firmware is | +| | | | written | +| | | | correctly | ++-----------------+-----------------+-----------------+-----------------+ + + +Note: white LED blinking is used as well to signalize the selected device (the so called WINK command). +If you are using Windows, the first time you plug in the Nitrokey it may need some +time to configure the device. + +Troubleshooting (Linux) +----------------------- + +- If the Nitrokey is not accepted immediately, you may need to copy + this file + `41-nitrokey.rules `__ + to ``etc/udev/rules.d/``. In very rare cases, the system will need + the `older + version `__ + of this file. + +- After copying the file, restart udev via + ``sudo service udev restart``. diff --git a/source/components/storage/windows/images/format-dialog.png b/source/components/nitrokeys/features/hidden-storage/images/hidden/format-dialog.png similarity index 100% rename from source/components/storage/windows/images/format-dialog.png rename to source/components/nitrokeys/features/hidden-storage/images/hidden/format-dialog.png diff --git a/source/components/storage/windows/images/format-tool.png b/source/components/nitrokeys/features/hidden-storage/images/hidden/format-tool.png similarity index 100% rename from source/components/storage/windows/images/format-tool.png rename to source/components/nitrokeys/features/hidden-storage/images/hidden/format-tool.png diff --git a/source/components/storage/images/hidden-schema.svg b/source/components/nitrokeys/features/hidden-storage/images/hidden/hidden-schema.svg similarity index 100% rename from source/components/storage/images/hidden-schema.svg rename to source/components/nitrokeys/features/hidden-storage/images/hidden/hidden-schema.svg diff --git a/source/components/storage/linux/images/hidden-storage-partition.png b/source/components/nitrokeys/features/hidden-storage/images/hidden/hidden-storage-partition.png similarity index 100% rename from source/components/storage/linux/images/hidden-storage-partition.png rename to source/components/nitrokeys/features/hidden-storage/images/hidden/hidden-storage-partition.png diff --git a/source/components/storage/images/hidden-storage-passphrase.png b/source/components/nitrokeys/features/hidden-storage/images/hidden/hidden-storage-passphrase.png similarity index 100% rename from source/components/storage/images/hidden-storage-passphrase.png rename to source/components/nitrokeys/features/hidden-storage/images/hidden/hidden-storage-passphrase.png diff --git a/source/components/storage/images/setup_hidden_volume.png b/source/components/nitrokeys/features/hidden-storage/images/hidden/setup_hidden_volume.png similarity index 100% rename from source/components/storage/images/setup_hidden_volume.png rename to source/components/nitrokeys/features/hidden-storage/images/hidden/setup_hidden_volume.png diff --git a/source/components/nitrokeys/features/hidden-storage/index.rst b/source/components/nitrokeys/features/hidden-storage/index.rst new file mode 100644 index 0000000000..19c557a539 --- /dev/null +++ b/source/components/nitrokeys/features/hidden-storage/index.rst @@ -0,0 +1,99 @@ +Hidden Volumes +============== + +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + +Hidden volumes allow hiding data inside of the encrypted volume. This data is protected by an additional passphrase. Without the passphrase, it is impossible to know whether hidden volumes are present. +They are not configured with a default password so that their existence can be `denied plausibly `__. +The concept is similar to `VeraCrypt's/TrueCrypt's hidden volume `__ but with Nitrokey Storage the entire functionality of hidden volumes is implemented in hardware. + +You can configure up to four hidden volumes. Once unlocked, hidden volumes behave like ordinary storage where you can create various partitions, filesystems and store files as you like. + +.. warning:: + If you chose to use hidden volumes, you must not write any data to the encrypted volume, or you risk loosing data in the hidden volume. + +.. note:: + Hidden volumes are hidden within the free space of the encrypted volume, which will be overwritten when writing data to the encrypted volume. + There are no mechanisms to prevent accidental overwritting of hidden data, as they would reveal the existence of hidden volumes. + Data written to the encrypted volume before the creation of the hidden volume can still be read. + +.. figure:: images/hidden/hidden-schema.svg + :alt: Hidden volume description. The hidden volumes are within the free space of the encrypted volume. + + +Configuring hidden volumes +-------------------------- + +.. tip:: + Copy some files to the encrypted volume prior to creating the hidden volume. + +.. note:: + Using a journaling filesystem may risk overwriting the hidden data. The encrypted filesystem is formated to FAT32 by default, and it is recommended to leave it that way when using hidden volumes. + + +1. Unlock the encrypted volume using the Nitrokey App. +2. In the menu, select "setup hidden volume". + + .. figure:: images/hidden/setup_hidden_volume.png + :alt: menu containing the hidden volume setup utility. + +3. Enter a strong passphrase twice. Unlike the encrypted volume PIN, there are no limit to the number of attempts at opening hidden volumes, so the strength of the passphrase is extremely important. +4. Define the storage area to be used. Hidden volumes are stored in the free areas of the encrypted volume. When creating multiple hidden volume, you need to allocate a part of the free area for each volume, making sure they do not overlap. + + .. figure:: images/hidden/hidden-storage-passphrase.png + :alt: Hidden volume dialog box + +Using hidden volumes +-------------------- + +1. Unlock the encrypted volume. + +2. Select "unlock hidden volume" and enter any of the hidden volume's passwords. + +3. + + .. tabs:: + .. tab:: Linux + + If this is the first time you unlock the hidden volume, you may need to create a partition on the hidden volume. You will need to open a partition manager such as `GParted `__ and create one or more partitions manually. Make sure to create the partitions on the device that appeared when unlocking the hidden volume. + + .. figure:: images/hidden/hidden-storage-partition.png + :alt: Hidden volume partitioning + + .. tab:: MacOS + + If this is the first time you unlock the hidden volume, you may need to create a partition on the hidden volume. You will need to use `Disk Utility `__. Make sure to create the partitions on the device that appeared when unlocking the hidden volume. + + .. tab:: Windows + + If this is the first time you unlock the hidden volume, you may need to create a partition on the hidden volume. In this case, Windows will prompt you to do so. You can then format the hidden volume using FAT32, for compatibility with most operating systems. + + + .. figure:: images/hidden/format-dialog.png + :alt: Windows formating prompt + + .. figure:: images/hidden/format-tool.png + :alt: Windows formating tool + +4. Make sure to unmount/eject all partitions on the hidden volumes before locking or disconnecting the Nitrokey. \ No newline at end of file diff --git a/source/components/hsm/apache2-tls.rst.inc b/source/components/nitrokeys/features/hsm/apache2-tls.rst similarity index 97% rename from source/components/hsm/apache2-tls.rst.inc rename to source/components/nitrokeys/features/hsm/apache2-tls.rst index 78a27eafa6..eb7269a511 100644 --- a/source/components/hsm/apache2-tls.rst.inc +++ b/source/components/nitrokeys/features/hsm/apache2-tls.rst @@ -1,6 +1,10 @@ TLS Setup With Apache2 ====================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: .. hint:: @@ -70,7 +74,7 @@ Complete Apache2 Config Example ------------------------------- A complete Apache2 (``VirtualHost``) config snippet might look like this: -.. code-block:: bash +:: SSLPassPhraseDialog "|/bin/echo 123456" diff --git a/source/components/hsm/linux/dnssec.rst b/source/components/nitrokeys/features/hsm/dnssec.rst similarity index 89% rename from source/components/hsm/linux/dnssec.rst rename to source/components/nitrokeys/features/hsm/dnssec.rst index 60a10d0b2b..dcb64e2ad3 100644 --- a/source/components/hsm/linux/dnssec.rst +++ b/source/components/nitrokeys/features/hsm/dnssec.rst @@ -1,6 +1,10 @@ DNSSEC ====================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: diff --git a/source/components/hsm/import-keys-certs.rst.inc b/source/components/nitrokeys/features/hsm/import-keys-certs.rst similarity index 97% rename from source/components/hsm/import-keys-certs.rst.inc rename to source/components/nitrokeys/features/hsm/import-keys-certs.rst index 633a197d5c..758d5d0161 100644 --- a/source/components/hsm/import-keys-certs.rst.inc +++ b/source/components/nitrokeys/features/hsm/import-keys-certs.rst @@ -1,6 +1,10 @@ Importing Keys And Certificates =============================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: Generally the concept to import key-pairs and/or certificates diff --git a/source/components/nitrokeys/features/hsm/index.rst b/source/components/nitrokeys/features/hsm/index.rst new file mode 100644 index 0000000000..42c7c7eee8 --- /dev/null +++ b/source/components/nitrokeys/features/hsm/index.rst @@ -0,0 +1,44 @@ +HSM Features +============ + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ⨯ + - ⨯ + - ⨯ +.. section products-end + +.. toctree:: + :maxdepth: 1 + + SMIME <../openpgp-card/smime/index> + Smart <../openpgp-card/desktop-login/smart-policy> + GPA <../openpgp-card/gpa> + DNSSEC (Linux only) + Hard Disk Encryption <../openpgp-card/hard-disk-encryption/index> + Automatic Screen Lock (Linux only) <../misc/automatic-screen-lock> + Import Keys Certs + Stunnel (Linux only) <../openpgp-card/stunnel> + Certificate Authority <../openpgp-card/certificate-authority> + Ipsec (Linux only) <../openpgp-card/ipsec> + N-of-m Schemes + Pkcs11-URL + Apache 2 TLS \ No newline at end of file diff --git a/source/components/hsm/n-of-m-schemes.rst b/source/components/nitrokeys/features/hsm/n-of-m-schemes.rst similarity index 94% rename from source/components/hsm/n-of-m-schemes.rst rename to source/components/nitrokeys/features/hsm/n-of-m-schemes.rst index 622ac1ba44..f309c6ef01 100644 --- a/source/components/hsm/n-of-m-schemes.rst +++ b/source/components/nitrokeys/features/hsm/n-of-m-schemes.rst @@ -1,3 +1,10 @@ +N-of-m Schemes +============== + +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + The Nitrokey HSM 2 supports two different n-of-m schemes - one for secure sharing of key material/passwords and one for public key authentication to control the access to the device. Please see `this blog post `__ for more detailed information. N-of-m for DKEK Shares diff --git a/source/components/hsm/pkcs11-url.rst.inc b/source/components/nitrokeys/features/hsm/pkcs11-url.rst similarity index 95% rename from source/components/hsm/pkcs11-url.rst.inc rename to source/components/nitrokeys/features/hsm/pkcs11-url.rst index 67302aaa1f..348a3d94bb 100644 --- a/source/components/hsm/pkcs11-url.rst.inc +++ b/source/components/nitrokeys/features/hsm/pkcs11-url.rst @@ -1,6 +1,10 @@ PKCS#11 URL Generation ====================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: @@ -41,7 +45,7 @@ Use the following command to get a list of available tokens (Nitrokeys): Choose the token (Nitrokey) URL you want to generate URL tokens for and use it like this: -.. code-block:: bash +:: p11tool --list-all diff --git a/source/components/nitrokeys/features/index.rst b/source/components/nitrokeys/features/index.rst new file mode 100644 index 0000000000..46cc3be5c0 --- /dev/null +++ b/source/components/nitrokeys/features/index.rst @@ -0,0 +1,17 @@ +Features +======== + +.. toctree:: + :maxdepth: 1 + :glob: + + FIDO2 + U2F + TOTP + OpenPGP card + Password Safe + Encrypted Mobile Storage + Hidden Storage + HSM + PIV (Windows only) + Miscellaneous diff --git a/source/components/pro/linux/automatic-screen-lock.rst b/source/components/nitrokeys/features/misc/automatic-screen-lock.rst similarity index 76% rename from source/components/pro/linux/automatic-screen-lock.rst rename to source/components/nitrokeys/features/misc/automatic-screen-lock.rst index a79abdc700..720a371e87 100644 --- a/source/components/pro/linux/automatic-screen-lock.rst +++ b/source/components/nitrokeys/features/misc/automatic-screen-lock.rst @@ -1,6 +1,31 @@ Automatic Screen Lock at Removal ================================ +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ⨯ + - ✓ +.. section products-end + .. contents:: :local: This guide will walk you through the configuration of your computer, to automatically lock your session when you remove the Nitrokey. diff --git a/source/components/pro/ecc.rst.inc b/source/components/nitrokeys/features/misc/ecc.rst similarity index 91% rename from source/components/pro/ecc.rst.inc rename to source/components/nitrokeys/features/misc/ecc.rst index 7eb28ac0e4..c6563c4d6b 100644 --- a/source/components/pro/ecc.rst.inc +++ b/source/components/nitrokeys/features/misc/ecc.rst @@ -1,6 +1,31 @@ Elliptic Curves (ECC) Support ============================= +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ⨯ + - ✓ +.. section products-end + .. contents:: :local: RSA-2048 Becomes Increasingly Insecure @@ -86,7 +111,7 @@ Now we enter ``gpg2 --card-edit`` and see that brainpoolP256r1 is under Then we create the key. -.. code-block:: bash +:: gpg/card> admin Admin commands are allowed diff --git a/source/components/nitrokeys/features/misc/index.rst b/source/components/nitrokeys/features/misc/index.rst new file mode 100644 index 0000000000..245e11bfcd --- /dev/null +++ b/source/components/nitrokeys/features/misc/index.rst @@ -0,0 +1,8 @@ +Miscellaneous +============= + +.. toctree:: + :maxdepth: 1 + + Automatic Screen Lock + Elliptic Curves (ECC) Support \ No newline at end of file diff --git a/source/components/hsm/certificate-authority.rst.inc b/source/components/nitrokeys/features/openpgp-card/certificate-authority.rst similarity index 97% rename from source/components/hsm/certificate-authority.rst.inc rename to source/components/nitrokeys/features/openpgp-card/certificate-authority.rst index 6e64e24933..b20fe58ee0 100644 --- a/source/components/hsm/certificate-authority.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/certificate-authority.rst @@ -1,6 +1,31 @@ Creating a Certificate Authority ================================ +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + .. contents:: :local: This article shows you how to setup your own private certificate authority backed by a Nitrokey HSM. This certificate authority has no automation and does not really scale. Other open source projects can be referenced for automation and scalability. @@ -57,7 +82,7 @@ Creating The Root Certificate Authority We start by generating the private key for the certificate authority directly on the Nitrokey HSM. This allows us to use the private key in the future, but not access it. -.. code-block:: bash +:: # Generate private key on HSM $ pkcs11-tool -l --keypairgen --key-type EC:secp384r1 --label root @@ -154,7 +179,7 @@ Fill out the request information in with information for your C Generate the self-signed public certificate from the private key. Use the private key id value from earlier. -.. code-block:: bash +:: $ openssl req -config create_root_cert.ini -engine pkcs11 -keyform engine -key e0161cc8b6f5d66ac6835ecdecb623fc0506a675 -new -x509 -days 3650 -sha512 -extensions v3_ca -out ../certs/root.crt engine "pkcs11" set. @@ -162,7 +187,7 @@ Generate the self-signed public certificate from the private key. Use the privat Verify that the root certificate was generated correctly. Verify that Signature-Algorithm matches above and below. Verify that Issuer and Subject match, all root certificates are self signed. Verify that Key Usage matches what was in the v3_ca information in our config file. -.. code-block:: bash +:: $ openssl x509 -noout -text -in ../certs/root.crt Certificate: @@ -212,7 +237,7 @@ Creating The Intermediate Certificate Authority We continue by generating the private key for the intermediate certificate authority directly on the Nitrokey HSM. This allows us to use the private key in the future, but not access it. -.. code-block:: bash +:: # Generate private key on HSM $ pkcs11-tool -l --keypairgen --key-type EC:secp384r1 --label intermediate @@ -276,7 +301,7 @@ Fill out the request information in with information for your C Generate the certificate signing request for the intermediate CA from the intermediate CA’s private key. Use the private key ID value from earlier. -.. code-block:: bash +:: $ openssl req -config create_intermediate_csr.ini -engine pkcs11 -keyform engine -key bcb48fe9b566ae61891aabbfde6a23d4ff3ab639 -new -sha512 -out ../intermediate/csr/intermediate.csr engine "pkcs11" set. @@ -284,7 +309,7 @@ Generate the certificate signing request for the intermediate CA from the interm Verify that the CSR was created correctly. Verify that your Subject is correct. Verify that your Public Key and Signature Algorithm are correct. -.. code-block:: bash +:: $ openssl req -text -noout -verify -in ../intermediate/csr/intermediate.csr verify OK @@ -317,7 +342,7 @@ Verify that the CSR was created correctly. Verify that your Subject is correct. We need to find out the fully qualified PKCS#11 URI for your private key: -.. code-block:: bash +:: $ p11tool --list-all warning: no token URL was provided for this operation; the available tokens are: @@ -413,7 +438,7 @@ Now, we need to create a config file to use the private key of the root certific Then sign the intermediate certificate with the root certificate. -.. code-block:: bash +:: $ openssl ca -config sign_intermediate_csr.ini -engine pkcs11 -keyform engine -extensions v3_intermediate_ca -days 1825 -notext -md sha512 -create_serial -in ../intermediate/csr/intermediate.csr -out ../intermediate/certs/intermediate.crt engine "pkcs11" set. @@ -453,7 +478,7 @@ Then sign the intermediate certificate with the root certificate. Verify that the root certificate was generated correctly. Verify that the Issuer and Subject are different, and correct. Verify that the Key Usage matches the config file. Verify that the signature algorithm are correct above and below. -.. code-block:: bash +:: $ openssl x509 -noout -text -in ../intermediate/certs/intermediate.crt Certificate: @@ -522,7 +547,7 @@ Create a CSR in the normal method for your application. Proper creation of your We need to find out the fully qualified PKCS#11 URI for your private key: -.. code-block:: bash +:: $ p11tool --list-all warning: no token URL was provided for this operation; the available tokens are: @@ -621,7 +646,7 @@ Create a config file to use the private key of the intermediate certificate to s Then run openssl to sign the server’s CSR. -.. code-block:: bash +:: $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -extensions server_cert -days 375 -notext -md sha512 -create_serial -in server_cert.csr -out server_cert.crt engine "pkcs11" set. diff --git a/source/components/nitrokeys/features/openpgp-card/change-pins.rst b/source/components/nitrokeys/features/openpgp-card/change-pins.rst new file mode 100644 index 0000000000..bf3126d3b0 --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/change-pins.rst @@ -0,0 +1,73 @@ +Change User and Admin PIN +========================= + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ⨯ + - ✓ +.. section products-end + +.. contents:: :local: + +User PIN +-------- + +The user PIN is at least 6-digits long and is used to get access to the content of the Nitrokey. This is the PIN you will use a lot in every day use e.g. for decrypting messages, for unlocking your encrypted storage (NK Storage only) etc. + +You can change the user PIN with the Nitrokey App if using a Nitrokey Pro or Nitrokey Storage. In the `Nitrokey `__ App open ‘Menu -> +Configure -> Change User PIN’ to open the dialog to change the PIN. + +.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/1.png + :alt: img1 + + + +You can change the User PIN in the dialog window now. + +The user PIN can have up to 20 digits and other characters (e.g. alphabetic and special characters). But as the user PIN is blocked as soon three wrong PIN attempts were done, it is sufficiently secure to only have a 6 digits PIN. The default PIN is 123456. + +.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/2.png + :alt: img2 + + + +Admin PIN +--------- + +The admin PIN is at least 8-digits long and is used to change contents/settings of the Nitrokey. That is to say after initializing the Nitrokey you probably won’t need this PIN too often (e.g. if you want to add another password to the password safe of the Nitrokey Pro or Nitrokey Storage). + +You can change the admin PIN with the Nitrokey App if using a Nitrokey Pro or Nitrokey Storage. In the `Nitrokey App `__ open ‘Menu -> Configure -> +Change Admin PIN’ to open the dialog to change the PIN. + +.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/3.png + :alt: img3 + + + +You can change the admin PIN in the dialog window now. + +The admin PIN can have up to 20 digits and other characters (e.g. alphabetic and special characters). But as the admin PIN is blocked as soon three wrong PIN attempts were done, it is sufficiently secure to only have 8 digits PIN. The default PIN is 12345678. + +.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/4.png + :alt: img4 + + diff --git a/source/components/pro/images/smart-policy/1.png b/source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/1.png similarity index 100% rename from source/components/pro/images/smart-policy/1.png rename to source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/1.png diff --git a/source/components/pro/images/smart-policy/2.png b/source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/2.png similarity index 100% rename from source/components/pro/images/smart-policy/2.png rename to source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/2.png diff --git a/source/components/pro/images/smart-policy/3.png b/source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/3.png similarity index 100% rename from source/components/pro/images/smart-policy/3.png rename to source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/3.png diff --git a/source/components/pro/images/smart-policy/4.png b/source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/4.png similarity index 100% rename from source/components/pro/images/smart-policy/4.png rename to source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/4.png diff --git a/source/components/pro/images/smart-policy/5.png b/source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/5.png similarity index 100% rename from source/components/pro/images/smart-policy/5.png rename to source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/5.png diff --git a/source/components/pro/images/smart-policy/6.png b/source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/6.png similarity index 100% rename from source/components/pro/images/smart-policy/6.png rename to source/components/nitrokeys/features/openpgp-card/desktop-login/images/smart-policy/6.png diff --git a/source/components/nitrokeys/features/openpgp-card/desktop-login/index.rst b/source/components/nitrokeys/features/openpgp-card/desktop-login/index.rst new file mode 100644 index 0000000000..dce913093a --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/desktop-login/index.rst @@ -0,0 +1,13 @@ +Desktop Login +============= + +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + +.. toctree:: + :maxdepth: 1 + :glob: + + Pam (Linux) + Smart Policy (Windows) \ No newline at end of file diff --git a/source/components/pro/login-with-pam.rst.inc b/source/components/nitrokeys/features/openpgp-card/desktop-login/pam.rst similarity index 61% rename from source/components/pro/login-with-pam.rst.inc rename to source/components/nitrokeys/features/openpgp-card/desktop-login/pam.rst index 42f922fb9a..765b9444e6 100644 --- a/source/components/pro/login-with-pam.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/desktop-login/pam.rst @@ -1,3 +1,10 @@ +PAM +=== + +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: How to Setup The Login @@ -13,30 +20,30 @@ It is necessary to already have keys generated on the Nitrokey, as the authentic 1. At first you need to find out the Application ID of your Nitrokey. It looks like or similar to ``D00600012401020000000000xxxxxxxx``. -.. code-block:: bash - - gpg --card-status | grep Application + .. code-block:: bash + + gpg --card-status | grep Application 2. Now you have to add a line to ``/etc/poldi/localdb/users`` which contains the following information `` ``. - This could look like ``D00600012401020000000000xxxxxxxx nitrokeyuser``. Now dump the public key from the Nitrokey into Poldis local db: + This could look like ``D00600012401020000000000xxxxxxxx nitrokeyuser``. Now dump the public key from the Nitrokey into Poldis local db: -.. code-block:: bash + .. code-block:: bash - sudo sh -c 'gpg-connect-agent "/datafile /etc/poldi/localdb/keys/" "SCD READKEY --advanced OPENPGP.3" /bye' + sudo sh -c 'gpg-connect-agent "/datafile /etc/poldi/localdb/keys/" "SCD READKEY --advanced OPENPGP.3" /bye' -Please be aware that you have to insert your Application ID in the line above with the one of your Nitrokey! + Please be aware that you have to insert your Application ID in the line above with the one of your Nitrokey! -Then you have to configure PAM. Just add ``auth sufficient pam_poldi.so`` to PAM configuration files according to your needs: + Then you have to configure PAM. Just add ``auth sufficient pam_poldi.so`` to PAM configuration files according to your needs: - * ``/etc/pam.d/common-auth`` for graphical user login - * ``/etc/pam.d/login`` for console login - * ``/etc/pam.d/sudo`` for sudo authentication - * ``/etc/pam.d/gnome-screensaver`` for login back from a locked screen - * and other files in ``/etc/pam.d`` + * ``/etc/pam.d/common-auth`` for graphical user login + * ``/etc/pam.d/login`` for console login + * ``/etc/pam.d/sudo`` for sudo authentication + * ``/etc/pam.d/gnome-screensaver`` for login back from a locked screen + * and other files in ``/etc/pam.d`` -.. note:: PAM is dangerous to play around with, so make sure you have a way of accessing the machine if you break authentication completely. Remember that booting into rescue mode from GRUB requires a root password, so keep that or a live CD which can read your filesystems to hand. + .. note:: PAM is dangerous to play around with, so make sure you have a way of accessing the machine if you break authentication completely. Remember that booting into rescue mode from GRUB requires a root password, so keep that or a live CD which can read your filesystems to hand. Here you find `further instructions `__ (in German, partially outdated). @@ -45,7 +52,7 @@ Troubleshooting If you get an error similar to ``ERR 100663414 Invalid ID `` you should try instead -.. code-block:: bash +:: poldi-ctrl -k > ; sudo mv /etc/poldi/localdb/keys diff --git a/source/components/nitrokeys/features/openpgp-card/desktop-login/smart-policy.rst b/source/components/nitrokeys/features/openpgp-card/desktop-login/smart-policy.rst new file mode 100644 index 0000000000..4d2d489f97 --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/desktop-login/smart-policy.rst @@ -0,0 +1,122 @@ +Login to Windows Domain Computers With MS Active Directory +========================================================== + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + +.. contents:: :local: + +1. Download and install the latest + `OpenSC `__. +2. Use a text editor to add the following settings to + ``C:\Program Files:\OpenSC Project\OpenSC\opensc.conf``. + + :: + + # Nitrokey Pro 2, OpenPGP Card, Nitrokey Storage 2 + card_atr 3b:da:18:ff:81:b1:fe:75:1f:03:00:31:f5:73:c0:01:60:00:90:00:1c { + type = 9002; + driver = "openpgp"; + # name = "Nitrokey Pro 2"; + md_read_only = false; + md_supports_X509_enrollment = true; + } + # Nitrokey Pro, OpenPGP Card + card_atr 3B:DA:18:FF:81:B1:FE:75:1F:03:00:31:C5:73:C0:01:40:00:90:00:0C { + type = 9002; + driver = "openpgp"; + # name = "Nitrokey Pro"; + md_read_only = false; + md_supports_X509_enrollment = true; + } + # Nitrokey HSM 2, SmartCard-HSM + card_atr 3b:de:18:ff:81:91:fe:1f:c3:80:31:81:54:48:53:4d:31:73:80:21:40:81:07:1c { + type = 26000; + driver = "sc-hsm"; + # name = "Nitrokey HSM 2"; + md_read_only = false; + md_supports_X509_enrollment = true; + } + # Nitrokey HSM, SmartCard-HSM + card_atr 3B:FE:18:00:00:81:31:FE:45:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:FA { + type = 26000; + driver = "sc-hsm"; + # name = "Nitrokey HSM"; + md_read_only = false; + md_supports_X509_enrollment = true; + } + + +3. Open a command terminal and enter “regedit”. Use regedit to import + `this + file `__. +4. Now you can enroll Nitrokeys for your users managed in Microsoft + Active Directory. You may either use Microsoft PKI, + `gpgsm `__, + or `Smart + Policy `__. + The following steps describe the usage of Smart Policy. +5. `Download `__ + and install Smart Policy. +6. Select “Read a smart card” + + .. figure:: images/smart-policy/1.png + :alt: img1 + + + +7. Select the certificate, mapping, and user. + + .. figure:: images/smart-policy/2.png + :alt: img2 + + + +8. Verify the device status via CRL. + + .. figure:: images/smart-policy/3.png + :alt: img3 + + + +9. Choose a Group Policy Object (GPO). + + .. figure:: images/smart-policy/4.png + :alt: img4 + + + +10. Confirm applying the mapping. + +.. figure:: images/smart-policy/5.png + :alt: img5 + + + +From now on, when logging on to your Windows computer you need to connect the Nitrokey and enter your PIN. + +.. figure:: images/smart-policy/6.png + :alt: img6 + diff --git a/source/components/pro/eidauthenticate.rst.inc b/source/components/nitrokeys/features/openpgp-card/eid.rst similarity index 67% rename from source/components/pro/eidauthenticate.rst.inc rename to source/components/nitrokeys/features/openpgp-card/eid.rst index 6197f352ed..a735aaf824 100644 --- a/source/components/pro/eidauthenticate.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/eid.rst @@ -1,27 +1,32 @@ Login With EIDAuthenticate on Stand Alone Windows Computers =========================================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: 1. Download and install the latest version of `OpenSC `__. Please install the `OpenPGP-CSP `__ driver **instead** if using Nitrokey Storage 2 or Nitrokey Pro 2. 2. Download and install `EIDAuthenticate `__. - .. note:: - The free community edition is disabled. You may test the enterprise edition instead. + .. note:: + + The free community edition is disabled. You may test the enterprise edition instead. 3. Start EIDConfigurationWizard.exe 4. Select “Associate a new certificate” -.. figure:: /components/pro/images/eidauthenticate/1.png - :alt: img1 + .. figure:: images/eidauthenticate/1.png + :alt: img1 5. Select or generate a Certificate Authority which should issue the user’s certificate on the Nitrokey. -.. figure:: /components/pro/images/eidauthenticate/2.png - :alt: img2 + .. figure:: images/eidauthenticate/2.png + :alt: img2 @@ -30,43 +35,43 @@ Login With EIDAuthenticate on Stand Alone Windows Computers your Nitrokey is not detected you may want to execute “certutil -scinfo” for troubleshooting. -.. figure:: /components/pro/images/eidauthenticate/3.png - :alt: img3 + .. figure:: images/eidauthenticate/3.png + :alt: img3 7. Select the newly generated certificate and press continue. -.. figure:: /components/pro/images/eidauthenticate/4.png - :alt: img4 + .. figure:: images/eidauthenticate/4.png + :alt: img4 8. All checks should succeed. Press continue. -.. figure:: /components/pro/images/eidauthenticate/5.png - :alt: img5 + .. figure:: images/eidauthenticate/5.png + :alt: img5 9. Enter the password of your user account. -.. figure:: /components/pro/images/eidauthenticate/6.png - :alt: img6 + .. figure:: images/eidauthenticate/6.png + :alt: img6 10. Enter the user PIN which you defined previously in step 4. -.. figure:: /components/pro/images/eidauthenticate/7.png - :alt: img7 + .. figure:: images/eidauthenticate/7.png + :alt: img7 11. The final screen may look like this. -.. figure:: /components/pro/images/eidauthenticate/8.png - :alt: img8 + .. figure:: images/eidauthenticate/8.png + :alt: img8 @@ -74,6 +79,6 @@ You may perform further configurations such as activate the force smart card pol From now on, when logging on to your Windows computer you need to connect the Nitrokey and enter your PIN. -.. figure:: /components/pro/images/eidauthenticate/9.png +.. figure:: images/eidauthenticate/9.png :alt: img9 diff --git a/source/components/nitrokey3/linux/fedora-gnupg-configuration.rst b/source/components/nitrokeys/features/openpgp-card/fedora-gnupg-configuration.rst similarity index 97% rename from source/components/nitrokey3/linux/fedora-gnupg-configuration.rst rename to source/components/nitrokeys/features/openpgp-card/fedora-gnupg-configuration.rst index 3748b2e8ca..82bc3c8ef4 100644 --- a/source/components/nitrokey3/linux/fedora-gnupg-configuration.rst +++ b/source/components/nitrokeys/features/openpgp-card/fedora-gnupg-configuration.rst @@ -1,6 +1,10 @@ OpenPGP smartcard with GnuPG on Fedora ====================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. note:: The following instructions require the Nitrokey 3 to have at least firmware version ``1.4.0`` installed. Please refer to `firmware update <./firmware-update.html>`__ to learn how to update it. diff --git a/source/components/pro/gpa.rst b/source/components/nitrokeys/features/openpgp-card/gpa.rst similarity index 68% rename from source/components/pro/gpa.rst rename to source/components/nitrokeys/features/openpgp-card/gpa.rst index 3976f8d855..867ee0ac31 100644 --- a/source/components/pro/gpa.rst +++ b/source/components/nitrokeys/features/openpgp-card/gpa.rst @@ -1,55 +1,80 @@ Setup With Gnu Privacy Assistant (GPA) ======================================================= +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + This document describes how to use Gnu Privacy Assistant (GPA) to set up the Nitrokey for its first usage. 1. First you need to install Gnu Privacy Assistant (GPA). For Windows you should download and install the `GPG4Win `__ package which contains GPA. For Linux you should install the GPA package of your distribution (e.g. on Ubuntu: sudo apt-get install gpa ). 2. Start GPA and select the Card Manager; either by pressing the icon at the top or by choosing Card Manager in the Windows menu. - .. figure:: /components/pro/images/gpa/1.png + .. figure:: images/gpa/1.png :alt: img1 3. The window of the Card Manager will appear. Enter your salutation, name and optional other information. While doing so you might be asked to enter the admin PIN. - .. figure:: /components/pro/images/gpa/2.png + .. figure:: images/gpa/2.png :alt: img2 4. Confirm this window and enter the admin PIN in the next window. - .. figure:: /components/pro/images/gpa/3.png + .. figure:: images/gpa/3.png :alt: img3 5. In the Card Manager window you might need to scroll down until you see the buttons to change the PINs. The term PIN is used interchangeable with "password". Press the first button "Change PIN" in order to change the user password. Read and confirm the following information window. - .. figure:: /components/pro/images/gpa/4.png + .. figure:: images/gpa/4.png :alt: img4 6. Choose and enter your own PIN with a minimum length of six characters. This PIN is required for the daily usage of the Nitrokey. - .. figure:: /components/pro/images/gpa/5.png + .. figure:: images/gpa/5.png :alt: img5 7. Go back to the Card Manager window in step three. This time you choose the third button Change PIN in order to change the admin PIN. The admin PIN is required to change the information on the Nitrokey and to change the cryptographic keys. Proceed as described in steps four and five. 8. After changing both the user and the admin PIN, you are back in the Card Manager window. Select "Generate key" in the "Card" menu. - .. figure:: /components/pro/images/gpa/6.png + .. figure:: images/gpa/6.png :alt: img6 9. Enter your name and e-mail address. You should keep "backup" enabled in order to create a backup file of your cryptographic keys. Optionally you might select an expiration date for your cryptographic keys. - .. figure:: /components/pro/images/gpa/7.png + .. figure:: images/gpa/7.png :alt: img7 10. Wait until the keys are generated successfully. - .. figure:: /components/pro/images/gpa/8.png + .. figure:: images/gpa/8.png :alt: img8 11. Enter a strong passphrase for your backup keys. We strongly recommend to store the backup file on a separate storage(e.g. CD-ROM) and on a safe location. - .. figure:: /components/pro/images/gpa/9.png + .. figure:: images/gpa/9.png :alt: img9 Congratulations, your Nitrokey is now ready to use. Please see the `applications `__ section for further information of its usage. diff --git a/source/components/pro/linux/images/luks_1.png b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_1.png similarity index 100% rename from source/components/pro/linux/images/luks_1.png rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_1.png diff --git a/source/components/pro/linux/images/luks_2.png b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_2.png similarity index 100% rename from source/components/pro/linux/images/luks_2.png rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_2.png diff --git a/source/components/pro/linux/images/luks_3.png b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_3.png similarity index 100% rename from source/components/pro/linux/images/luks_3.png rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_3.png diff --git a/source/components/pro/linux/images/luks_5.png b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_5.png similarity index 100% rename from source/components/pro/linux/images/luks_5.png rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_5.png diff --git a/source/components/pro/linux/images/luks_6.png b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_6.png similarity index 100% rename from source/components/pro/linux/images/luks_6.png rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_6.png diff --git a/source/components/pro/linux/images/luks_7.png b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_7.png similarity index 100% rename from source/components/pro/linux/images/luks_7.png rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/images/luks/luks_7.png diff --git a/source/components/pro/linux/hard-disk-encryption.rst b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/index.rst similarity index 86% rename from source/components/pro/linux/hard-disk-encryption.rst rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/index.rst index cab92c4900..75a37952ae 100644 --- a/source/components/pro/linux/hard-disk-encryption.rst +++ b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/index.rst @@ -1,6 +1,31 @@ Hard Disk Encryption ==================== +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + .. contents:: :local: VeraCrypt (formerly TrueCrypt) @@ -41,7 +66,13 @@ Note: `Aloaha Crypt `__ is based on T Hard Disk Encryption on GNU+Linux with LUKS/dm-crypt ---------------------------------------------------- -Here are `excellent instructions `__ how to use Nitrokey to encrypt your hard disk under GNU+Linux with LUKS/dm-crypt. `Other instructions `__. +For setting up LUKS Disk Encryption follow our guide: + +.. toctree:: + :maxdepth: 1 + + Full-Disk Encryption With cryptsetup/LUKS + Purism has created a `simple script `__ to add the Nitrokey/LibremKey as a way to unlock LUKS partitions (not tested by Nitrokey yet). diff --git a/source/components/pro/linux/disk-encryption-luks.rst b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/luks.rst similarity index 96% rename from source/components/pro/linux/disk-encryption-luks.rst rename to source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/luks.rst index 02d9fc86b7..83ee3e4c57 100644 --- a/source/components/pro/linux/disk-encryption-luks.rst +++ b/source/components/nitrokeys/features/openpgp-card/hard-disk-encryption/luks.rst @@ -1,6 +1,10 @@ Full-Disk Encryption With cryptsetup/LUKS ========================================= +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: This guide shows how to configure LUKS-encrypted volumes, to authenticate at boot with `Nitrokey Pro `__ or `Nitrokey Storage `__. @@ -107,13 +111,13 @@ and sets up crypttab, LUKS, initramfs, and GRUB. First you will be prompted for the ``User PIN`` -.. figure:: /components/pro/linux/images/luks_1.png +.. figure:: images/luks/luks_1.png :alt: img1 Once you unlock the Nitrokey, you will be prompted for your ``OLD passphrase``. It is the passphrase you entered to encrypt your volume at installation. -.. figure:: /components/pro/linux/images/luks_2.png +.. figure:: images/luks/luks_2.png :alt: img2 .. note:: This is a fall-back alternative in case you lose your Nitrokey, or if @@ -125,7 +129,7 @@ Once you enter the passphrase, the script finishes the setup in about one minute. Do not interrupt the script, or you might get locked out of your computer after reboot. -.. figure:: /components/pro/linux/images/luks_3.png +.. figure:: images/luks/luks_3.png :alt: img3 Done! @@ -138,12 +142,12 @@ Usage After reboot you should be prompted for your User PIN -.. figure:: /components/pro/linux/images/luks_5.png +.. figure:: images/luks/luks_5.png :alt: img5 Enter your User PIN to unlock the drive -.. figure:: /components/pro/linux/images/luks_6.png +.. figure:: images/luks/luks_6.png :alt: img6 diff --git a/source/components/pro/images/change-pins/1.png b/source/components/nitrokeys/features/openpgp-card/images/change-pins/1.png similarity index 100% rename from source/components/pro/images/change-pins/1.png rename to source/components/nitrokeys/features/openpgp-card/images/change-pins/1.png diff --git a/source/components/pro/images/change-pins/2.png b/source/components/nitrokeys/features/openpgp-card/images/change-pins/2.png similarity index 100% rename from source/components/pro/images/change-pins/2.png rename to source/components/nitrokeys/features/openpgp-card/images/change-pins/2.png diff --git a/source/components/pro/images/change-pins/3.png b/source/components/nitrokeys/features/openpgp-card/images/change-pins/3.png similarity index 100% rename from source/components/pro/images/change-pins/3.png rename to source/components/nitrokeys/features/openpgp-card/images/change-pins/3.png diff --git a/source/components/pro/images/change-pins/4.png b/source/components/nitrokeys/features/openpgp-card/images/change-pins/4.png similarity index 100% rename from source/components/pro/images/change-pins/4.png rename to source/components/nitrokeys/features/openpgp-card/images/change-pins/4.png diff --git a/source/components/pro/linux/images/App-change-pin.png b/source/components/nitrokeys/features/openpgp-card/images/change-pins/App-change-pin.png similarity index 100% rename from source/components/pro/linux/images/App-change-pin.png rename to source/components/nitrokeys/features/openpgp-card/images/change-pins/App-change-pin.png diff --git a/source/components/pro/images/eidauthenticate/1.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/1.png similarity index 100% rename from source/components/pro/images/eidauthenticate/1.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/1.png diff --git a/source/components/pro/images/eidauthenticate/2.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/2.png similarity index 100% rename from source/components/pro/images/eidauthenticate/2.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/2.png diff --git a/source/components/pro/images/eidauthenticate/3.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/3.png similarity index 100% rename from source/components/pro/images/eidauthenticate/3.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/3.png diff --git a/source/components/pro/images/eidauthenticate/4.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/4.png similarity index 100% rename from source/components/pro/images/eidauthenticate/4.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/4.png diff --git a/source/components/pro/images/eidauthenticate/5.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/5.png similarity index 100% rename from source/components/pro/images/eidauthenticate/5.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/5.png diff --git a/source/components/pro/images/eidauthenticate/6.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/6.png similarity index 100% rename from source/components/pro/images/eidauthenticate/6.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/6.png diff --git a/source/components/pro/images/eidauthenticate/7.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/7.png similarity index 100% rename from source/components/pro/images/eidauthenticate/7.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/7.png diff --git a/source/components/pro/images/eidauthenticate/8.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/8.png similarity index 100% rename from source/components/pro/images/eidauthenticate/8.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/8.png diff --git a/source/components/pro/images/eidauthenticate/9.png b/source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/9.png similarity index 100% rename from source/components/pro/images/eidauthenticate/9.png rename to source/components/nitrokeys/features/openpgp-card/images/eidauthenticate/9.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/1.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/1.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/1.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/1.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/2.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/2.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/2.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/2.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/3.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/3.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/3.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/3.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/4.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/4.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/4.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/4.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/5.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/5.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/5.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/5.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/6.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/6.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/6.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/6.png diff --git a/source/components/pro/images/openpgp-keygen-gpa/7.png b/source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/7.png similarity index 100% rename from source/components/pro/images/openpgp-keygen-gpa/7.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa-keygen/7.png diff --git a/source/components/pro/images/gpa/1.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/1.png similarity index 100% rename from source/components/pro/images/gpa/1.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/1.png diff --git a/source/components/pro/images/gpa/2.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/2.png similarity index 100% rename from source/components/pro/images/gpa/2.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/2.png diff --git a/source/components/pro/images/gpa/3.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/3.png similarity index 100% rename from source/components/pro/images/gpa/3.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/3.png diff --git a/source/components/pro/images/gpa/4.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/4.png similarity index 100% rename from source/components/pro/images/gpa/4.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/4.png diff --git a/source/components/pro/images/gpa/5.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/5.png similarity index 100% rename from source/components/pro/images/gpa/5.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/5.png diff --git a/source/components/pro/images/gpa/6.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/6.png similarity index 100% rename from source/components/pro/images/gpa/6.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/6.png diff --git a/source/components/pro/images/gpa/7.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/7.png similarity index 100% rename from source/components/pro/images/gpa/7.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/7.png diff --git a/source/components/pro/images/gpa/8.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/8.png similarity index 100% rename from source/components/pro/images/gpa/8.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/8.png diff --git a/source/components/pro/images/gpa/9.png b/source/components/nitrokeys/features/openpgp-card/images/gpa/9.png similarity index 100% rename from source/components/pro/images/gpa/9.png rename to source/components/nitrokeys/features/openpgp-card/images/gpa/9.png diff --git a/source/components/pro/windows/images/openpgp-csp/1.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/1.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/1.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/1.png diff --git a/source/components/pro/windows/images/openpgp-csp/10.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/10.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/10.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/10.png diff --git a/source/components/pro/windows/images/openpgp-csp/11.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/11.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/11.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/11.png diff --git a/source/components/pro/windows/images/openpgp-csp/2.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/2.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/2.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/2.png diff --git a/source/components/pro/windows/images/openpgp-csp/3.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/3.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/3.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/3.png diff --git a/source/components/pro/windows/images/openpgp-csp/4.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/4.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/4.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/4.png diff --git a/source/components/pro/windows/images/openpgp-csp/5.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/5.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/5.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/5.png diff --git a/source/components/pro/windows/images/openpgp-csp/6.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/6.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/6.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/6.png diff --git a/source/components/pro/windows/images/openpgp-csp/7.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/7.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/7.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/7.png diff --git a/source/components/pro/windows/images/openpgp-csp/8.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/8.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/8.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/8.png diff --git a/source/components/pro/windows/images/openpgp-csp/9.png b/source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/9.png similarity index 100% rename from source/components/pro/windows/images/openpgp-csp/9.png rename to source/components/nitrokeys/features/openpgp-card/images/openpgp-csp/9.png diff --git a/source/components/pro/windows/images/openpgp-outlook/1.png b/source/components/nitrokeys/features/openpgp-card/images/outlook/1.png similarity index 100% rename from source/components/pro/windows/images/openpgp-outlook/1.png rename to source/components/nitrokeys/features/openpgp-card/images/outlook/1.png diff --git a/source/components/pro/windows/images/openpgp-outlook/2.png b/source/components/nitrokeys/features/openpgp-card/images/outlook/2.png similarity index 100% rename from source/components/pro/windows/images/openpgp-outlook/2.png rename to source/components/nitrokeys/features/openpgp-card/images/outlook/2.png diff --git a/source/components/pro/windows/images/openpgp-outlook/3.png b/source/components/nitrokeys/features/openpgp-card/images/outlook/3.png similarity index 100% rename from source/components/pro/windows/images/openpgp-outlook/3.png rename to source/components/nitrokeys/features/openpgp-card/images/outlook/3.png diff --git a/source/components/pro/windows/images/openpgp-outlook/4.png b/source/components/nitrokeys/features/openpgp-card/images/outlook/4.png similarity index 100% rename from source/components/pro/windows/images/openpgp-outlook/4.png rename to source/components/nitrokeys/features/openpgp-card/images/outlook/4.png diff --git a/source/components/pro/images/openpgp-thunderbird/1.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/1.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/1.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/1.png diff --git a/source/components/pro/images/openpgp-thunderbird/10.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/10.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/10.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/10.png diff --git a/source/components/pro/images/openpgp-thunderbird/11.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/11.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/11.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/11.png diff --git a/source/components/pro/images/openpgp-thunderbird/12.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/12.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/12.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/12.png diff --git a/source/components/pro/images/openpgp-thunderbird/13.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/13.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/13.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/13.png diff --git a/source/components/pro/images/openpgp-thunderbird/14.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/14.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/14.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/14.png diff --git a/source/components/pro/images/openpgp-thunderbird/2.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/2.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/2.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/2.png diff --git a/source/components/pro/images/openpgp-thunderbird/3.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/3.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/3.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/3.png diff --git a/source/components/pro/images/openpgp-thunderbird/4.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/4.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/4.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/4.png diff --git a/source/components/pro/images/openpgp-thunderbird/5.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/5.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/5.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/5.png diff --git a/source/components/pro/images/openpgp-thunderbird/6.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/6.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/6.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/6.png diff --git a/source/components/pro/images/openpgp-thunderbird/7.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/7.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/7.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/7.png diff --git a/source/components/pro/images/openpgp-thunderbird/8.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/8.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/8.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/8.png diff --git a/source/components/pro/images/openpgp-thunderbird/9.png b/source/components/nitrokeys/features/openpgp-card/images/thunderbird/9.png similarity index 100% rename from source/components/pro/images/openpgp-thunderbird/9.png rename to source/components/nitrokeys/features/openpgp-card/images/thunderbird/9.png diff --git a/source/components/nitrokeys/features/openpgp-card/index.rst b/source/components/nitrokeys/features/openpgp-card/index.rst new file mode 100644 index 0000000000..11b1e142c0 --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/index.rst @@ -0,0 +1,53 @@ +OpenPGP Card +============ + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ +.. section products-end + +.. toctree:: + :maxdepth: 1 + + Overview + Keygen with GPA + Keygen with Backup + Keygen on device + Windows Login and S/MIME Email Encryption with Active Directory + OpenPGP encryption with Thunderbird + OpenPGP encryption with Outlook + OpenPGP Touch Confirmation (Nitrokey 3 only) + OpenVPN + Claws Mail, an email client (and news reader) for Linux and Windows + Evolution, an email client for the Gnome Desktop on Linux systems + GPGTools on macOS + Desktop Login + SSH + IPSec + Hard Disk Encryption + Stunnel + Gnu Privacy Assistant (GPA) + EID + Certificate-authority + GnuPG with Fedora + Change Pins \ No newline at end of file diff --git a/source/components/nitrokeys/features/openpgp-card/ipsec.rst b/source/components/nitrokeys/features/openpgp-card/ipsec.rst new file mode 100644 index 0000000000..add74577d7 --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/ipsec.rst @@ -0,0 +1,74 @@ +IPSec +===== + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + +.. contents:: :local: + +`Strong Swan `__ works using the `PKCS#11 driver `__. Basically follow these steps: + +1. Generate a key on Nitrokey via pkcs11-tool. In this example it's a 4096 bit RSA key. + + .. code-block:: bash + + $ pkcs11-tool --module /usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so -l -k --key-type rsa:4096 --id 10 --label 'Staging Access' + +2. Generate a certificate signing request via openssl + pkcs11 module + + .. code-block:: bash + + $ openssl + OpenSSL> engine dynamic -pre SO_PATH:/usr/lib/x86_64-linux-gnu/engines-1.1/pkcs11.so -pre ID:pkcs11 -pre LIST_ADD:1 -pre LOAD -pre MODULE_PATH:/usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so + OpenSSL> req -engine pkcs11 -sha256 -new -key id_10 -keyform engine -out user@email.com-staging-cert.csr -subj '/C=GB/L=Cambridge/O=Organization/OU=Staging Access/CN=user@email.com/emailAddress=user@email.com' + +3. Sign the certificate with your certificate authority + +4. Convert the certificate to DER + + .. code-block:: bash + + $ openssl x509 -in user@email.com-staging-cert.csr -out user@email.com-staging-cert.der -outform DER + +5. Import the certificate into the Nitrokey via pkcs11-tool + + .. code-block:: bash + + $ pkcs11-tool --module /usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so -l -y cert -w user@email.com-staging-cert.der --id 10 --label 'Staging Access' + +6. Configure Strongswan to load opensc-pkcs11 module then to load the certificate on Nitrokey. Edit /etc/strongswan.d/charon/pkcs11.conf and add the following module: + + :: + + modules { + Nitrokey { + path = /usr/lib/x86_64-linux-gnu/pkcs11/opensc-pkcs11.so + } + } + + +7. Initiate the VPN connection via IPSec/Strongswan, then prompt for Nitrokey PIN + +8. VPN is now connected diff --git a/source/components/pro/windows/openpgp-csp.rst b/source/components/nitrokeys/features/openpgp-card/openpgp-csp.rst similarity index 81% rename from source/components/pro/windows/openpgp-csp.rst rename to source/components/nitrokeys/features/openpgp-card/openpgp-csp.rst index 95938fccc8..c1c8272e31 100644 --- a/source/components/pro/windows/openpgp-csp.rst +++ b/source/components/nitrokeys/features/openpgp-card/openpgp-csp.rst @@ -1,6 +1,10 @@ Windows Login and S/MIME Email Encryption with Active Directory =============================================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: Please note that this driver is still in development/testing. Please tell us your experiences! See our `contact page `__. @@ -22,45 +26,45 @@ Creating Certificate Template on Server Side On Active Directory Server open certsrv.msc to manage your certificate templates. Right click on ‘Certificate Templates’ and choose ‘Manage’ -.. figure:: /components/pro/windows/images/openpgp-csp/1.png +.. figure:: images/openpgp-csp/1.png :alt: img1 Now right click on ‘Smartcard Logon’ template and click ‘Duplicate’, to create a new template on basis of this standard template. Rename template to ‘OpenPGP Card Logon and Email’ or alike. -.. figure:: /components/pro/windows/images/openpgp-csp/2.png +.. figure:: images/openpgp-csp/2.png :alt: img2 Under ‘Request Handling’, you can choose the OpenPGP-CSP as the one and only Cryptography Service Provider (click the Button labeled ‘CSPs…’). For this to work, you need to install the driver on the server as well and you have to insert a Nitrokey beforehand. This is optional. You can let the user choose, which CSP to use. -.. figure:: /components/pro/windows/images/openpgp-csp/3.png +.. figure:: images/openpgp-csp/3.png :alt: img3 -.. figure:: /components/pro/windows/images/openpgp-csp/4.png +.. figure:: images/openpgp-csp/4.png :alt: img4 For enabling S/MIME email encryption go to ‘Subject name’. Tick the checkbox ‘E-Mail name’ (note: You must save the mail addresses of your users in the corresponding Active Directory field!). -.. figure:: /components/pro/windows/images/openpgp-csp/5.png +.. figure:: images/openpgp-csp/5.png :alt: img5 Then go to ‘Extensions’, there you edit the applications guideline and add ‘Secure Email’. -.. figure:: /components/pro/windows/images/openpgp-csp/6.png +.. figure:: images/openpgp-csp/6.png :alt: img6 -.. figure:: /components/pro/windows/images/openpgp-csp/7.png +.. figure:: images/openpgp-csp/7.png :alt: img7 @@ -71,19 +75,19 @@ Request Certificate on Client (Domain Member) To request a certificate for a domain member, you have to open certmgr.msc. Right click on folder ‘Personal->Certificates’ and click ’All Tasks->Request New Certificate and choose the template you created on the AD. -.. figure:: /components/pro/windows/images/openpgp-csp/8.png +.. figure:: images/openpgp-csp/8.png :alt: img8 If you did not enforce the usage of OpenPGP-CSP you have to choose it here now. -.. figure:: /components/pro/windows/images/openpgp-csp/9.png +.. figure:: images/openpgp-csp/9.png :alt: img9 -.. figure:: /components/pro/windows/images/openpgp-csp/10.png +.. figure:: images/openpgp-csp/10.png :alt: img10 @@ -92,6 +96,6 @@ Next you choose the Authentication slot for the certificate. You are now ready to logon on the computer with the Nitrokey instead of your password and you can use `S/MIME email encryption/signing `_ with the Nitrokey. The driver has to be installed on every computer you want to use the certificate on. -.. figure:: /components/pro/windows/images/openpgp-csp/11.png +.. figure:: images/openpgp-csp/11.png :alt: img11 diff --git a/source/components/pro/openpgp-keygen-backup.rst.inc b/source/components/nitrokeys/features/openpgp-card/openpgp-keygen-backup.rst similarity index 98% rename from source/components/pro/openpgp-keygen-backup.rst.inc rename to source/components/nitrokeys/features/openpgp-card/openpgp-keygen-backup.rst index 9249a0f871..09bdb1f739 100644 --- a/source/components/pro/openpgp-keygen-backup.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/openpgp-keygen-backup.rst @@ -1,6 +1,10 @@ OpenPGP Key Generation With Backup ================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: The following instructions explain the generation of OpenPGP keys and how to copy them to the Nitrokey. This method has the advantage of providing a backup of the keys in case of losing or breaking the Nitrokey. The instructions are based on the command line interface of GnuPG. Thus, you need to have GnuPG installed on your system. The newest GnuPG version for Windows can be found `here `__ and the newest version for MacOS can be found `here `__. Users of Linux systems please install GnuPG with help of the package manager. @@ -15,7 +19,7 @@ Main Key and Encryption Subkey We can use the command ``gpg --full-generate-key --expert`` to start a guided key generation with all possible options. You can choose the key type (usually RSA (1) or ECC (9)), the length of the key and other attributes. The following output is just a simple example, you may choose other values. -.. code-block:: bash +:: > gpg --full-generate-key --expert gpg (GnuPG) 2.2.10; Copyright (C) 2018 Free Software Foundation, Inc. @@ -86,7 +90,7 @@ Subkey for Authentication You now have a main key with the capability to sign and certify (marked as [SC]) and a subkey for encryption (marked as [E]). It is necessary to have another subkey for use cases in which authentication is needed. This subkey is generated in the next step. Type in ``gpg --edit-key --expert keyID`` to start the process, whereas “keyID” is either the id of the key or the email address used during key generation. -.. code-block:: bash +:: > gpg --edit-key --expert jane@example.com gpg (GnuPG) 2.2.10; Copyright (C) 2018 Free Software Foundation, Inc. @@ -106,7 +110,7 @@ is either the id of the key or the email address used during key generation. Now you are in the interactive mode of GnuPG and you can add a key by simply typing ``addkey``. You need to choose the key you want to use. It is crucial to choose “set your own capabilities”, because we want to have the “authenticate” capability which is not available otherwise. We toggle sign and encrypt by typing ``s`` and ``e`` and we activate authenticate by typing ``a``. -.. code-block:: bash +:: gpg> addkey Please select what kind of key you want: @@ -164,7 +168,7 @@ Now you are in the interactive mode of GnuPG and you can add a key by simply typ We quit with ``q``. Afterwards we need to answer the same questions as before. Finally, we have a ready-to-go key set which we can import to our device. -.. code-block:: bash +:: RSA keys may be between 1024 and 4096 bits long. What keysize do you want? (2048) @@ -209,7 +213,7 @@ You have a main key and two subkeys which can be imported to your Nitrokey. Befo We start the process by accessing the interactive interface of GnuPG again with ``gpg --edit-key --expert keyID``, whereas ``keyID`` is either the id of the key or the email address used during key generation. -.. code-block:: bash +:: > gpg --edit-key --expert jane@example.com gpg (GnuPG) 2.2.10; Copyright (C) 2018 Free Software Foundation, Inc. @@ -245,7 +249,7 @@ We start the process by accessing the interactive interface of GnuPG again with We just imported the main key to the card. Now we proceed with the two subkeys. We type ``key 1`` to select the encryption subkey and type in ``keytocard`` again and select the slot to use. -.. code-block:: bash +:: gpg> key 1 @@ -274,7 +278,7 @@ We just imported the main key to the card. Now we proceed with the two subkeys. Now we deselect the first key with ``key 1`` and select the second subkey with ``key 2`` and move it as well with ``keytocard``. Afterwards we quit and save the changes. -.. code-block:: bash +:: gpg> key 1 diff --git a/source/components/pro/openpgp-keygen-gpa.rst.inc b/source/components/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.rst similarity index 84% rename from source/components/pro/openpgp-keygen-gpa.rst.inc rename to source/components/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.rst index e43ac0fd3f..4c7a3b382a 100644 --- a/source/components/pro/openpgp-keygen-gpa.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/openpgp-keygen-gpa.rst @@ -1,25 +1,29 @@ OpenPGP Key Generation Using GPA ================================ +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: The following instructions explain the generation of OpenPGP keys directly on the Nitrokey with help of the GNU Privacy Assistant (GPA). You won’t be able to create a backup of these keys. Thus, if you lose the Nitrokey or it breaks you can not decrypt mails or use these keys anymore. Please see `here `_ for a comparison of the different methods to generate OpenPGP keys. -You need to have GnuPG and GPA installed on your system. The newest version for Windows can be found `here `__ (make sure to check “GPA” during the installation!). Users of Linux systems please install GnuPG and GPA with help of the package manager (e.g. using ``sudo apt install gnupg gpa`` on Ubuntu). +You need to have GnuPG and GPA installed on your system. The newest version for Windows can be found `here `__ (make sure to check “GPA” during the installation!). Users of Linux systems please install GnuPG and GPA with help of the package manager (e.g. using ``sudo apt install gnupg gpa`` on Ubuntu). Key Generation -------------- At first, open the GNU Privacy Assistant (GPA). You may are asked to generate a key, you can skip this step for now by clicking “Do it later”. In the main window, please click on “Card” or “Card Manager”. -.. figure:: /components/pro/images/openpgp-keygen-gpa/1.png +.. figure:: images/gpa-keygen/1.png :alt: img1 Another windows opens. Please go to “Card” -> “Generate key” to start the key generation process. -.. figure:: /components/pro/images/openpgp-keygen-gpa/2.png +.. figure:: images/gpa-keygen/2.png :alt: img2 @@ -28,21 +32,21 @@ Now you can put in your name and the email address you want to use for the key t **Please do not use the backup checkbox**. This “backup” does only save the encryption key. In case of a loss of the device, you will not be able to restore the whole key set. So on the one hand it is no full backup (use `these instructions `_ instead, if you need one) and on the other hand you risk that someone else can get in possession of your encryption key. The advantage of generating keys on-device is to make sure that keys are stored securely. Therefore, we recommend to skip this half-backup. -.. figure:: /components/pro/images/openpgp-keygen-gpa/3.png +.. figure:: images/gpa-keygen/3.png :alt: img3 You will be asked for the admin PIN (default: 12345678) and the user PIN (default: 123456). When the key generation is finished, you can see the fingerprints of the keys on the bottom of the window. You may fill up the fields shown above, which are saved on your Nitrokey as well. -.. figure:: /components/pro/images/openpgp-keygen-gpa/4.png +.. figure:: images/gpa-keygen/4.png :alt: img4 Now you can close the window and go back to the main window. Your key will be visible in the key manager after refreshing. Every application which makes use of GnuPG will work with your Nitrokey as well, because GnuPG is fully aware of the fact, that the keys are stored on your Nitrokey. -.. figure:: /components/pro/images/openpgp-keygen-gpa/5.png +.. figure:: images/gpa-keygen/5.png :alt: img5 @@ -52,7 +56,7 @@ Exporting Public Key and Keyserver Usage Although you can start to use your Nitrokey right away after generating the keys on your system, you need to import your public key on every system, you want to use the Nitrokey on. So to be prepared you have two options: You either save the public key anywhere you like and use it on another system or you save the public key on a webpage/keyserver. -.. figure:: /components/pro/images/openpgp-keygen-gpa/6.png +.. figure:: images/gpa-keygen/6.png :alt: img6 @@ -64,8 +68,8 @@ You can carry the keyfile with you or send it to anyone who you like. This file If you do not want to carry a public keyfile with you, you can upload it to keyserver. If you are using another machine you can just import it by using “Server” -> “Retrieve Keys…” and entering your name or key id. -Another possibility is to change the URL setting on your card. Open the card manager again and fill in the URL where the key is situated (e.g. on the keyserver or on your webpage etc.). From now on you can import the key on another system by right-clicking on the URL and click on “Fetch Key”. +Another possibility is to change the URL setting on your card. Open the card manager again and fill in the URL where the key is situated (e.g. on the keyserver or on your webpage etc.). From now on you can import the key on another system by right-clicking on the URL and click on “Fetch Key”. -.. figure:: /components/pro/images/openpgp-keygen-gpa/7.png +.. figure:: images/gpa-keygen/7.png :alt: img7 diff --git a/source/components/pro/openpgp-keygen-on-device.rst.inc b/source/components/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.rst similarity index 98% rename from source/components/pro/openpgp-keygen-on-device.rst.inc rename to source/components/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.rst index 3012967dae..b44bf2940c 100644 --- a/source/components/pro/openpgp-keygen-on-device.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/openpgp-keygen-on-device.rst @@ -1,6 +1,10 @@ OpenPGP Key Generation On-Device ================================ +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: The following instructions explain the generation of OpenPGP keys directly on the Nitrokey. This is done by using the command line interface of GnuPG. Thus, you need to have GnuPG installed on your system. The newest GnuPG version for Windows can be found `here `__ and the newest version for MacOS can be found `here `__. Users of Linux systems please install GnuPG with help of the package manager. @@ -10,7 +14,7 @@ The following instructions explain the generation of OpenPGP keys directly on th These instructions are based on GnuPG version 2.2.6 or higher. Some Linux Distributions have an older version installed. In this case please choose a different method as listed - `here `_ + `here `_ or install a newer version if possible. Key Generation @@ -22,7 +26,7 @@ Open a command line and type ``gpg2 --card-edit``. To open the Windows command line please push the Windows-key and R-key. Now type ‘cmd.exe’ in the text field and hit enter. To open a Terminal on macOS or GNU/Linux please use the application search (e.g. spotlight on macOS). -.. code-block:: bash +:: > gpg2 --card-edit @@ -50,7 +54,7 @@ To open the Windows command line please push the Windows-key and R-key. Now type Now you are in the interactive interface of GnuPG. Activate the admin commands with ``admin`` and use ``generate`` afterwards to start the generation of keys. -.. code-block:: bash +:: gpg/card> admin Admin commands are allowed @@ -102,7 +106,7 @@ This section is about changing the key attributes. If you want to use the defaul Open a command line and type ``gpg2 --card-edit --expert``. -.. code-block:: bash +:: > gpg2 --card-edit --expert @@ -129,7 +133,7 @@ Open a command line and type ``gpg2 --card-edit --expert``. Now you are in the interactive interface of GnuPG. As you can see in the “Key attributes” field above, the default value rsa2048 is set. To change them, activate the admin commands with ``admin`` and use ``key-attr`` afterwards to change the attributes of the keys. -.. code-block:: bash +:: gpg/card> admin Admin commands are allowed @@ -159,7 +163,7 @@ Now you are in the interactive interface of GnuPG. As you can see in the You can choose the attribute for each key (that is, signature, encryption and authentication key). Most people will use the same attributes for every key. Type ``list`` to see the results (have look at the “Key attributes” field, which now reads rsa4096). -.. code-block:: bash +.. code-block:: gpg/card> list diff --git a/source/components/pro/openpgp-outlook.rst.inc b/source/components/nitrokeys/features/openpgp-card/openpgp-outlook.rst similarity index 81% rename from source/components/pro/openpgp-outlook.rst.inc rename to source/components/nitrokeys/features/openpgp-card/openpgp-outlook.rst index 7bb7839ba9..9fb5e72b20 100644 --- a/source/components/pro/openpgp-outlook.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/openpgp-outlook.rst @@ -1,6 +1,10 @@ OpenPGP Email Encryption with Outlook ===================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: .. note:: @@ -15,7 +19,7 @@ If you do not have PGP-Keys on your Nitrokey yet, please look at `this page `__. You need to make sure to have “GpgOL” checked during installation process (see below). -.. figure:: /components/pro/windows/images/openpgp-outlook/1.png +.. figure:: images/outlook/1.png :alt: img1 @@ -25,21 +29,21 @@ Usage After installing GPG4Win along with GpgOL, you will see a new icon labeled “Secure” in the composing window. To encrypt and sign a mail you just click on the sign like seen below. -.. figure:: /components/pro/windows/images/openpgp-outlook/2.png +.. figure:: images/outlook/2.png :alt: img2 GnuPG will start signing and encrypting the mail as soon as you click on ‘send’. You are requested to choose the identity you want to sign with and encrypt for. -.. figure:: /components/pro/windows/images/openpgp-outlook/3.png +.. figure:: images/outlook/3.png :alt: img3 Furthermore, you are asked for typing in the User PIN of the Nitrokey for signing the mail. -.. figure:: /components/pro/windows/images/openpgp-outlook/4.png +.. figure:: images/outlook/4.png :alt: img4 diff --git a/source/components/pro/openpgp-thunderbird.rst.inc b/source/components/nitrokeys/features/openpgp-card/openpgp-thunderbird.rst similarity index 71% rename from source/components/pro/openpgp-thunderbird.rst.inc rename to source/components/nitrokeys/features/openpgp-card/openpgp-thunderbird.rst index 5933522429..40adce8072 100644 --- a/source/components/pro/openpgp-thunderbird.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/openpgp-thunderbird.rst @@ -1,6 +1,10 @@ OpenPGP Email Encryption With Thunderbird ========================================= +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: Thunderbird 78.3 and newer @@ -55,15 +59,15 @@ Procedure 3. In Thunderbird, select as shown in the following picture. “OpenPGP” → “Manage smart card” -.. figure:: /components/pro/images/openpgp-thunderbird/1.png - :alt: img1 + .. figure:: images/thunderbird/1.png + :alt: img1 4. In the “SmartCard Details” window, select “SmartCard → Change PIN” -.. figure:: /components/pro/images/openpgp-thunderbird/2.png - :alt: img2 + .. figure:: images/thunderbird/2.png + :alt: img2 @@ -73,15 +77,15 @@ Procedure () [] {}% +. The PIN should be at least 6 characters long. Click “OK”. -.. figure:: /components/pro/images/openpgp-thunderbird/3.png - :alt: img3 + .. figure:: images/thunderbird/3.png + :alt: img3 6. Repeat the procedure for the Admin PIN. “SmartCard → Change PIN” -.. figure:: /components/pro/images/openpgp-thunderbird/4.png - :alt: img4 + .. figure:: images/thunderbird/4.png + :alt: img4 @@ -91,8 +95,8 @@ Procedure .;;:- !? () [] {}% +. The PIN should be at least 8 characters long. Click “OK”. -.. figure:: /components/pro/images/openpgp-thunderbird/5.png - :alt: img5 + .. figure:: images/thunderbird/5.png + :alt: img5 @@ -118,16 +122,16 @@ To encrypt data and e-mails, a key pair consisting of a public key and a private “User ID” is correct. You can also specify whether a private key backup copy should be stored on your computer. -.. figure:: /components/pro/images/openpgp-thunderbird/6.png - :alt: img6 + .. figure:: images/thunderbird/6.png + :alt: img6 5. If you do not create a backup copy, you have no chance to get your encrypted data if the Nitrokey is lost or damaged! -.. figure:: /components/pro/images/openpgp-thunderbird/7.png - :alt: img7 + .. figure:: images/thunderbird/7.png + :alt: img7 @@ -139,39 +143,39 @@ To encrypt data and e-mails, a key pair consisting of a public key and a private avoid known prose or lyric. Also, no name or known term should be used. -**Allowed characters**: a-z A-Z 0-9 /.,;:-!?( )%+ (no umlauts ä,ü,ö,Ä,Ü,Ö or ß) + **Allowed characters**: a-z A-Z 0-9 /.,;:-!?( )%+ (no umlauts ä,ü,ö,Ä,Ü,Ö or ß) -**Poor Passwords**: qwerty123, ILoveSusi3, Password, If you can dream it, you can do it. + **Poor Passwords**: qwerty123, ILoveSusi3, Password, If you can dream it, you can do it. -**Strong Passwords**: g(Ak?2Pn7Yn or Ki.stg2bLqzp%d or A dog with greeen Earz and fife legs (spelling errors increase security) + **Strong Passwords**: g(Ak?2Pn7Yn or Ki.stg2bLqzp%d or A dog with greeen Earz and fife legs (spelling errors increase security) -You do **not** need this password for daily work. It is only necessary for the restoration of the secret key, e.g. if you have lost the Nitrokey. Therefore, keep the password in a safe place. + You do **not** need this password for daily work. It is only necessary for the restoration of the secret key, e.g. if you have lost the Nitrokey. Therefore, keep the password in a safe place. -You can also specify whether and when the key should be automatically invalid. This means, from this point onwards, no more e-mails can be encrypted with this key and you have to create a new key pair. + You can also specify whether and when the key should be automatically invalid. This means, from this point onwards, no more e-mails can be encrypted with this key and you have to create a new key pair. 1. Finally, click on “Generate key pair”. -.. figure:: /components/pro/images/openpgp-thunderbird/8.png - :alt: img8 + .. figure:: images/thunderbird/8.png + :alt: img8 2. You are now asked if the key should be generated. Confirm with “Yes”. -.. figure:: /components/pro/images/openpgp-thunderbird/9.png - :alt: img9 + .. figure:: images/thunderbird/9.png + :alt: img9 3. In order for the program to write your keys to the stick, you must enter the admin PIN and the user PIN (changed above). -.. figure:: /components/pro/images/openpgp-thunderbird/10.png - :alt: img10 + .. figure:: images/thunderbird/10.png + :alt: img10 -The key generation can take a few minutes. Do not terminate the program prematurely! + The key generation can take a few minutes. Do not terminate the program prematurely! 4. When the key generation is complete, you receive the following message. A certificate is now created that allows you to invalidate @@ -180,34 +184,41 @@ The key generation can take a few minutes. Do not terminate the program prematur least one other external medium so that you can revoke the validity of the keys if your keys and backups are lost. Click “Yes” -You can now select the directory in which the backup copy is stored. This copy is encrypted with your password entered above. This means that no one can read or use the keys without your password. Do not give your password to anyone. This file with the name of your e-mail address and the suffix “.asc” should be backed up on another medium. After selecting the directory, click “Save”. + You can now select the directory in which the backup copy is stored. This copy is encrypted with your password entered above. This means that no one can read or use the keys without your password. Do not give your password to anyone. This file with the name of your e-mail address and the suffix “.asc” should be backed up on another medium. After selecting the directory, click “Save”. -.. figure:: /components/pro/images/openpgp-thunderbird/11.png - :alt: img11 + .. figure:: images/thunderbird/11.png + :alt: img11 5. Here you must again specify your user PIN or passphrase. Then click “OK” -.. figure:: /components/pro/images/openpgp-thunderbird/12.png - :alt: img12 + .. figure:: images/thunderbird/12.png + :alt: img12 + + + +6. Repeat the procedure for the Admin PIN. “SmartCard → Change PIN” + + .. figure:: images/thunderbird/4.png + :alt: img4 7. You will now see the message that the certificate was created and saved. Click “OK” -.. figure:: /components/pro/images/openpgp-thunderbird/13.png - :alt: img13 + .. figure:: images/thunderbird/13.png + :alt: img13 8. Key generation is now complete. You can now exit the program (File - Close). -.. figure:: /components/pro/images/openpgp-thunderbird/14.png - :alt: img14 + .. figure:: images/thunderbird/14.png + :alt: img14 diff --git a/source/components/pro/linux/openvpn-easyrsa.rst b/source/components/nitrokeys/features/openpgp-card/openvpn/easyrsa.rst similarity index 74% rename from source/components/pro/linux/openvpn-easyrsa.rst rename to source/components/nitrokeys/features/openpgp-card/openvpn/easyrsa.rst index c43491fc62..f5fe0c04b0 100644 --- a/source/components/pro/linux/openvpn-easyrsa.rst +++ b/source/components/nitrokeys/features/openpgp-card/openvpn/easyrsa.rst @@ -1,6 +1,10 @@ OpenVPN Configuration with Easy-RSA =================================== +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: :depth: 2 @@ -75,18 +79,18 @@ Server side 3. Close after saving it, and enter this command - .. code-block:: bash + .. code-block:: bash - $ sysctl -p + $ sysctl -p - Once IP forwarding is done, we will need to download the latest release of OpenvPN for our Debian 10 server, according to `these instructions `__: + Once IP forwarding is done, we will need to download the latest release of OpenvPN for our Debian 10 server, according to `these instructions `__: 4. Change to root and download the GPG key that signed the package - .. code-block:: bash + .. code-block:: bash - $ sudo -s - # wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add - + $ sudo -s + # wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add - 5. Add the URL of the adequate OpenVPN packages to the ``sources.list`` file @@ -119,14 +123,14 @@ Server side 2. Install Easy-RSA ^^^^^^^^^^^^^^^^^^^ -To build the PKI, we will download the latest version of Easy-RSA on the server and client machines. To get the latest release, go to the `Releases page on the official EasyRSA GitHub project `__, copy the download link for the file ending in ``.tgz``, and then paste it into the following command: + To build the PKI, we will download the latest version of Easy-RSA on the server and client machines. To get the latest release, go to the `Releases page on the official EasyRSA GitHub project `__, copy the download link for the file ending in ``.tgz``, and then paste it into the following command: 1. Download the latest release .. code-block:: bash $ cd ~ - wget -P ~/ https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.7/EasyRSA-3.0.7.tgz + $ wget -P ~/ https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.7/EasyRSA-3.0.7.tgz 2. Extract the tarball @@ -139,92 +143,92 @@ To build the PKI, we will download the latest version of Easy-RSA on the server 3. Create a PKI for OpenVPN server ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ -Before you can create your OpenVPN server’s private key and certificate, you need to create a local Public Key Infrastructure directory on your OpenVPN server. You will use this directory to manage the server and clients’ certificate requests, instead of making them directly on your CA server. + Before you can create your OpenVPN server’s private key and certificate, you need to create a local Public Key Infrastructure directory on your OpenVPN server. You will use this directory to manage the server and clients’ certificate requests, instead of making them directly on your CA server. -To build a PKI directory on your OpenVPN server, you’ll need to populate a file called ``vars`` with some default values. + To build a PKI directory on your OpenVPN server, you’ll need to populate a file called ``vars`` with some default values. - 1. Create a ``vars`` file + 1. Create a ``vars`` file - .. code-block:: bash + .. code-block:: bash - $ touch ~/easyrsa/vars - $ cd easyrsa/ - $ editor vars + $ touch ~/easyrsa/vars + $ cd easyrsa/ + $ editor vars - 2. Once the file is opened, paste in the following two lines + 2. Once the file is opened, paste in the following two lines - .. code-block:: bash + .. code-block:: bash - set_var EASYRSA_ALGO "ec" - set_var EASYRSA_DIGEST "sha512" + set_var EASYRSA_ALGO "ec" + set_var EASYRSA_DIGEST "sha512" - These are the only two lines that you need in this ``vars`` file on your OpenVPN server since it will not be used as a Certificate Authority. They will ensure that your private keys and certificate requests are configured to use Elliptic Curve Cryptography (ECC) to generate keys, and secure signatures for your clients and OpenVPN server. + These are the only two lines that you need in this ``vars`` file on your OpenVPN server since it will not be used as a Certificate Authority. They will ensure that your private keys and certificate requests are configured to use Elliptic Curve Cryptography (ECC) to generate keys, and secure signatures for your clients and OpenVPN server. - In regards to the choice of the cryptographic algorithms, I follow the model in `this tutorial `__, and you can customize these according to your specific needs. + In regards to the choice of the cryptographic algorithms, I follow the model in `this tutorial `__, and you can customize these according to your specific needs. - 3. Initialize the PKI + 3. Initialize the PKI - Once you have populated the ``vars`` file you can proceed with creating the PKI directory. To do so, run the easyrsa script with the init-pki option: + Once you have populated the ``vars`` file you can proceed with creating the PKI directory. To do so, run the easyrsa script with the init-pki option: - .. code-block:: bash + .. code-block:: bash - $ ./easyrsa init-pki + $ ./easyrsa init-pki - After you’ve initialized your PKI on the OpenVPN server, you are ready to move on to the next step, which is creating an OpenVPN server certificate request and private key. + After you’ve initialized your PKI on the OpenVPN server, you are ready to move on to the next step, which is creating an OpenVPN server certificate request and private key. 4. Create ``server.req`` and ``server.key`` ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - Now that your OpenVPN server has all the prerequisites installed, the next step is to generate a key pair composed of a private key (to keep secret), and a Certificate Signing Request (``.csr``) on your OpenVPN server. + Now that your OpenVPN server has all the prerequisites installed, the next step is to generate a key pair composed of a private key (to keep secret), and a Certificate Signing Request (``.csr``) on your OpenVPN server. - In general terms, on systems where we generate a key and request, these files are left unencrypted by using the ``nopass`` argument, since servers usually need to start up without any password input. This generates an *unencrypted key*, so mind *protect its access and file permissions* carefully. + In general terms, on systems where we generate a key and request, these files are left unencrypted by using the ``nopass`` argument, since servers usually need to start up without any password input. This generates an *unencrypted key*, so mind *protect its access and file permissions* carefully. - .. tip:: + .. tip:: - Configuration notes from OpenVPN: + Configuration notes from OpenVPN: - 1. The server, and each client, must have their own cert and key - file. The server and all clients will use the same CA file. - 2. Server certificate should have the following: + 1. The server, and each client, must have their own cert and key + file. The server and all clients will use the same CA file. + 2. Server certificate should have the following: - - ``keyUsage: digitalSignature, keyEncipherment`` + - ``keyUsage: digitalSignature, keyEncipherment`` - - ``extendedKeyUsage: serverAuth`` + - ``extendedKeyUsage: serverAuth`` - 1. Create the signing request for the server + 1. Create the signing request for the server - Navigate to the ``~/easyrsa`` directory on your OpenVPN Server as your non-root user, and enter the following commands: + Navigate to the ``~/easyrsa`` directory on your OpenVPN Server as your non-root user, and enter the following commands: - .. code-block:: bash + .. code-block:: bash - $ cd easyrsa/ - $ ./easyrsa gen-req server nopass + $ cd easyrsa/ + $ ./easyrsa gen-req server nopass - This will create a private key for the server and a certificate request file called ``server.req``. + This will create a private key for the server and a certificate request file called ``server.req``. - Once you have a signed certificate, you’ll transfer it back to the OpenVPN server. + Once you have a signed certificate, you’ll transfer it back to the OpenVPN server. - 2. Copy the key to the OpenVPN server directory + 2. Copy the key to the OpenVPN server directory - .. code-block:: bash + .. code-block:: bash - $ sudo cp /home/admin/EasyRSA/pki/private/server.key /etc/openvpn/server/ + $ sudo cp /home/admin/EasyRSA/pki/private/server.key /etc/openvpn/server/ - After completing these steps, you have successfully created a private key for your OpenVPN server. You have also generated a Certificate Signing Request for the OpenVPN server. + After completing these steps, you have successfully created a private key for your OpenVPN server. You have also generated a Certificate Signing Request for the OpenVPN server. - .. tip:: + .. tip:: - File extensions for certificate signing requests + File extensions for certificate signing requests - The file extension that is adopted by the CA and HSM tutorial - indicates the creation of a ``.csr`` file, however Easy-RSA creates - certificate signing requests with a ``.req`` extension. + The file extension that is adopted by the CA and HSM tutorial + indicates the creation of a ``.csr`` file, however Easy-RSA creates + certificate signing requests with a ``.req`` extension. - We will use interchangeably both extensions, while making sure that - we transfer the right files to the Certificate Authority, and - generate a final certificate with a ``.crt`` extension. + We will use interchangeably both extensions, while making sure that + we transfer the right files to the Certificate Authority, and + generate a final certificate with a ``.crt`` extension. - In the next section of this guide, we will sign a ``.req`` file with our CA on deployed on the HSM 2 device. For this purpose, I will use a dedicated machine to sign the requests. + In the next section of this guide, we will sign a ``.req`` file with our CA on deployed on the HSM 2 device. For this purpose, I will use a dedicated machine to sign the requests. 5. Sign and retrieve ``server.crt`` ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ @@ -413,19 +417,19 @@ Client side configuration 3. Create a ``client.req`` and ``client.key`` ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - In the same manner we issued the key pair on the sever, we generate a key pair for the client which will be composed of the ``client.req`` - file and the ``client.key`` file. The latter must be kept secret on the client machine. + In the same manner we issued the key pair on the sever, we generate a key pair for the client which will be composed of the ``client.req`` + file and the ``client.key`` file. The latter must be kept secret on the client machine. 4. Sign ``client.req`` and issue the ``client.crt`` file ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - To transfer the ``client.req`` file to the CA machine, we will use the same method as we did for the ``server.req`` file. + To transfer the ``client.req`` file to the CA machine, we will use the same method as we did for the ``server.req`` file. - Once transferred, on the CA machine we sign the certificate signing request file with this command + Once transferred, on the CA machine we sign the certificate signing request file with this command - .. code-block:: bash + .. code-block:: bash - $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -days 375 -notext -md sha512 -create_serial -in client.req -out /home/user/pki/issued/client.crt + $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -days 375 -notext -md sha512 -create_serial -in client.req -out /home/user/pki/issued/client.crt 5. Import ``client.crt`` on the Nitrokey from the CA machine ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ @@ -562,50 +566,74 @@ Client side configuration 3. Configure the OpenVPN client - The final configuration file ``client.conf`` should look like this one: + The final configuration file ``client.conf`` should look like this one: - .. code-block:: bash + .. code-block:: bash - client - dev tun - proto udp - remote 1194 - resolv-retry infinite - nobind - user nobody - group nobody - persist-key - persist-tun - ca ca.crt - remote-cert-tls server - cipher AES-256-CBC - verb 3 - redirect-gateway def1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - - # nitrokey login + client + dev tun + proto udp + remote 1194 + resolv-retry infinite + nobind + user nobody + group nobody + persist-key + persist-tun + ca ca.crt + remote-cert-tls server + cipher AES-256-CBC + verb 3 + redirect-gateway def1 + tls-version-min 1.2 # Lower boundary for TLS version + tls-version-max 1.2 # Higher boundary for TLS version + + # nitrokey login + + pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so + pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' + # pkcs11-pin-cache 300 + # daemon + # auth-retry nointeract + # management-hold + # management-signal + # management 127.0.0.1 8888 + # management-query-passwords + pkcs11-cert-private 1 # Prompt for PIN + + # OR + + # non_nitrokey login + + # cert client.crt + # key client.key + # tls-auth ta.key 1 + + + 4. Configure OpenVPN (Windows only) + + In order to establish a handshake, you must configure OpenSSL included in OpenVPN. + + Create the directory ``ssl`` in ``C:\Program Files\OpenVPN`` and create file ``openssl.cnf`` with the following content : + + openssl_conf = default_conf + + [ default_conf ] + ssl_conf = ssl_sect + + [ ssl_sect ] + system_default = ssl_default_sect + + [ ssl_default_sect ] + SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512:RSA+SHA384:ECDSA+SHA384:RSA+SHA256:ECDSA+SHA256 + MaxProtocol = TLSv1.2 + MinProtocol = TLSv1.2 - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - # pkcs11-pin-cache 300 - # daemon - # auth-retry nointeract - # management-hold - # management-signal - # management 127.0.0.1 8888 - # management-query-passwords - pkcs11-cert-private 1 # Prompt for PIN - - # OR - # non_nitrokey login + With this modification, you will not have error as reported `here `__, `here `__ and `here `__ - # cert client.crt - # key client.key - # tls-auth ta.key 1 - 4. Known issues + 5. Known issues There are some known issues related to OpenVPN login with OpenSC. Please consult these issues `here `__. @@ -641,7 +669,7 @@ Client side configuration .. warning:: - Unfortunately OpenVPN doesn’t seem to be able to establish a handshake and stops at an error as reported `here `__, `here `__ and `here `__ + Unfortunately OpenVPN doesn’t seem to be able to establish a handshake on some operating systems and stops at an error as reported `here `__, `here `__ and `here `__ :: diff --git a/source/components/pro/windows/images/openvpn-viscosity/viscosity-1.jpg b/source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-1.jpg similarity index 100% rename from source/components/pro/windows/images/openvpn-viscosity/viscosity-1.jpg rename to source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-1.jpg diff --git a/source/components/pro/windows/images/openvpn-viscosity/viscosity-2.jpg b/source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-2.jpg similarity index 100% rename from source/components/pro/windows/images/openvpn-viscosity/viscosity-2.jpg rename to source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-2.jpg diff --git a/source/components/pro/windows/images/openvpn-viscosity/viscosity-3.jpg b/source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-3.jpg similarity index 100% rename from source/components/pro/windows/images/openvpn-viscosity/viscosity-3.jpg rename to source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-3.jpg diff --git a/source/components/pro/windows/images/openvpn-viscosity/viscosity-4.jpg b/source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-4.jpg similarity index 100% rename from source/components/pro/windows/images/openvpn-viscosity/viscosity-4.jpg rename to source/components/nitrokeys/features/openpgp-card/openvpn/images/viscosity/viscosity-4.jpg diff --git a/source/components/nitrokeys/features/openpgp-card/openvpn/index.rst b/source/components/nitrokeys/features/openpgp-card/openvpn/index.rst new file mode 100644 index 0000000000..2ebab4e8ee --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/openvpn/index.rst @@ -0,0 +1,12 @@ +OpenVPN +======= + +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + +.. toctree:: + :maxdepth: 1 + + EasyRSA + Viscosity \ No newline at end of file diff --git a/source/components/pro/windows/openvpn-viscosity.rst b/source/components/nitrokeys/features/openpgp-card/openvpn/viscosity.rst similarity index 93% rename from source/components/pro/windows/openvpn-viscosity.rst rename to source/components/nitrokeys/features/openpgp-card/openvpn/viscosity.rst index 62bddd0fb8..e7e92bee65 100644 --- a/source/components/pro/windows/openvpn-viscosity.rst +++ b/source/components/nitrokeys/features/openpgp-card/openvpn/viscosity.rst @@ -5,6 +5,10 @@ Viscosity Client Configuration with OpenVPN =========================================== +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: This guide will show to configure `Viscosity client `__ to connect to an OpenVPN instance, using a `Nitrokey Pro @@ -39,13 +43,13 @@ Usage 1. Start Viscosity and create a new connection “openVPN” (you can name it as you wish) - .. figure:: ./images/openvpn-viscosity/viscosity-1.jpg + .. figure:: images/viscosity/viscosity-1.jpg :alt: img1 :scale: 75 2. Right click on the connection and click edit - .. figure:: ./images/openvpn-viscosity/viscosity-2.jpg + .. figure:: images/viscosity/viscosity-2.jpg :alt: img2 :scale: 75 @@ -59,7 +63,7 @@ Usage Optional: Select the ``ta.key`` in the ``TLS-Auth`` section - .. figure:: ./images/openvpn-viscosity/viscosity-3.jpg + .. figure:: images/viscosity/viscosity-3.jpg :alt: img3 :scale: 75 @@ -74,7 +78,7 @@ Usage 7. Choose a retrieval method from the Retrieval drop down menu - .. figure:: ./images/openvpn-viscosity/viscosity-4.jpg + .. figure:: images/viscosity/viscosity-4.jpg :alt: img4 - If only one Nitrokey will ever be used on this computer, select diff --git a/source/components/nitrokeys/features/openpgp-card/overview.rst b/source/components/nitrokeys/features/openpgp-card/overview.rst new file mode 100644 index 0000000000..e962caf9a3 --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/overview.rst @@ -0,0 +1,87 @@ +OpenPGP Email Encryption +======================== + +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + +There are two widely used standards for email encryption. + +- OpenPGP/GnuPG is popular among individuals, + +- S/MIME/X.509 is mostly used by enterprises. + +If you are in doubt which one to choose, you should use OpenPGP. While this page describes the usage of OpenPGP, S/MIME is described `here `_. + +Please familiarize yourself with the general concept behind the OpenPGP standard first, for example by reading `this info graphic `__ of the Free Software Foundation. + +Key Generation +-------------- + +If you do not have OpenPGP keys yet, you need to generate them first. + +- `Generate keys on + your Nitrokey device `_ + - this is the best option if you are unexperienced, but you won’t + have a backup of your keys and therefore won’t be able to mitigate + the loss of the Nitrokey + +- `Generate keys on your Nitrokey device with different algorithm or key + size `_ + - this is as secure as the previous option and thus you won’t have a + backup as well, but you can change the key attributes (that is the + algorithm and key size) + +- `Generate keys + locally `_ + and copy them to your Nitrokey device - this is the most flexible, expert option, + but only secure if your system is not compromised, because you can + create a backup key outside your Nitrokey A similar description in + french can be found + `here `__. + +Importing Existing Keys +----------------------- + +If you already have OpenPGP keys you may want to use them with your Nitrokey, instead of generating new ones. Importing existing keys works basically the same as generating keys locally first and copying them to the Nitrokey (see above). Therefore, please have a look at the `corresponding instructions `_. Note that you probably want to generate another subkey for authentication to your existing key. See at the same instructions for `subkey generation `_. + +Usage +----- + +You can find further information about the usage on these pages: + + +.. toctree:: + :maxdepth: 1 + + OpenPGP encryption with Thunderbird + + OpenPGP encryption with Outlook + + OpenPGP Touch Confirmation (Nitrokey 3 only) + + OpenVPN + + Claws Mail, an email client (and news reader) for Linux and Windows + + Evolution, an email client for the Gnome Desktop on Linux systems + + GPGTools on macOS + + Desktop Login + + SSH + + IPSec + + Hard Disk Encryption + + Stunnel + + Gnu Privacy Assistant (GPA) + + EID + + Certificate-authority + + GnuPG with Fedora \ No newline at end of file diff --git a/source/components/pro/images/smime-outlook/1.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-outlook/1.png similarity index 100% rename from source/components/pro/images/smime-outlook/1.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-outlook/1.png diff --git a/source/components/pro/images/smime-outlook/2.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-outlook/2.png similarity index 100% rename from source/components/pro/images/smime-outlook/2.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-outlook/2.png diff --git a/source/components/pro/images/smime-outlook/3.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-outlook/3.png similarity index 100% rename from source/components/pro/images/smime-outlook/3.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-outlook/3.png diff --git a/source/components/pro/images/smime-thunderbird/1.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/1.png similarity index 100% rename from source/components/pro/images/smime-thunderbird/1.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/1.png diff --git a/source/components/pro/images/smime-thunderbird/2.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/2.png similarity index 100% rename from source/components/pro/images/smime-thunderbird/2.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/2.png diff --git a/source/components/pro/images/smime-thunderbird/3.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/3.png similarity index 100% rename from source/components/pro/images/smime-thunderbird/3.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/3.png diff --git a/source/components/pro/images/smime-thunderbird/4.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/4.png similarity index 100% rename from source/components/pro/images/smime-thunderbird/4.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime-thunderbird/4.png diff --git a/source/components/pro/images/smime/1.png b/source/components/nitrokeys/features/openpgp-card/smime/images/smime/1.png similarity index 100% rename from source/components/pro/images/smime/1.png rename to source/components/nitrokeys/features/openpgp-card/smime/images/smime/1.png diff --git a/source/components/pro/smime.rst.inc b/source/components/nitrokeys/features/openpgp-card/smime/index.rst similarity index 60% rename from source/components/pro/smime.rst.inc rename to source/components/nitrokeys/features/openpgp-card/smime/index.rst index 3b3b220a64..122582d251 100644 --- a/source/components/pro/smime.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/smime/index.rst @@ -1,6 +1,31 @@ S/MIME Email Encryption ======================= +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + .. contents:: :local: Prerequisites @@ -12,16 +37,21 @@ There are two widely used standards for email encryption. - S/MIME/X.509 is mostly used by enterprises. -If you are in doubt which one to choose, you should use OpenPGP, see `here `_. This page describes the usage of S/MIME email encryption. +If you are in doubt which one to choose, you should use OpenPGP, see `here <../openpgp/index.html>`_ (not applicable for the Nitrokey HSM 2, the Nitrokey HSM 2 currently supports the S/MIME/X.509 standard though, therefore the rest of the guide is applicable for the HSM 2 and other Nitrokeys). This page describes the usage of S/MIME email encryption. + +You need to purchase a S/MIME certificate (e.g. at `CERTUM `__) or may already got one by your company. Furthermore, you need to install `OpenSC `__ on your System. While GNU/Linux users usually can install OpenSC over the package manager (e.g. ``sudo apt install opensc`` on Ubuntu), macOS and Windows users can download the installation files from the `OpenSC `__ page. -You need to purchase a S/MIME certificate (e.g. at `CERTUM `__) or may already got one by your company. Furthermore, you need to install `OpenSC `__ on your System. While GNU/Linux users usually can install OpenSC over the package manager (e.g. ``sudo apt install opensc`` on Ubuntu), macOS and Windows users can download the installation files from the `OpenSC `__ page. +.. note:: + + Windows users with 64-bit system (standard) need to install both, the 32-bit and the 64-bit version of OpenSC! + Import Existing Key and Certificate ----------------------------------- The following instructions are based on the `wiki of OpenSC `__. We will assume, that you already got a key-certificate pair as a .p12 file. Please have a look at the wiki page, if you got a separate key and certificate file. -To open the Windows command line please push the Windows-key and R-key. Now type ‘cmd.exe’ in the text field and hit enter. To open a Terminal on macOS or GNU/Linux please use the application search (e.g. spotlight on macOS). +To open the Windows command line please push the Windows-key and R-key. Now type ‘cmd.exe’ in the text field and hit enter. To open a Terminal on macOS or GNU/Linux please use the application search (e.g. spotlight on macOS). To make these commands as simple as possible, the .p12 file needs to be in your home folder. On Windows this is usually ``C:\Users\yourusername`` and on macOS and GNU/Linux system it will be ``/home/yourusername``. If you do not store the .p12 file there, you have to adapt the path in the commands below. Please plug in the Nitrokey before submitting the commands. @@ -41,7 +71,7 @@ and on macOS and GNU/Linux it will be The two commands copy the key-certificate pair to the slot 2 (needed for decrypting emails) and slot 3 (needed for signing). The output looks on both systems something like this: -.. figure:: /components/pro/images/smime/1.png +.. figure:: images/smime/1.png :alt: img1 @@ -53,12 +83,11 @@ Usage You can find further information about the usage on these pages: -- for using `S/MIME encryption on - Thunderbird `_ +.. toctree:: + :maxdepth: 1 + + S/MIME encryption on Thunderbird -- for using `S/MIME encryption on - Outlook `_ + S/MIME encryption on Outlook -- for using - `Evolution `__, - an email client for the Gnome Desktop on Linux systems + Evolution, an email client for the Gnome Desktop on Linux systems diff --git a/source/components/pro/smime-outlook.rst.inc b/source/components/nitrokeys/features/openpgp-card/smime/smime-outlook.rst similarity index 86% rename from source/components/pro/smime-outlook.rst.inc rename to source/components/nitrokeys/features/openpgp-card/smime/smime-outlook.rst index dad5bd58cb..417b8291d9 100644 --- a/source/components/pro/smime-outlook.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/smime/smime-outlook.rst @@ -1,12 +1,16 @@ S/MIME Email Encryption with Outlook ==================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: Prerequisites ------------- -If you do not have a S/MIME key-certificate pair installed on your Nitrokey yet, please look at `this page `_ first. +If you do not have a S/MIME key-certificate pair installed on your Nitrokey yet, please look at `this page `_ first. You need to have OpenSC installed on your System. Please have a look at the `wiki page of the OpenSC project `__. @@ -21,12 +25,12 @@ Settings in Outlook Before you can use the Nitrokey in Outlook you have to activate S/MIME encryption. You can achieve this by clicking on to ‘Start’ -> ‘Options’ and clicking on ‘Trust Center’ in the options window. In section ‘Email Security’ you can choose your S/MIME identity. Your certificate should already be recognized by Outlook. -.. figure:: /components/pro/images/smime-outlook/1.png +.. figure:: images/smime-outlook/1.png :alt: img1 -.. figure:: /components/pro/images/smime-outlook/2.png +.. figure:: images/smime-outlook/2.png :alt: img2 @@ -35,7 +39,7 @@ Usage When composing a mail you can now choose to encrypt and sign the message in the ‘Options’ ribbon of the compose window. -.. figure:: /components/pro/images/smime-outlook/3.png +.. figure:: images/smime-outlook/3.png :alt: img3 .. note:: diff --git a/source/components/pro/smime-thunderbird.rst.inc b/source/components/nitrokeys/features/openpgp-card/smime/smime-thunderbird.rst similarity index 78% rename from source/components/pro/smime-thunderbird.rst.inc rename to source/components/nitrokeys/features/openpgp-card/smime/smime-thunderbird.rst index caa1460a62..e70c3eaa38 100644 --- a/source/components/pro/smime-thunderbird.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/smime/smime-thunderbird.rst @@ -1,14 +1,18 @@ S/MIME Email Encryption with Thunderbird ======================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: Prerequisites ------------- -If you do not have a S/MIME key-certificate pair installed on your Nitrokey yet or if you did not installed OpenSC, please look at `this page `_ first. +If you do not have a S/MIME key-certificate pair installed on your Nitrokey yet or if you did not installed OpenSC, please look at `this page `_ first. -You need to have `OpenSC installed `__ on your System. While GNU/Linux users usually can install OpenSC over the package manager (e.g. ``sudo apt update && sudo apt install opensc`` on Ubuntu), macOS and Windows users can download the installation files from OpenSC directly. +You need to have `OpenSC installed `__ on your System. While GNU/Linux users usually can install OpenSC over the package manager (e.g. ``sudo apt update && sudo apt install opensc`` on Ubuntu), macOS and Windows users can download the installation files from OpenSC directly. .. note:: @@ -20,21 +24,21 @@ Settings in Thunderbird Before you can use the Nitrokey in Thunderbird you have to activate S/MIME encryption in the account settings. You can achieve this by clicking on the menu and go to ‘Preferences’ -> ‘Account Settings’ and clicking on ‘Security’ in the account settings window. -.. figure:: /components/pro/images/smime-thunderbird/1.png +.. figure:: images/smime-thunderbird/1.png :alt: img1 Click on “Security Devices” to import the right PCKS11 module. Click on “Load” on the right-hand side. Now give the Module a name (like “OpenSC Module”) and click on “Browse” to choose the location of the Module (see below). -.. figure:: /components/pro/images/smime-thunderbird/2.png +.. figure:: images/smime-thunderbird/2.png :alt: img2 On Windows the right file lays under “C:\Windows\System32\opensc-pkcs11.dll”. On macOS and GNU/Linux the file should be in “/lib/pkcs11/opensc-pkcs11.so” or “/usr/lib/pkcs11/opensc-pkcs11.so” or alike. Press “OK” twice and you are back in security section of the account settings. Now you can actually choose a certificate on the upper part of the window. You should get asked for a PIN to unlock your Nitrokey. Please type in your User PIN. -.. figure:: /components/pro/images/smime-thunderbird/3.png +.. figure:: images/smime-thunderbird/3.png :alt: img3 @@ -44,6 +48,6 @@ Usage When composing an email you can now choose to encrypt and sign the message. -.. figure:: /components/pro/images/smime-thunderbird/4.png +.. figure:: images/smime-thunderbird/4.png :alt: img4 diff --git a/source/components/pro/images/putty/1.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/1.png similarity index 100% rename from source/components/pro/images/putty/1.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/1.png diff --git a/source/components/pro/images/putty/2.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/2.png similarity index 100% rename from source/components/pro/images/putty/2.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/2.png diff --git a/source/components/pro/images/putty/3.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/3.png similarity index 100% rename from source/components/pro/images/putty/3.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/3.png diff --git a/source/components/pro/images/putty/4.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/4.png similarity index 100% rename from source/components/pro/images/putty/4.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/4.png diff --git a/source/components/pro/images/putty/5.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/5.png similarity index 100% rename from source/components/pro/images/putty/5.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/5.png diff --git a/source/components/pro/images/putty/6.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/6.png similarity index 100% rename from source/components/pro/images/putty/6.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/6.png diff --git a/source/components/pro/images/putty/7.png b/source/components/nitrokeys/features/openpgp-card/ssh/images/putty/7.png similarity index 100% rename from source/components/pro/images/putty/7.png rename to source/components/nitrokeys/features/openpgp-card/ssh/images/putty/7.png diff --git a/source/components/pro/ssh.rst b/source/components/nitrokeys/features/openpgp-card/ssh/index.rst similarity index 93% rename from source/components/pro/ssh.rst rename to source/components/nitrokeys/features/openpgp-card/ssh/index.rst index a8f799377a..327e42e966 100644 --- a/source/components/pro/ssh.rst +++ b/source/components/nitrokeys/features/openpgp-card/ssh/index.rst @@ -1,4 +1,18 @@ +SSH +=== + +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + This guide explains how to prepare your SSH server and client for use with the Nitrokey. +For configuring PuTTY, see this guide: + +.. toctree:: + :maxdepth: 1 + + Putty + The Nitrokey should already have PGP keys installed and the local GnuPG keyring should know the keys. diff --git a/source/components/pro/putty.rst.inc b/source/components/nitrokeys/features/openpgp-card/ssh/putty.rst similarity index 83% rename from source/components/pro/putty.rst.inc rename to source/components/nitrokeys/features/openpgp-card/ssh/putty.rst index 323f5dae27..7c89381fde 100644 --- a/source/components/pro/putty.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/ssh/putty.rst @@ -1,6 +1,10 @@ PuTTY ===== +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: This mini-howto assumes that the Nitrokey has been initialized and contains cryptographic keys. @@ -12,7 +16,7 @@ This mini-howto assumes that the Nitrokey has been initialized and contains cryp - `GPG4Win `__ or `pageant.exe `__ with - Smartcard support from Dr. Peter Koch + Smartcard support from Dr. Peter Koch - Optional: `OpenPGP Minidriver `__ @@ -21,35 +25,35 @@ This mini-howto assumes that the Nitrokey has been initialized and contains cryp start pageant.exe. That this is running is shown in the notification area of the taskbar. -.. figure:: /components/pro/images/putty/1.png +.. figure:: images/putty/1.png :alt: img1 A double click opens the view of the current keys. -.. figure:: /components/pro/images/putty/2.png +.. figure:: images/putty/2.png :alt: img2 After inserting the key it looks like this. -.. figure:: /components/pro/images/putty/3.png +.. figure:: images/putty/3.png :alt: img3 If nothing is displayed here, pageant may have to be restarted or another application is already using the stick. A possibly running pgp-agent must be terminated! Now we only need the public key we want to store in the ssh configuration of the server. Therefore we press CTRL while inserting the stick… -.. figure:: /components/pro/images/putty/4.png +.. figure:: images/putty/4.png :alt: img4 and then view the Pageant-PublicKeys.txt. -.. figure:: /components/pro/images/putty/5.png +.. figure:: images/putty/5.png :alt: img5 @@ -60,7 +64,7 @@ I searched for the ssh-rsa entry of the auth key and added the line on the serve There is surprisingly little to say about PuTTY itself. -.. figure:: /components/pro/images/putty/6.png +.. figure:: images/putty/6.png :alt: img6 @@ -73,6 +77,6 @@ That’s it, as soon as you connect to the server while pageant is running and y If you are annoyed that Windows reports every time you plug in the stick that no driver could be found for “Smartcard”, you can get rid of it. You just have to install the x86 or x64 version of the above mentioned driver and the smartcard looks like this: -.. figure:: /components/pro/images/putty/7.png +.. figure:: images/putty/7.png :alt: img7 diff --git a/source/components/nitrokeys/features/openpgp-card/stunnel.rst b/source/components/nitrokeys/features/openpgp-card/stunnel.rst new file mode 100644 index 0000000000..60cc589bc4 --- /dev/null +++ b/source/components/nitrokeys/features/openpgp-card/stunnel.rst @@ -0,0 +1,47 @@ +Stunnel +======= + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ✓ + - ✓ + - ✓ +.. section products-end + +.. contents:: :local: + +`Stunnel `__ works as an SSL encryption wrapper between remote client and local (inetd-startable) or remote server. It can be used to add SSL functionality to commonly used inetd daemons like POP2, POP3, and IMAP servers without any changes in the programs' code. + +Stunnel is able to load OpenSC PKCS#11 engine using this configuration: + +.. code-block:: bash + + engine=dynamic + engineCtrl=SO_PATH:/usr/lib/opensc/engine_pkcs11.so + engineCtrl=ID:pkcs11 + engineCtrl=LIST_ADD:1 + engineCtrl=LOAD + engineCtrl=MODULE_PATH:/usr/lib/pkcs11/opensc-pkcs11.so + engineCtrl=INIT + + [service] + engineNum=1 + key=id_45 diff --git a/source/components/nitrokey3/shared/openpgp-uif.rst.inc b/source/components/nitrokeys/features/openpgp-card/uif.rst similarity index 55% rename from source/components/nitrokey3/shared/openpgp-uif.rst.inc rename to source/components/nitrokeys/features/openpgp-card/uif.rst index bd56e48e0e..568043fabf 100644 --- a/source/components/nitrokey3/shared/openpgp-uif.rst.inc +++ b/source/components/nitrokeys/features/openpgp-card/uif.rst @@ -1,6 +1,31 @@ OpenPGP Touch Confirmation (UIF) ================================ +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ +.. section products-end + .. contents:: :local: The Nitrokey 3 OpenPGP Card functionality supports touch button confirmations (so called User Interaction Flags, UIF) when performing cryptographic key operations. It can be configured separately for each operation (Signature, Decryption and Authentication). @@ -16,7 +41,7 @@ Configuration With GnuPG 2.3 or more recent: -.. code-block:: +:: $ gpg --card-edit … diff --git a/source/components/nitrokeys/features/password-safe/index.rst b/source/components/nitrokeys/features/password-safe/index.rst new file mode 100644 index 0000000000..31eb0e69a9 --- /dev/null +++ b/source/components/nitrokeys/features/password-safe/index.rst @@ -0,0 +1,32 @@ +Password Safe +============= + + +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + +.. toctree:: + :maxdepth: 1 + :glob: + + KeepassXC <../../../software/nk-app2/keepassxc> \ No newline at end of file diff --git a/source/components/nitrokey3/windows/piv/access_control.rst b/source/components/nitrokeys/features/piv/access_control.rst similarity index 97% rename from source/components/nitrokey3/windows/piv/access_control.rst rename to source/components/nitrokeys/features/piv/access_control.rst index 5e4e169bf0..fec07de9f8 100644 --- a/source/components/nitrokey3/windows/piv/access_control.rst +++ b/source/components/nitrokeys/features/piv/access_control.rst @@ -1,6 +1,10 @@ Access Control ============== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + The following access matrix shows what authentication a certain operation requires. +-------------------+-----+-----+-----+-------------------------------------------------+ diff --git a/source/components/nitrokey3/windows/piv/certificate_management.rst b/source/components/nitrokeys/features/piv/certificate_management.rst similarity index 86% rename from source/components/nitrokey3/windows/piv/certificate_management.rst rename to source/components/nitrokeys/features/piv/certificate_management.rst index a267521865..d8ecb46144 100644 --- a/source/components/nitrokey3/windows/piv/certificate_management.rst +++ b/source/components/nitrokeys/features/piv/certificate_management.rst @@ -1,6 +1,10 @@ Certificate Management ====================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + Every private key has a certificate associated. The certificates can be read and written. The size of a certificate is limited by the transport layer and about 6kB. @@ -12,7 +16,7 @@ Certificates can be read from the Nitrokey per key slot. The certificate can be retrieved as follows. -.. code-block:: +:: nitropy nk3 piv read-certificate --key-slot `` @@ -22,6 +26,6 @@ Write Certificate Certificates can be written to the Nitrokey per key slot. -.. code-block:: +:: nitropy nk3 piv write-certificate --key-slot diff --git a/source/components/nitrokey3/windows/piv/factory_reset.rst b/source/components/nitrokeys/features/piv/factory_reset.rst similarity index 80% rename from source/components/nitrokey3/windows/piv/factory_reset.rst rename to source/components/nitrokeys/features/piv/factory_reset.rst index 27739ada7a..587c33596b 100644 --- a/source/components/nitrokey3/windows/piv/factory_reset.rst +++ b/source/components/nitrokeys/features/piv/factory_reset.rst @@ -1,6 +1,10 @@ Factory Reset ============= +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + The PIV application can be reset to factory defaults. It can only be reset if the PIN and PUK are blocked. @@ -9,6 +13,6 @@ It can only be reset if the PIN and PUK are blocked. The reset to factory defaults can be performed as follows. -.. code-block:: +:: nitropy nk3 piv factory-reset diff --git a/source/components/nitrokey3/windows/piv/guides/client_logon_with_active_directory.rst b/source/components/nitrokeys/features/piv/guides/client_logon_with_active_directory.rst similarity index 98% rename from source/components/nitrokey3/windows/piv/guides/client_logon_with_active_directory.rst rename to source/components/nitrokeys/features/piv/guides/client_logon_with_active_directory.rst index d87a471b34..b1caaf0108 100644 --- a/source/components/nitrokey3/windows/piv/guides/client_logon_with_active_directory.rst +++ b/source/components/nitrokeys/features/piv/guides/client_logon_with_active_directory.rst @@ -1,6 +1,10 @@ Client Logon with Active Directory ================================== +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + This document explains how to use the PIV application of a Nitrokey 3 for smartcard logon with Active Directory. In the future, this manual provisioning may be automated through a Windows MiniDriver. @@ -94,7 +98,7 @@ The certificate is then written to the Nitrokey. 1. Generate a private key and write the CSR to file with the command below. - .. code-block:: + :: nitropy nk3 piv generate-key --key 9A --algo --subject-name --subject-alt-name-upn --out-file @@ -103,7 +107,7 @@ The certificate is then written to the Nitrokey. 2. Sign the CSR with the certificate authority (CA) of the domain with the command below. - .. code-block:: + :: certreq -attrib CertificateTemplate: -submit @@ -112,7 +116,7 @@ The certificate is then written to the Nitrokey. 3. Write the signed certificate to the Nitrokey with the command below. - .. code-block:: + :: nitropy nk3 piv write-certificate --format PEM --path diff --git a/source/components/nitrokey3/windows/piv/guides/index.rst b/source/components/nitrokeys/features/piv/guides/index.rst similarity index 53% rename from source/components/nitrokey3/windows/piv/guides/index.rst rename to source/components/nitrokeys/features/piv/guides/index.rst index b28244ef94..7118942771 100644 --- a/source/components/nitrokey3/windows/piv/guides/index.rst +++ b/source/components/nitrokeys/features/piv/guides/index.rst @@ -1,6 +1,10 @@ Guides ====== +.. include:: ../index.rst + :start-after: products-begin + :end-before: products-end + .. toctree:: :maxdepth: 1 :glob: diff --git a/source/components/nitrokeys/features/piv/index.rst b/source/components/nitrokeys/features/piv/index.rst new file mode 100644 index 0000000000..28bad4cf71 --- /dev/null +++ b/source/components/nitrokeys/features/piv/index.rst @@ -0,0 +1,46 @@ +PIV (Personal Identity Verification) +==================================== + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ +.. section products-end + +.. warning:: + The PIV application of the Nitrokey 3 is currently considered unstable and is not available on the stable firmware releases. + To obtain that functionality it is required to install a test firmware. + Subsequent firmware updates may lead to loss of data and cryptographic keys. + Please refer to `the firmware update documentation <../firmware-update.html#firmware-release-types>`__ for more information. + +The *Personal Identity Verfication* (PIV) is based on the NIST special publication `SP 800-73 `__. + +.. toctree:: + :maxdepth: 1 + :glob: + + Access Control + Certificate Management + Factory Reset + Key Management + + Guides diff --git a/source/components/nitrokey3/windows/piv/key_management.rst b/source/components/nitrokeys/features/piv/key_management.rst similarity index 97% rename from source/components/nitrokey3/windows/piv/key_management.rst rename to source/components/nitrokeys/features/piv/key_management.rst index c86eedca9b..3cd237c493 100644 --- a/source/components/nitrokey3/windows/piv/key_management.rst +++ b/source/components/nitrokeys/features/piv/key_management.rst @@ -1,6 +1,10 @@ Key Management ============== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + Key Slots --------- @@ -55,6 +59,6 @@ The PIV application can generate a new private key on the Nitrokey. The command below will create private key in key slot ``9a`` for the user with the subject name ``John Doe`` and subject alternative name ``jd@nitrokey.local``. -.. code-block:: +:: nitropy nk3 piv generate-key --key-slot 9a --subject-name "John Doe" --subject-alt-name-upn "jd@nitrokey.local" diff --git a/source/components/pro/otp.rst.inc b/source/components/nitrokeys/features/totp/general.rst similarity index 88% rename from source/components/pro/otp.rst.inc rename to source/components/nitrokeys/features/totp/general.rst index 9b21637c8c..83f83da1e3 100644 --- a/source/components/pro/otp.rst.inc +++ b/source/components/nitrokeys/features/totp/general.rst @@ -1,6 +1,10 @@ Two-factor Authentication with One-Time Passwords (OTP) ======================================================= +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: The use of One-time Passwords (OTP) is called very differently on the various services supporting it. Sometimes it is referred to as Multi-factor Authentication (MFA), sometimes it is Two-factor Authentication (2FA) or just “authentication via authenticator app” like Google Authenticator. Most of these services are compatible for usage with the Nitrokey Pro and Nitrokey Storage. The following instructions show how to enable OTP on our `support forum `__. The procedure is quite similar on most services. For a list of websites supporting OTP have a look at `dongleauth.com `__. @@ -12,14 +16,14 @@ Configure a Website/Application to Use OTP Login to the website which supports OTP (in this example, the `support forum `__). Usually you find the option to enable two-factor-authentication under your profile or in the settings. -.. figure:: /components/pro/images/otp/1.png +.. figure:: images/otp/1.png :alt: img1 Most of the time, you will get a QR-Code as seen below. There should be an option, to show the secret key directly. -.. figure:: /components/pro/images/otp/2.png +.. figure:: images/otp/2.png :alt: img2 @@ -28,21 +32,21 @@ We need to copy the secret code. This is what the Nitrokey is actually protecting. You may create a backup of it now (in case the Nitrokey get lost or breaks) by writing it down on a sheet of paper and storing it securely. But be aware that anybody who is in possession of this secret code, can create one-time passwords for your account! *Please note that you won’t be able to backup this code, once it is stored in the Nitrokey!* -.. figure:: /components/pro/images/otp/3.png +.. figure:: images/otp/3.png :alt: img3 Now start the Nitrokey App and open the “OTP Slot Configuration”. -.. figure:: /components/pro/images/otp/4.png +.. figure:: images/otp/4.png :alt: img4 Paste in the secret key in the corresponding field and choose an appropiate slot name. Click on “Save” and type in your admin PIN if requested. -.. figure:: /components/pro/images/otp/5.png +.. figure:: images/otp/5.png :alt: img5 @@ -50,14 +54,14 @@ Paste in the secret key in the corresponding field and choose an appropiate slot After saving the slot you can go to “Menu” -> “Passwords” -> YourSlotName to get your very first one-time password. -.. figure:: /components/pro/images/otp/6.png +.. figure:: images/otp/6.png :alt: img6 The one-time password is copied to your clipboard automatically. You just need to paste it to the field on the website to confirm the correct setup and thus to activate the two-factor authentication. -.. figure:: /components/pro/images/otp/7.png +.. figure:: images/otp/7.png :alt: img7 @@ -68,6 +72,6 @@ Securely Login to Website/Application From now on you will get asked for a one-time password additionally to your other credentials if you try to login the the website. You just need to open the Nitrokey App and go to “Menu” -> “Passwords” -> YourSlotName again to get the one-time password. -.. figure:: /components/pro/images/otp/8.png +.. figure:: images/otp/8.png :alt: img8 diff --git a/source/components/pro/2fa-google.rst.inc b/source/components/nitrokeys/features/totp/google.rst similarity index 94% rename from source/components/pro/2fa-google.rst.inc rename to source/components/nitrokeys/features/totp/google.rst index 401bc1bf1a..41bef000c3 100644 --- a/source/components/pro/2fa-google.rst.inc +++ b/source/components/nitrokeys/features/totp/google.rst @@ -1,6 +1,10 @@ Two-factor Authentication for Google ==================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: These are the basic steps for registering the Nitrokey Pro or Nitrokey Storage as a second factor of a Google account: diff --git a/source/components/pro/windows/images/2fa-microsoft/1.png b/source/components/nitrokeys/features/totp/images/microsoft/1.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/1.png rename to source/components/nitrokeys/features/totp/images/microsoft/1.png diff --git a/source/components/pro/windows/images/2fa-microsoft/10.png b/source/components/nitrokeys/features/totp/images/microsoft/10.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/10.png rename to source/components/nitrokeys/features/totp/images/microsoft/10.png diff --git a/source/components/pro/windows/images/2fa-microsoft/11.png b/source/components/nitrokeys/features/totp/images/microsoft/11.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/11.png rename to source/components/nitrokeys/features/totp/images/microsoft/11.png diff --git a/source/components/pro/windows/images/2fa-microsoft/12.png b/source/components/nitrokeys/features/totp/images/microsoft/12.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/12.png rename to source/components/nitrokeys/features/totp/images/microsoft/12.png diff --git a/source/components/pro/windows/images/2fa-microsoft/13.png b/source/components/nitrokeys/features/totp/images/microsoft/13.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/13.png rename to source/components/nitrokeys/features/totp/images/microsoft/13.png diff --git a/source/components/pro/windows/images/2fa-microsoft/14.png b/source/components/nitrokeys/features/totp/images/microsoft/14.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/14.png rename to source/components/nitrokeys/features/totp/images/microsoft/14.png diff --git a/source/components/pro/windows/images/2fa-microsoft/2.png b/source/components/nitrokeys/features/totp/images/microsoft/2.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/2.png rename to source/components/nitrokeys/features/totp/images/microsoft/2.png diff --git a/source/components/pro/windows/images/2fa-microsoft/3.png b/source/components/nitrokeys/features/totp/images/microsoft/3.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/3.png rename to source/components/nitrokeys/features/totp/images/microsoft/3.png diff --git a/source/components/pro/windows/images/2fa-microsoft/4.png b/source/components/nitrokeys/features/totp/images/microsoft/4.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/4.png rename to source/components/nitrokeys/features/totp/images/microsoft/4.png diff --git a/source/components/pro/windows/images/2fa-microsoft/5.png b/source/components/nitrokeys/features/totp/images/microsoft/5.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/5.png rename to source/components/nitrokeys/features/totp/images/microsoft/5.png diff --git a/source/components/pro/windows/images/2fa-microsoft/6.png b/source/components/nitrokeys/features/totp/images/microsoft/6.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/6.png rename to source/components/nitrokeys/features/totp/images/microsoft/6.png diff --git a/source/components/pro/windows/images/2fa-microsoft/7.png b/source/components/nitrokeys/features/totp/images/microsoft/7.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/7.png rename to source/components/nitrokeys/features/totp/images/microsoft/7.png diff --git a/source/components/pro/windows/images/2fa-microsoft/8.png b/source/components/nitrokeys/features/totp/images/microsoft/8.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/8.png rename to source/components/nitrokeys/features/totp/images/microsoft/8.png diff --git a/source/components/pro/windows/images/2fa-microsoft/9.png b/source/components/nitrokeys/features/totp/images/microsoft/9.png similarity index 100% rename from source/components/pro/windows/images/2fa-microsoft/9.png rename to source/components/nitrokeys/features/totp/images/microsoft/9.png diff --git a/source/components/pro/images/2fa-nextcloud/1.png b/source/components/nitrokeys/features/totp/images/nextcloud/1.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/1.png rename to source/components/nitrokeys/features/totp/images/nextcloud/1.png diff --git a/source/components/pro/images/2fa-nextcloud/2.png b/source/components/nitrokeys/features/totp/images/nextcloud/2.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/2.png rename to source/components/nitrokeys/features/totp/images/nextcloud/2.png diff --git a/source/components/pro/images/2fa-nextcloud/3.png b/source/components/nitrokeys/features/totp/images/nextcloud/3.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/3.png rename to source/components/nitrokeys/features/totp/images/nextcloud/3.png diff --git a/source/components/pro/images/2fa-nextcloud/4.png b/source/components/nitrokeys/features/totp/images/nextcloud/4.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/4.png rename to source/components/nitrokeys/features/totp/images/nextcloud/4.png diff --git a/source/components/pro/images/2fa-nextcloud/5.png b/source/components/nitrokeys/features/totp/images/nextcloud/5.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/5.png rename to source/components/nitrokeys/features/totp/images/nextcloud/5.png diff --git a/source/components/pro/images/2fa-nextcloud/6.png b/source/components/nitrokeys/features/totp/images/nextcloud/6.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/6.png rename to source/components/nitrokeys/features/totp/images/nextcloud/6.png diff --git a/source/components/pro/images/2fa-nextcloud/7.png b/source/components/nitrokeys/features/totp/images/nextcloud/7.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/7.png rename to source/components/nitrokeys/features/totp/images/nextcloud/7.png diff --git a/source/components/pro/images/2fa-nextcloud/8.png b/source/components/nitrokeys/features/totp/images/nextcloud/8.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/8.png rename to source/components/nitrokeys/features/totp/images/nextcloud/8.png diff --git a/source/components/pro/images/2fa-nextcloud/9.png b/source/components/nitrokeys/features/totp/images/nextcloud/9.png similarity index 100% rename from source/components/pro/images/2fa-nextcloud/9.png rename to source/components/nitrokeys/features/totp/images/nextcloud/9.png diff --git a/source/components/pro/images/otp/1.png b/source/components/nitrokeys/features/totp/images/otp/1.png similarity index 100% rename from source/components/pro/images/otp/1.png rename to source/components/nitrokeys/features/totp/images/otp/1.png diff --git a/source/components/pro/images/otp/2.png b/source/components/nitrokeys/features/totp/images/otp/2.png similarity index 100% rename from source/components/pro/images/otp/2.png rename to source/components/nitrokeys/features/totp/images/otp/2.png diff --git a/source/components/pro/images/otp/3.png b/source/components/nitrokeys/features/totp/images/otp/3.png similarity index 100% rename from source/components/pro/images/otp/3.png rename to source/components/nitrokeys/features/totp/images/otp/3.png diff --git a/source/components/pro/images/otp/4.png b/source/components/nitrokeys/features/totp/images/otp/4.png similarity index 100% rename from source/components/pro/images/otp/4.png rename to source/components/nitrokeys/features/totp/images/otp/4.png diff --git a/source/components/pro/images/otp/5.png b/source/components/nitrokeys/features/totp/images/otp/5.png similarity index 100% rename from source/components/pro/images/otp/5.png rename to source/components/nitrokeys/features/totp/images/otp/5.png diff --git a/source/components/pro/images/otp/6.png b/source/components/nitrokeys/features/totp/images/otp/6.png similarity index 100% rename from source/components/pro/images/otp/6.png rename to source/components/nitrokeys/features/totp/images/otp/6.png diff --git a/source/components/pro/images/otp/7.png b/source/components/nitrokeys/features/totp/images/otp/7.png similarity index 100% rename from source/components/pro/images/otp/7.png rename to source/components/nitrokeys/features/totp/images/otp/7.png diff --git a/source/components/pro/images/otp/8.png b/source/components/nitrokeys/features/totp/images/otp/8.png similarity index 100% rename from source/components/pro/images/otp/8.png rename to source/components/nitrokeys/features/totp/images/otp/8.png diff --git a/source/components/nitrokeys/features/totp/index.rst b/source/components/nitrokeys/features/totp/index.rst new file mode 100644 index 0000000000..4e053eed01 --- /dev/null +++ b/source/components/nitrokeys/features/totp/index.rst @@ -0,0 +1,35 @@ +Two-factor Authentication with One-Time Passwords (OTP) +======================================================= + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ⨯ + - ✓ + - ⨯ + - ✓ +.. section products-end + +.. toctree:: + :maxdepth: 1 + + General Instructions + Microsoft + Google + Nextcloud \ No newline at end of file diff --git a/source/components/pro/windows/2fa-microsoft.rst b/source/components/nitrokeys/features/totp/microsoft.rst similarity index 53% rename from source/components/pro/windows/2fa-microsoft.rst rename to source/components/nitrokeys/features/totp/microsoft.rst index 8d912e1813..a12f8d5dcb 100644 --- a/source/components/pro/windows/2fa-microsoft.rst +++ b/source/components/nitrokeys/features/totp/microsoft.rst @@ -1,94 +1,98 @@ Two-factor Authentication for Microsoft Account =============================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: These are the basic steps for registering the Nitrokey Pro or Nitrokey Storage as a second factor of a Microsoft account. Visit https://account.live.com/proofs/Manage/additional and log in to your Microsoft account if prompted. -.. figure:: /components/pro/windows/images/2fa-microsoft/1.png +.. figure:: images/microsoft/1.png :alt: img1 -.. figure:: /components/pro/windows/images/2fa-microsoft/2.png +.. figure:: images/microsoft/2.png :alt: img2 Click on “Set up two-step verification”. -.. figure:: /components/pro/windows/images/2fa-microsoft/3.png +.. figure:: images/microsoft/3.png :alt: img3 Click on “Next”. -.. figure:: /components/pro/windows/images/2fa-microsoft/4.png +.. figure:: images/microsoft/4.png :alt: img4 Now it is important to click on “set up a different Authenticator app”. -.. figure:: /components/pro/windows/images/2fa-microsoft/5.png +.. figure:: images/microsoft/5.png :alt: img5 Click on “I can’t scan the bar code”. -.. figure:: /components/pro/windows/images/2fa-microsoft/6.png +.. figure:: images/microsoft/6.png :alt: img6 Insert and save secret code into the Nitrokey App. -.. figure:: /components/pro/windows/images/2fa-microsoft/7.png +.. figure:: images/microsoft/7.png :alt: img7 -.. figure:: /components/pro/windows/images/2fa-microsoft/8.png +.. figure:: images/microsoft/8.png :alt: img8 -.. figure:: /components/pro/windows/images/2fa-microsoft/9.png +.. figure:: images/microsoft/9.png :alt: img9 Enter code generated by Nitrokey App to confirm. -.. figure:: /components/pro/windows/images/2fa-microsoft/10.png +.. figure:: images/microsoft/10.png :alt: img10 -.. figure:: /components/pro/windows/images/2fa-microsoft/11.png +.. figure:: images/microsoft/11.png :alt: img11 Click “Next” and then “Finish”. -.. figure:: /components/pro/windows/images/2fa-microsoft/12.png +.. figure:: images/microsoft/12.png :alt: img12 -.. figure:: /components/pro/windows/images/2fa-microsoft/13.png +.. figure:: images/microsoft/13.png :alt: img13 From now on, when signing in you need an OTP additionally to your password. -.. figure:: /components/pro/windows/images/2fa-microsoft/14.png +.. figure:: images/microsoft/14.png :alt: img14 diff --git a/source/components/pro/2fa-nextcloud.rst.inc b/source/components/nitrokeys/features/totp/nextcloud.rst similarity index 71% rename from source/components/pro/2fa-nextcloud.rst.inc rename to source/components/nitrokeys/features/totp/nextcloud.rst index a4cf09a0cc..43a23c32a7 100644 --- a/source/components/pro/2fa-nextcloud.rst.inc +++ b/source/components/nitrokeys/features/totp/nextcloud.rst @@ -1,65 +1,69 @@ Two-factor Authentication for Nextcloud accounts ================================================ +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: These are the basic steps for registering the Nitrokey Pro or Nitrokey Storage as a second factor of a Nextcloud account. At first, log in to your Nextcloud account, click on the top right symbol of your account and open the settings menu. -.. figure:: /components/pro/images/2fa-nextcloud/1.png +.. figure:: images/nextcloud/1.png :alt: img1 Now choose “Security” on the left hand side. -.. figure:: /components/pro/images/2fa-nextcloud/2.png +.. figure:: images/nextcloud/2.png :alt: img2 Now you can tick the box reading “Enable TOTP”. There is shown the TOTP secret which we need to add to our Nitrokey via the Nitrokey App. -.. figure:: /components/pro/images/2fa-nextcloud/3.png +.. figure:: images/nextcloud/3.png :alt: img3 Copy and save secret code into the Nitrokey App. -.. figure:: /components/pro/images/2fa-nextcloud/4.png +.. figure:: images/nextcloud/4.png :alt: img4 -.. figure:: /components/pro/images/2fa-nextcloud/5.png +.. figure:: images/nextcloud/5.png :alt: img5 Now we request a one-time password for the Nextcloud to verify the process by inserting the password on the website and pressing “verify”. -.. figure:: /components/pro/images/2fa-nextcloud/6.png +.. figure:: images/nextcloud/6.png :alt: img6 -.. figure:: /components/pro/images/2fa-nextcloud/7.png +.. figure:: images/nextcloud/7.png :alt: img7 From now on, when signing in you need an OTP additionally to your password. Get one by the Nitrokey App like before and insert it in when logging in. -.. figure:: /components/pro/images/2fa-nextcloud/8.png +.. figure:: images/nextcloud/8.png :alt: img8 Nextcloud provides you with backup codes, in case you lost your Nitrokey. It is recommended to print out these codes and store them somewhere save otherwise you might not be able to log in to your account anymore! -.. figure:: /components/pro/images/2fa-nextcloud/9.png +.. figure:: images/nextcloud/9.png :alt: img9 diff --git a/source/components/nitrokeys/features/u2f/2fa.rst b/source/components/nitrokeys/features/u2f/2fa.rst new file mode 100644 index 0000000000..538bd25367 --- /dev/null +++ b/source/components/nitrokeys/features/u2f/2fa.rst @@ -0,0 +1,36 @@ +Two-Factor Authentication (2FA) +=============================== + +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + +1. Open one of the `websites that support FIDO + U2F `__. +2. Log in to the website and enable two-factor authentication in your + account settings. (In most cases you will find a link to the + documentation of the supported web service at + `dongleauth.com `__) +3. Register your Nitrokey in the account settings by touching the + button to activate the Nitrokey. After you have successfully + configured the device, you must activate the Nitrokey this way + each time you log in. + +You are now ready to go. + +.. important:: + The Nitrokey App can not be used for the Nitrokey U2F. + +Troubleshooting (Linux) +----------------------- + +- If the Nitrokey is not accepted immediately, you may need to copy + this file + `41-nitrokey.rules `__ + to ``etc/udev/rules.d/``. In very rare cases, the system will need + the `older + version `__ + of this file. + +- After copying the file, restart udev via + ``sudo service udev restart``. diff --git a/source/components/fido2/linux/desktop-login.rst b/source/components/nitrokeys/features/u2f/desktop-login.rst similarity index 95% rename from source/components/fido2/linux/desktop-login.rst rename to source/components/nitrokeys/features/u2f/desktop-login.rst index 26b6c84140..10bebd4024 100644 --- a/source/components/fido2/linux/desktop-login.rst +++ b/source/components/nitrokeys/features/u2f/desktop-login.rst @@ -1,12 +1,16 @@ Desktop Login And Linux User Authentication =========================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. contents:: :local: Introduction ------------ -This guide will walk you through the configuration of Linux to use FIDO Universal 2nd Factor, i.e. FIDO U2F with ``libpam-u2f`` and Nitrokey FIDO2. +This guide will walk you through the configuration of Linux to use FIDO Universal 2nd Factor, i.e. FIDO U2F with ``libpam-u2f`` and Nitrokey FIDO2. If you want to login to you computer using `Nitrokey Pro 2, `__ `Nitrokey Storage @@ -28,29 +32,29 @@ GUI Method 1. **In the lower left corner click on** ``Show Applications`` **and type settings in the search bar as following:** - .. figure:: /components/fido2/linux/images/fidou2f-1.png + .. figure:: images/desktop-login/fidou2f-1.png :alt: img1 2. **Scroll down in the right bar to** ``Users`` - .. figure:: /components/fido2/linux/images/fidou2f-2.png + .. figure:: images/desktop-login/fidou2f-2.png :alt: img2 3. **In the left corner click on** ``Unlock`` **and that would prompt for your password** - .. figure:: /components/fido2/linux/images/fidou2f-3.png + .. figure:: images/desktop-login/fidou2f-3.png :alt: img3 4. **Select** ``Administrator`` **and enter the user name and password of your choice** - .. figure:: /components/fido2/linux/images/fidou2f-4.png + .. figure:: images/desktop-login/fidou2f-4.png :alt: img4 5. **Once you finish Step 4 you should be done** - .. figure:: /components/fido2/linux/images/fidou2f-5.png + .. figure:: images/desktop-login/fidou2f-5.png :alt: img5 CLI Method @@ -230,7 +234,7 @@ CLI Method You can also test your configuration by logging out of the user session and logging back. A similar screen should be displayed once you you unplug/replug yout Nitrokey FIDO2 and type your password: - .. figure:: /components/fido2/linux/images/u2f-fido-pam-2.png + .. figure:: images/desktop-login/u2f-fido-pam-2.png :alt: img6 Usage diff --git a/source/components/fido2/linux/images/fidou2f-1.png b/source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-1.png similarity index 100% rename from source/components/fido2/linux/images/fidou2f-1.png rename to source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-1.png diff --git a/source/components/fido2/linux/images/fidou2f-2.png b/source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-2.png similarity index 100% rename from source/components/fido2/linux/images/fidou2f-2.png rename to source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-2.png diff --git a/source/components/fido2/linux/images/fidou2f-3.png b/source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-3.png similarity index 100% rename from source/components/fido2/linux/images/fidou2f-3.png rename to source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-3.png diff --git a/source/components/fido2/linux/images/fidou2f-4.png b/source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-4.png similarity index 100% rename from source/components/fido2/linux/images/fidou2f-4.png rename to source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-4.png diff --git a/source/components/fido2/linux/images/fidou2f-5.png b/source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-5.png similarity index 100% rename from source/components/fido2/linux/images/fidou2f-5.png rename to source/components/nitrokeys/features/u2f/images/desktop-login/fidou2f-5.png diff --git a/source/components/fido2/linux/images/u2f-fido-pam-2.png b/source/components/nitrokeys/features/u2f/images/desktop-login/u2f-fido-pam-2.png similarity index 100% rename from source/components/fido2/linux/images/u2f-fido-pam-2.png rename to source/components/nitrokeys/features/u2f/images/desktop-login/u2f-fido-pam-2.png diff --git a/source/components/nitrokeys/features/u2f/index.rst b/source/components/nitrokeys/features/u2f/index.rst new file mode 100644 index 0000000000..921cd6159c --- /dev/null +++ b/source/components/nitrokeys/features/u2f/index.rst @@ -0,0 +1,34 @@ +U2F +=== + +.. section products-begin +.. list-table:: + :width: 100% + :header-rows: 1 + :class: products-table + + * - `Nitrokey 3 `_ + - `Nitrokey Passkey `_ + - `Nitrokey FIDO2 `_ + - `Nitrokey U2F `_ + - `Nitrokey HSM 2 `_ + - `Nitrokey Pro 2 `_ + - `Nitrokey Start `_ + - `Nitrokey Storage 2 `_ + + * - ✓ + - ✓ + - ✓ + - ✓ + - ⨯ + - ✓ + - ⨯ + - ✓ +.. section products-end + +.. toctree:: + :maxdepth: 1 + + Desktop Login (Linux only) + Odoo Login + Two Factor Authentication <2fa> \ No newline at end of file diff --git a/source/components/fido2/2fa-odoo.rst.inc b/source/components/nitrokeys/features/u2f/odoo.rst similarity index 88% rename from source/components/fido2/2fa-odoo.rst.inc rename to source/components/nitrokeys/features/u2f/odoo.rst index bc568fa24c..aa7c189a83 100644 --- a/source/components/fido2/2fa-odoo.rst.inc +++ b/source/components/nitrokeys/features/u2f/odoo.rst @@ -1,6 +1,10 @@ Two-Factor Authentication For ERP Software Odoo =============================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + .. only:: comment .. contents:: :local: @@ -17,8 +21,8 @@ The FIDO solution was developed together with our partner `initOS `__ -Video: Two-Factor Authentication With The Nitrokey FIDO U2F in Odoo -------------------------------------------------------------------- +Video: Two-Factor Authentication With The Nitrokey U2F in Odoo +-------------------------------------------------------------- .. raw:: html diff --git a/source/components/fido2/faq.rst b/source/components/nitrokeys/fido2/faq.rst similarity index 86% rename from source/components/fido2/faq.rst rename to source/components/nitrokeys/fido2/faq.rst index 9302f6eba5..8021edfbc8 100644 --- a/source/components/fido2/faq.rst +++ b/source/components/nitrokeys/fido2/faq.rst @@ -6,9 +6,7 @@ Nitrokey FIDO2 FAQ **Q:** What can I use the Nitrokey for? - See the `overview`_ of supported use cases. - -.. _overview: https://www.nitrokey.com/products/nitrokeys + See the `overview `_ of supported use cases. **Q:** What happens if I lose my FIDO device? When securing accounts using FIDO (two-factor authentication and @@ -26,4 +24,4 @@ Nitrokey FIDO2 FAQ After `disabling Enforce Attestation`_ Nitrokey FIDO2 is supported by Azure Entra ID out of the box. -.. include:: ../shared-faqs/hyperlinks.rst.inc +.. include:: ../../shared-faqs/hyperlinks.rst.inc \ No newline at end of file diff --git a/source/components/fido2/shared/firmware-update.rst.inc b/source/components/nitrokeys/fido2/firmware-update.rst similarity index 93% rename from source/components/fido2/shared/firmware-update.rst.inc rename to source/components/nitrokeys/fido2/firmware-update.rst index 350bb2b4e2..8a4e2399e4 100644 --- a/source/components/fido2/shared/firmware-update.rst.inc +++ b/source/components/nitrokeys/fido2/firmware-update.rst @@ -33,7 +33,6 @@ In case of any errors please take the logs from ``/tmp`` directory (``/tmp/nitro -.. _Nitrokey 3 Firmware - GitHub Releases: https://github.com/Nitrokey/nitrokey-3-firmware/releases .. _installation instructions: /software/nitropy/all-platforms/installation.html diff --git a/source/components/fido2/shared/index-content1.rst.inc b/source/components/nitrokeys/fido2/getting-started.rst similarity index 94% rename from source/components/fido2/shared/index-content1.rst.inc rename to source/components/nitrokeys/fido2/getting-started.rst index 5acb9a02b5..5e08e1384e 100644 --- a/source/components/fido2/shared/index-content1.rst.inc +++ b/source/components/nitrokeys/fido2/getting-started.rst @@ -1,3 +1,6 @@ +Getting Started +=============== + The Nitrokey FIDO2 supports two-factor authentication (2FA) and passwordless authentication: @@ -172,3 +175,17 @@ seconds until the green or blue LED lights up. Note: white LED blinking is used as well to signalize the selected device (the so called WINK command). + +Troubleshooting (Linux) +----------------------- + +If the Nitrokey is not detected, proceed the following: + +1. Copy this file + `41-nitrokey.rules `__ + to ``/etc/udev/rules.d/``. In very rare cases, the system will need + the `older + version `__ + of this file. +2. Restart udev via ``sudo service udev restart`` or ``udevadm control --reload-rules && udevadm trigger`` if you are using Fedora. + diff --git a/source/components/nitrokeys/fido2/index.rst b/source/components/nitrokeys/fido2/index.rst new file mode 100644 index 0000000000..afb48aefef --- /dev/null +++ b/source/components/nitrokeys/fido2/index.rst @@ -0,0 +1,27 @@ +Nitrokey FIDO2 +============== + +.. contents:: :local: + +First check the: + +.. toctree:: + :maxdepth: 1 + :glob: + + Getting Started + Frequently Asked Questions + +and the product guides: + +.. toctree:: + :maxdepth: 1 + + Firmware update + Reset + +or check out the features: + +* `FIDO2 <../features/fido2/index.html>`_ +* `U2F <../features/u2f/index.html>`_ + diff --git a/source/components/fido2/windows/reset.rst b/source/components/nitrokeys/fido2/reset.rst similarity index 67% rename from source/components/fido2/windows/reset.rst rename to source/components/nitrokeys/fido2/reset.rst index c568a0757d..3a2bed2fe6 100644 --- a/source/components/fido2/windows/reset.rst +++ b/source/components/nitrokeys/fido2/reset.rst @@ -3,14 +3,21 @@ Nitrokey Reset .. contents:: :local: -The Factory Reset operation deletes the FIDO secret keys stored on the Nitrokey and generates new ones. Afterwards the Nitrokey behaves like a new device. +Factory Reset operation regenerates the secret material stored on the Nitrokey FIDO U2F / Nitrokey FIDO2, which makes it a completely new key logic-side. New owner cannot use it to login to account of the previous one. In case of the FIDO2 Resident Keys the material is erased. To avoid accidental and malicious reset of the Nitrokey, the required touch confirmation time for the FIDO2 reset operation is longer and with a distinct LED behavior (red LED light) than normal operations. To reset -the Nitrokey, confirm by touching the touch button for at least 5 +the Nitrokey FIDO2, confirm by touching the touch button for at least 5 seconds until the green or blue LED lights up. +Nitrokey FIDO2 could be reset by: + +* pynitrokey tool: ``nitropy fido2 reset`` (requires Administrator rights to execute) +* Google Chrome: `Manage security keys` via the direct link: `chrome://settings/securityKeys` + +Or by using these instructions (Windows only): + Windows 10 ~~~~~~~~~~ @@ -30,11 +37,4 @@ Windows 10 on a Virtual Machine Please keep in mind Nitrokey has internal timeout for accepting the FIDO reset operation of 10 seconds since powering up. If the Nitrokey will connect to a virtual machine later than that, it will return error and -the operation will be aborted. - -Other Ways to Reset -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -Nitrokey can also be reset by: - -* pynitrokey tool: ``nitropy fido2 reset`` (requires Administrator rights to execute) +the operation will be aborted. \ No newline at end of file diff --git a/source/components/hsm/faq.rst b/source/components/nitrokeys/hsm/faq.rst similarity index 97% rename from source/components/hsm/faq.rst rename to source/components/nitrokeys/hsm/faq.rst index 4ec1e1426b..dbc17c02f5 100644 --- a/source/components/hsm/faq.rst +++ b/source/components/nitrokeys/hsm/faq.rst @@ -2,7 +2,7 @@ Nitrokey HSM FAQ ================ -.. include:: ../shared-faqs/nitrokeys.rst.inc +.. include:: ../../shared-faqs/nitrokeys.rst.inc **Q:** What is the maximum length of the PIN? @@ -56,7 +56,7 @@ Nitrokey HSM FAQ Use ``opensc-tool --list-algorithms`` and compare with the table below. Please also see `this thread`_ for the factsheets and more details. -.. include:: ../shared-faqs/algos.rst.inc +.. include:: ../../shared-faqs/algos.rst.inc **Q:** How can I use the True Random Number Generator (TRNG) of the Nitrokey HSM for my applications? Nitrokey HSM can be used with `Botan`_ and `TokenTools`_ by using OpenSC as a PKCS#11 driver. @@ -110,4 +110,4 @@ Nitrokey HSM FAQ .. _TokenTools: https://github.com/infincia/TokenTools .. _AIS 31: https://www.bsi.bund.de/SharedDocs/Downloads/DE/BSI/Zertifizierung/Interpretationen/AIS_31_pdf -.. include:: ../shared-faqs/hyperlinks.rst.inc +.. include:: ../../shared-faqs/hyperlinks.rst.inc diff --git a/source/components/nitrokeys/hsm/getting-started.rst b/source/components/nitrokeys/hsm/getting-started.rst new file mode 100644 index 0000000000..8c962725ad --- /dev/null +++ b/source/components/nitrokeys/hsm/getting-started.rst @@ -0,0 +1,40 @@ +Getting Started +=============== + +.. contents:: :local: + + +1. + .. tabs:: + .. tab:: Linux + Install `OpenSC `__. You need + at least version 0.19. You can find recent builds for debian-based + systems like Ubuntu + `here `__ if your system + does not have the newest version of OpenSC. Alternatively, install + `this `__ + driver (`source `__). + + .. tab:: MacOS + Install `OpenSC `__. + Alternatively, install + `this `__ + driver (`source `__). + + .. tab:: Windows + Install `OpenSC `__. + Alternatively, install + `this `__ + driver (`source `__). + +2. Define SO-PIN and PIN of your own choices. See `these + instructions `__. + Afterwards you can begin to `generate new + keys `__. + +Your Nitrokey is now ready to use. + +* There is `nitrotool `__ as a more comfortable frontend to OpenSC. (hsmwiz) +* Embedded Systems: For systems with minimal memory footprint a read/only PKCS#11 module is provided by the `sc-hsm-embedded `__ project. +* `This PKCS#11 module `__ is useful for deployments where key generation at the user's workplace is not required. The PKCS#11 module also supports major electronic signature cards available in the German market. +* OpenSCDP: The SmartCard-HSM is fully integrated with `OpenSCDP `__, the open smart card development platform. See the `public support scripts `__ for details. diff --git a/source/components/hsm/index.rst b/source/components/nitrokeys/hsm/index.rst similarity index 50% rename from source/components/hsm/index.rst rename to source/components/nitrokeys/hsm/index.rst index 9a6a47b6bd..865b3a7b6e 100644 --- a/source/components/hsm/index.rst +++ b/source/components/nitrokeys/hsm/index.rst @@ -9,15 +9,9 @@ First check the: :maxdepth: 1 :glob: + Getting Started Frequently Asked Questions -or choose your operating system: +or check out the features: -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - +* `HSM <../features/hsm/index.html>`_ \ No newline at end of file diff --git a/source/components/nitrokeys/index.rst b/source/components/nitrokeys/index.rst new file mode 100644 index 0000000000..889f34963b --- /dev/null +++ b/source/components/nitrokeys/index.rst @@ -0,0 +1,16 @@ +Nitrokeys +========= + +.. toctree:: + :maxdepth: 1 + :glob: + + Features + Nitrokey 3 + Nitrokey Passkey + Nitrokey FIDO2 + Nitrokey U2F + Nitrokey HSM 2 + Nitrokey Pro 2 + Nitrokey Start + Nitrokey Storage 2 diff --git a/source/components/nitrokey3/adsk.rst.inc b/source/components/nitrokeys/nitrokey3/adsk.rst similarity index 97% rename from source/components/nitrokey3/adsk.rst.inc rename to source/components/nitrokeys/nitrokey3/adsk.rst index 7ec053c335..73e9131ec0 100644 --- a/source/components/nitrokey3/adsk.rst.inc +++ b/source/components/nitrokeys/nitrokey3/adsk.rst @@ -27,9 +27,9 @@ Preparing the Keys Follow one of these guides to generate the two keys: -- :doc:`openpgp-keygen-backup` -- :doc:`openpgp-keygen-on-device` -- :doc:`openpgp-keygen-gpa` +- :doc:`../features/openpgp-card/openpgp-keygen-backup` +- :doc:`../features/openpgp-card/openpgp-keygen-on-device` +- :doc:`../features/openpgp-card/openpgp-keygen-gpa` Make sure that you can list both keys with ``gpg --list-keys``, for example:: diff --git a/source/components/nitrokey3/faq.rst b/source/components/nitrokeys/nitrokey3/faq.rst similarity index 94% rename from source/components/nitrokey3/faq.rst rename to source/components/nitrokeys/nitrokey3/faq.rst index 2b55bd3471..f81e28761d 100644 --- a/source/components/nitrokey3/faq.rst +++ b/source/components/nitrokeys/nitrokey3/faq.rst @@ -5,9 +5,7 @@ Nitrokey 3 FAQ Windows, Linux and macOS. Also some support for Android and iOS. **Q:** What can I use the Nitrokey for? - See the `overview`_ of supported use cases. - -.. _overview: https://www.nitrokey.com/products/nitrokeys + See the `overview `_ of supported use cases. **Q:** How can I check if my Nitrokey 3 is working? On `WebAuthn.io`_ you can check various high-level functionalities, while @@ -39,7 +37,7 @@ Nitrokey 3 FAQ **Q:** Why does the Nitrokey 3 not show up in Nitrokey App? Nitrokey 3 does only show up and can be managed in "nitropy" and "Nitrokey App 2, not in Nitrokey App 1". -.. include:: ../shared-faqs/algos.rst.inc +.. include:: ../../shared-faqs/algos.rst.inc **Q:** How can I set the PIN for my Nitrokey 3? The Nitrokey 3 has distinct PINs for each feature. @@ -63,5 +61,5 @@ Nitrokey 3 FAQ using the Nitrokey 3 with the SE050 in production environments. -.. include:: ../shared-faqs/hyperlinks.rst.inc +.. include:: ../../shared-faqs/hyperlinks.rst.inc .. _test: ../software/nitropy/all-platforms/test.html diff --git a/source/components/nitrokey3/linux/firmware-update-qubes.rst b/source/components/nitrokeys/nitrokey3/firmware-update-qubes.rst similarity index 100% rename from source/components/nitrokey3/linux/firmware-update-qubes.rst rename to source/components/nitrokeys/nitrokey3/firmware-update-qubes.rst diff --git a/source/components/nitrokey3/firmware-update.rst.inc b/source/components/nitrokeys/nitrokey3/firmware-update.rst similarity index 84% rename from source/components/nitrokey3/firmware-update.rst.inc rename to source/components/nitrokeys/nitrokey3/firmware-update.rst index 1ea0e3ed90..8a4f0442da 100644 --- a/source/components/nitrokey3/firmware-update.rst.inc +++ b/source/components/nitrokeys/nitrokey3/firmware-update.rst @@ -32,7 +32,6 @@ How to Update In case of any errors please take the logs from ``/tmp`` directory (``/tmp/nitropy.log.*``). -.. _Nitrokey 3 Firmware - GitHub Releases: https://github.com/Nitrokey/nitrokey-3-firmware/releases .. _installation instructions: ../../software/nitropy/all-platforms/installation.html @@ -88,3 +87,18 @@ Examples: This is mostly relevant for users that rely on a feature from the test releases. Users of the stable firmware can always update to the latest available firmware version. + +Troubleshooting (Linux): +------------------------ + +**Issue:** I get ``permission denied for /dev/hidrawX`` during update. + This likely means your user has not the needed permissions to + read/write the device. Please make sure you have set up the correct + `udev-rules`_. Download this `udev-rules`_ set and place it in your + udev rules directory (e.g., ``/etc/udev/rules.d``). Then remove + your Nitrokey 3 from the USB slot and run: + ``udevadm control --reload-rules && udevadm trigger`` or reboot + your machine. Afterwards the update should work without the + permission issue. + +.. _udev-rules: https://raw.githubusercontent.com/Nitrokey/libnitrokey/master/data/41-nitrokey.rules diff --git a/source/components/nitrokey3/shared/main.rst b/source/components/nitrokeys/nitrokey3/getting-started.rst similarity index 97% rename from source/components/nitrokey3/shared/main.rst rename to source/components/nitrokeys/nitrokey3/getting-started.rst index 4d2e38cd43..fa8a485d9c 100644 --- a/source/components/nitrokey3/shared/main.rst +++ b/source/components/nitrokeys/nitrokey3/getting-started.rst @@ -1,3 +1,6 @@ +Getting Started +=============== + The Nitrokey 3 supports two-factor authentication (2FA) and passwordless authentication: diff --git a/source/components/nitrokeys/nitrokey3/index.rst b/source/components/nitrokeys/nitrokey3/index.rst new file mode 100644 index 0000000000..3011f84f17 --- /dev/null +++ b/source/components/nitrokeys/nitrokey3/index.rst @@ -0,0 +1,38 @@ +Nitrokey 3 +========== + +.. contents:: :local: + +First check the: + +.. toctree:: + :maxdepth: 1 + :glob: + + Getting Started + Frequently Asked Questions + Overview + +and the product guides: + +.. toctree:: + :maxdepth: 1 + + Firmware Update + Firmware Update Qubes + Set Pins + nitropy + Reset + Troubleshooting + Additional Decryption Subkeys (ADSK) with GnuPG + +or check out the features: + +* `FIDO2 <../features/fido2/index.html>`_ +* `U2F <../features/u2f/index.html>`_ +* `OpenPGP Card <../features/openpgp-card/index.html>`_ +* `Password Safe <../features/password-safe/index.html>`_ + +Additional features like `PIV (Windows only) <../features/piv/index.html>`_ are available in test firmware releases. See the `release notes`_ on GitHub for more information. + +.. _release notes: https://github.com/Nitrokey/nitrokey-3-firmware/releases diff --git a/source/components/nitrokey3/shared/nitropy.rst b/source/components/nitrokeys/nitrokey3/nitropy.rst similarity index 100% rename from source/components/nitrokey3/shared/nitropy.rst rename to source/components/nitrokeys/nitrokey3/nitropy.rst diff --git a/source/components/nitrokey3/features.rst b/source/components/nitrokeys/nitrokey3/overview.rst similarity index 78% rename from source/components/nitrokey3/features.rst rename to source/components/nitrokeys/nitrokey3/overview.rst index 57ac7d1798..7238fc4b8e 100644 --- a/source/components/nitrokey3/features.rst +++ b/source/components/nitrokeys/nitrokey3/overview.rst @@ -1,4 +1,4 @@ -Features +Overview ######## @@ -22,11 +22,21 @@ features are realized. - USB, NFC - no + * - `U2F`_ + - Predecessor of FIDO2 mainly used for Two-Factor Authentication + - USB, NFC + - no + * - `OpenPGP Card`_ - Asymmetric cryptography; keep your private key(s) secure; email encryption - USB - yes + * - `SMIME`_ + - Asymmetric cryptography; keep your private key(s) secure; email encryption + - USB + - yes + * - `Password Safe`_ - (One-Time-)Passwords securely stored on your Nitrokey 3 - USB @@ -70,15 +80,17 @@ data migrations from test to stable firmwares will not be implemented.** - no -.. _FIDO2: https://github.com/Nitrokey/fido-authenticator -.. _OpenPGP Card: https://github.com/Nitrokey/opcard-rs -.. _Password Safe: https://github.com/Nitrokey/trussed-secrets-app +.. _FIDO2: ../features/fido/index.html +.. _U2F: ../features/u2f/index.html +.. _OpenPGP Card: ../features/openpgp-card/index.html +.. _Password Safe: ../features/password-safe/index.html .. _Admin App: https://github.com/Nitrokey/admin-app -.. _PIV: https://github.com/Nitrokey/piv-authenticator +.. _PIV: ../features/piv/index .. _WebSmartCard: https://github.com/Nitrokey/nitrokey-websmartcard +.. _SMIME: ../features/smime/index.html -.. _pynitrokey: ../software/nitropy -.. _NitrokeyApp2: ../software/nk-app2 +.. _pynitrokey: ../software/nitropy/index.html +.. _NitrokeyApp2: ../software/nk-app2/index.html .. _Test Firmware: linux/firmware-update#firmware-release-types diff --git a/source/components/nitrokey3/shared/reset.rst.inc b/source/components/nitrokeys/nitrokey3/reset.rst similarity index 100% rename from source/components/nitrokey3/shared/reset.rst.inc rename to source/components/nitrokeys/nitrokey3/reset.rst diff --git a/source/components/nitrokey3/shared/set-pins.rst.inc b/source/components/nitrokeys/nitrokey3/set-pins.rst similarity index 98% rename from source/components/nitrokey3/shared/set-pins.rst.inc rename to source/components/nitrokeys/nitrokey3/set-pins.rst index 979574a514..dc79dccf61 100644 --- a/source/components/nitrokey3/shared/set-pins.rst.inc +++ b/source/components/nitrokeys/nitrokey3/set-pins.rst @@ -54,8 +54,8 @@ Setting PIN with the Chrom(e|ium) webbrowser .. start-fido2-windows-settings-application -Settings PIN with Windows Settings application -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ +Settings PIN with Windows Settings application (Windows only) +^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 1. Open the Windows "Settings" application. 2. Open the "Accounts" menu. diff --git a/source/components/nitrokey3/troubleshooting.rst.inc b/source/components/nitrokeys/nitrokey3/troubleshooting.rst similarity index 100% rename from source/components/nitrokey3/troubleshooting.rst.inc rename to source/components/nitrokeys/nitrokey3/troubleshooting.rst diff --git a/source/components/nkpk/index.rst b/source/components/nitrokeys/passkey/index.rst similarity index 100% rename from source/components/nkpk/index.rst rename to source/components/nitrokeys/passkey/index.rst diff --git a/source/components/pro/factory-reset.rst.inc b/source/components/nitrokeys/pro/factory-reset.rst similarity index 100% rename from source/components/pro/factory-reset.rst.inc rename to source/components/nitrokeys/pro/factory-reset.rst diff --git a/source/components/pro/faq.rst b/source/components/nitrokeys/pro/faq.rst similarity index 94% rename from source/components/pro/faq.rst rename to source/components/nitrokeys/pro/faq.rst index 930d6a9647..5c348c4443 100644 --- a/source/components/pro/faq.rst +++ b/source/components/nitrokeys/pro/faq.rst @@ -2,7 +2,7 @@ Nitrokey Pro 2 FAQ ================== -.. include:: ../shared-faqs/nitrokeys.rst.inc +.. include:: ../../shared-faqs/nitrokeys.rst.inc **Q:** What are the default PINs? * **User PIN:** "123456" @@ -11,7 +11,7 @@ Nitrokey Pro 2 FAQ We strongly recommend to change these PINs/password to user-chosen values before using the Nitrokey. -.. include:: ../shared-faqs/pins.rst.inc +.. include:: ../../shared-faqs/pins.rst.inc **Q:** Why does my Nitrokey Pro hang when switching between nitrokey-app and GnuPG? GnuPG and nitrokey-app sometimes tend to hand each other. This is a known problem @@ -41,7 +41,7 @@ Nitrokey Pro 2 FAQ * 128 bit AES, 240 bytes per command -> 930 bytes per second -.. include:: ../shared-faqs/algos.rst.inc +.. include:: ../../shared-faqs/algos.rst.inc **Q:** Does the Nitrokey Pro contain a secure chip or just a normal microcontroller? @@ -68,4 +68,4 @@ Nitrokey Pro 2 FAQ The Nitrokey Pro doesn't contain storage capability for ordinary data (it can only store cryptographic keys and certificates). -.. include:: ../shared-faqs/hyperlinks.rst.inc +.. include:: ../../shared-faqs/hyperlinks.rst.inc diff --git a/source/components/pro/firmware-update.rst.inc b/source/components/nitrokeys/pro/firmware-update.rst similarity index 58% rename from source/components/pro/firmware-update.rst.inc rename to source/components/nitrokeys/pro/firmware-update.rst index 8555b7c07c..b43cb39fbe 100644 --- a/source/components/pro/firmware-update.rst.inc +++ b/source/components/nitrokeys/pro/firmware-update.rst @@ -21,8 +21,8 @@ How to Update 1. Make sure you have the latest `pynitrokey` version installed, please check the `installation instructions <../../software/nitropy/all-platforms/installation.html>`__ for your OS. 2. Download the latest stable `firmware image `__. -.. important:: - For production use you should choose the latest stable version (so only versions, that don’t contain i.e. “pre-release” or “RC”). + .. important:: + For production use you should choose the latest stable version (so only versions, that don’t contain i.e. “pre-release” or “RC”). 3. To apply the update run: @@ -39,25 +39,25 @@ Alternatively `dfu-util` can be used for the firmware update: 1. Install dfu-util -Binaries for Windows are available at: - * http://dfu-util.sourceforge.net/releases/ + Binaries for Windows are available at: + * http://dfu-util.sourceforge.net/releases/ -For macOS binaries are available via Homebrew: - * https://formulae.brew.sh/formula/dfu-util + For macOS binaries are available via Homebrew: + * https://formulae.brew.sh/formula/dfu-util -*macOS only:* Install `dfu-util` via Homebrew + *macOS only:* Install `dfu-util` via Homebrew -.. code-block:: bash + .. code-block:: bash - brew install dfu-util + brew install dfu-util 2. Use Nitrokey App v1.5-RC7 or higher to change the boot mode of the Nitrokey Pro to update mode. 3. Now the following command to apply the update -.. code-block:: bash + .. code-block:: bash - $ dfu-util -D update_binary.bin + $ dfu-util -D update_binary.bin 4. The boot mode can now be changed back again with the Nitrokey App. @@ -77,3 +77,17 @@ Troubleshooting $ locate libnitrokey.so +Linux Permission error +^^^^^^^^^^^^^^^^^^^^^^ + +**Issue:** I get ``permission denied for /dev/hidrawX`` during update. + This likely means your user has not the needed permissions to + read/write the device. Please make sure you have set up the correct + `udev-rules`_. Download this `udev-rules`_ set and place it in your + udev rules directory (e.g., ``/etc/udev/rules.d``). Then remove + your Nitrokey Pro from the USB slot and run: + ``udevadm control --reload-rules && udevadm trigger`` or reboot + your machine. Afterwards the update should work without the + permission issue. + +.. _udev-rules: https://raw.githubusercontent.com/Nitrokey/libnitrokey/master/data/41-nitrokey.rules diff --git a/source/components/nitrokeys/pro/getting-started.rst b/source/components/nitrokeys/pro/getting-started.rst new file mode 100644 index 0000000000..d3cd78b115 --- /dev/null +++ b/source/components/nitrokeys/pro/getting-started.rst @@ -0,0 +1,73 @@ +Getting Started +=============== + +.. contents:: :local: + + +1. + + .. tabs:: + .. tab:: Linux + To access the OpenPGP smart card of the Nitrokey, install the package + libccid. On Debian/Ubuntu based Distributions type in terminal: *sudo + apt-get update && sudo apt-get install libccid* + + If your distribution has a rather old version of libccid (<1.4.21) + you have to add the device information by yourself (for example if + you are using Ubuntu 14.04 or older). In this case please follow + these + `instructions `__. + .. tab:: MacOS + Once you plug in the Nitrokey, your computer will start the Keyboard + Setup Assistant. **Don’t run through this assistant but exit it right + away.** + .. tab:: Windows + Connect your Nitrokey to your computer and confirm all dialogs so + that the USB smart card device driver gets installed almost + automatically. Windows may fail to install an additional device + driver for the smart card. Its safe to ignore this warning. + + +2. Download and start the `Nitrokey + App `__. Follow the + `instructions <../product-guides/change-pins/index.html>`_ + to change the default User PIN (default: 123456) and Admin PIN + (default: 12345678) to your own choices. + +.. figure:: ../features/openpgp-card/images/change-pins/App-change-pin.png + :alt: img + + +Your Nitrokey is now ready to use. + +.. note:: + + - For some Versions of MacOS it is necessary to install custom `ccid + driver `__ + (for information see + `here `__), + but in general MacOS should have the driver onboard. + + - For many use cases described, it is necessary to have either + OpenPGP or S/MIME keys installed on the device (see below). + + +.. tip:: + + Note: For many use cases described, it is necessary to have either + OpenPGP or S/MIME keys installed on the device (see below). + + +Key Creation with OpenPGP or S/MIME +----------------------------------- + +There are two widely used standards for email encryption. While +OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used +by enterprises. If you are in doubt which one to choose, you should use +OpenPGP. + +To learn more about how to use OpenPGP for email encryption with the Nitrokey, +please refer to chapter `OpenPGP Email Encryption <../features/openpgp/index.html>`_. + +To learn more about how to use S/MIME for email encryption with the Nitrokey, +please refer to chapter `S/MIME Email Encryption <../features/smime/index.html>`_. diff --git a/source/components/nitrokeys/pro/index.rst b/source/components/nitrokeys/pro/index.rst new file mode 100644 index 0000000000..2cec20a8ae --- /dev/null +++ b/source/components/nitrokeys/pro/index.rst @@ -0,0 +1,32 @@ +Nitrokey Pro 2 +============== + +.. contents:: :local: + + +First check the: + +.. toctree:: + :maxdepth: 1 + :glob: + + Getting Started + Frequently Asked Questions + +and the product guides: + +.. toctree:: + :maxdepth: 1 + + Update + Factory Reset + +or check out the features: + +* `U2F <../features/u2f/index.html>`_ +* `TOTP <../features/totp/index.html>`_ +* `OpenPGP Card <../features/openpgp-card/index.html>`_ +* `Automatic Screen Lock (Linux) <../features/misc/automatic-screen-lock/index.html>`_ +* `ECC <../features/misc/ecc/index.html>`_ + + diff --git a/source/components/start/factory-reset.rst b/source/components/nitrokeys/start/factory-reset.rst similarity index 97% rename from source/components/start/factory-reset.rst rename to source/components/nitrokeys/start/factory-reset.rst index 3bc5fe81db..dca659a0af 100644 --- a/source/components/start/factory-reset.rst +++ b/source/components/nitrokeys/start/factory-reset.rst @@ -14,7 +14,7 @@ Usage To change the identity it suffices to send a custom CCID command. This could be achieved with ``pynitrokey`` tool: -1. `Install pynitrokey `__. +1. `Install pynitrokey <../../software/nitropy/all-platforms/installation.html>`. 2. Connect your Nitrokey Start and verify that it got recognized. diff --git a/source/components/start/faq.rst b/source/components/nitrokeys/start/faq.rst similarity index 87% rename from source/components/start/faq.rst rename to source/components/nitrokeys/start/faq.rst index 728964c7e6..b701c170af 100644 --- a/source/components/start/faq.rst +++ b/source/components/nitrokeys/start/faq.rst @@ -1,7 +1,7 @@ Nitrokey Start FAQ ================== -.. include:: ../shared-faqs/nitrokeys.rst.inc +.. include:: ../../shared-faqs/nitrokeys.rst.inc **Q:** What are the default PINs? * **User PIN:** "123456" @@ -10,7 +10,7 @@ Nitrokey Start FAQ We strongly recommend to change these PINs/password to user-chosen values before using the Nitrokey. -.. include:: ../shared-faqs/pins.rst.inc +.. include:: ../../shared-faqs/pins.rst.inc **Q:** Which drivers/tools can be used? GnuPG is required for many use cases. It is a command line tool but usually @@ -26,7 +26,7 @@ Nitrokey Start FAQ instructions work Nitrokey as well. In general the official documentation is recommended. -.. include:: ../shared-faqs/algos.rst.inc +.. include:: ../../shared-faqs/algos.rst.inc **Q:** Does the Nitrokey Start contain a secure chip or just a normal microcontroller? @@ -37,6 +37,6 @@ Nitrokey Start FAQ only store cryptographic keys and certificates). -.. include:: ../shared-faqs/hyperlinks.rst.inc +.. include:: ../../shared-faqs/hyperlinks.rst.inc diff --git a/source/components/start/linux/firmware-update.rst b/source/components/nitrokeys/start/firmware-update.rst similarity index 83% rename from source/components/start/linux/firmware-update.rst rename to source/components/nitrokeys/start/firmware-update.rst index 6ba94be8c8..d319d3e169 100644 --- a/source/components/start/linux/firmware-update.rst +++ b/source/components/nitrokeys/start/firmware-update.rst @@ -14,19 +14,10 @@ Firmware Update To update the firmware of your Nitrokey Start, proceed as follows. -1. Install pip3. - .. code-block:: bash - - $ sudo apt install python3-pip - -2. Install pynitrokey. For this you need an Internet connection. - - .. code-block:: bash - - $ pip3 install --user pynitrokey +1. First `install pynitrokey <../../software/nitropy/all-platforms/installation.html>`_. For this you need an Internet connection. -3. Connect your Nitrokey Start and verify its recognition. +2. Connect your Nitrokey Start and verify its recognition. .. rstcheck: ignore-next-code-block .. code-block:: bash @@ -36,13 +27,13 @@ To update the firmware of your Nitrokey Start, proceed as follows. :: 'Nitrokey Start' keys: FSIJ-1.2.15-87042524: Nitrokey Nitrokey Start (RTM.8) -4. Start the update process. For this you need an Internet connection. +3. Start the update process. For this you need an Internet connection. .. code-block:: bash $ nitropy start update -5. You will then be asked to enter the Admin PIN of your Nitrokey Start. +4. You will then be asked to enter the Admin PIN of your Nitrokey Start. (Default PIN: 12345678) .. code-block:: bash @@ -55,7 +46,7 @@ To update the firmware of your Nitrokey Start, proceed as follows. Saving run log to: /tmp/nitropy.log.d4erqux4 Admin password: "your admin PIN" -6. Under “Device” you will find information about the current version of +5. Under “Device” you will find information about the current version of your Nitrokey Start. In the first item under “Please note” you can see the latest firmware version available. Now you have to confirm the update with “yes”. @@ -88,7 +79,7 @@ To update the firmware of your Nitrokey Start, proceed as follows. - Whole process should not take more than 1 minute Do you want to continue? [yes/no]: yes -7. You can check the firmware version after the upgrade process has +6. You can check the firmware version after the upgrade process has completed. .. rstcheck: ignore-next-code-block diff --git a/source/components/start/linux/index.rst b/source/components/nitrokeys/start/getting-started.rst similarity index 80% rename from source/components/start/linux/index.rst rename to source/components/nitrokeys/start/getting-started.rst index 7882065b82..7253b9beb7 100644 --- a/source/components/start/linux/index.rst +++ b/source/components/nitrokeys/start/getting-started.rst @@ -1,18 +1,24 @@ -Nitrokey Start, Linux -===================== +Getting Started +=============== -.. contents:: :local: -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: +1. + .. tabs:: + .. tab:: Linux + Install ``scdaemon`` and GnuPG 2.1 or higher by using your package + manager (e.g. ``apt update && apt install scdaemon gnupg2`` on Ubuntu). + Install ``scdaemon`` and GnuPG 2.1 or higher by using your package + manager (e.g. ``apt update && apt install scdaemon gnupg2`` on Ubuntu). - * + .. tab:: MacOS + Install `GnuPG 2.1 `__ or higher. -1. Install ``scdaemon`` and GnuPG 2.1 or higher by using your package - manager (e.g. ``apt update && apt install scdaemon gnupg2`` on Ubuntu). -2. Connect your Nitrokey to your computer. + .. tab:: Windows + Install `Gpg4win `__ on your Computer. + +2. Connect your Nitrokey to your computer and confirm all dialogs (if there are any) so + that the USB smart card device driver gets installed almost + automatically. 3. Use GnuPG to `generate new keys or import existing ones `_. diff --git a/source/components/nitrokeys/start/index.rst b/source/components/nitrokeys/start/index.rst new file mode 100644 index 0000000000..845222d319 --- /dev/null +++ b/source/components/nitrokeys/start/index.rst @@ -0,0 +1,27 @@ +Nitrokey Start +============== + +.. contents:: :local: + +First check the: + +.. toctree:: + :maxdepth: 1 + :glob: + + Getting Started + Frequently Asked Questions + +and the product guides: + +.. toctree:: + :maxdepth: 1 + + Multiple Identities + Setting KDF-DO + Factory Reset + Firmware Update + +or check out the features: + +* `OpenPGP Card <../features/openpgp-card/index.html>`_ \ No newline at end of file diff --git a/source/components/start/multiple-identities.rst.inc b/source/components/nitrokeys/start/multiple-identities.rst similarity index 79% rename from source/components/start/multiple-identities.rst.inc rename to source/components/nitrokeys/start/multiple-identities.rst index de88bce6b0..b8f916f19f 100644 --- a/source/components/start/multiple-identities.rst.inc +++ b/source/components/nitrokeys/start/multiple-identities.rst @@ -19,22 +19,22 @@ To change the identity it suffices to send a custom CCID command. This could be 2. Connect your Nitrokey Start and verify that it got recognized. -.. code-block:: bash + :: - $ nitropy start list - *** Nitrokey tool for Nitrokey FIDO2 & Nitrokey Start - :: 'Nitrokey Start' keys: - FSIJ-1.2.15-87042524: Nitrokey Nitrokey Start (RTM.10) + $ nitropy start list + *** Nitrokey tool for Nitrokey FIDO2 & Nitrokey Start + :: 'Nitrokey Start' keys: + FSIJ-1.2.15-87042524: Nitrokey Nitrokey Start (RTM.10) 3. Change the identity, by replacing ```` with ``0``, ``1``, or ``2``. -.. code-block:: bash + :: - $ nitropy start set-identity - *** Nitrokey tool for Nitrokey FIDO2 & Nitrokey Start - Trying to set identity to - device has reset, and should now have the new identity + $ nitropy start set-identity + *** Nitrokey tool for Nitrokey FIDO2 & Nitrokey Start + Trying to set identity to + device has reset, and should now have the new identity Limitations ----------- diff --git a/source/components/start/setting-kdf-do.rst.inc b/source/components/nitrokeys/start/setting-kdf-do.rst similarity index 100% rename from source/components/start/setting-kdf-do.rst.inc rename to source/components/nitrokeys/start/setting-kdf-do.rst diff --git a/source/components/storage/factory-reset.rst b/source/components/nitrokeys/storage/factory-reset.rst similarity index 95% rename from source/components/storage/factory-reset.rst rename to source/components/nitrokeys/storage/factory-reset.rst index 998f37cf3f..fb710c5987 100644 --- a/source/components/storage/factory-reset.rst +++ b/source/components/nitrokeys/storage/factory-reset.rst @@ -1,3 +1,6 @@ +Factory reset +============= + .. contents:: :local: There are two types of factory resets for Nitrokey Storage devices: @@ -17,7 +20,7 @@ Password Safe and the Encrypted Volume without performing a factory reset. The factory reset can be triggered in the Nitrokey App with the menu entry ``Configure->Special Configure->Factory reset``. -.. figure:: /components/storage/images/factory-reset-menu-item.png +.. figure:: images//factory-reset/factory-reset-menu-item.png :alt: factory-reset-menu-item .. note:: diff --git a/source/components/storage/faq.rst b/source/components/nitrokeys/storage/faq.rst similarity index 97% rename from source/components/storage/faq.rst rename to source/components/nitrokeys/storage/faq.rst index c06c86f269..6b1811ae3c 100644 --- a/source/components/storage/faq.rst +++ b/source/components/nitrokeys/storage/faq.rst @@ -4,7 +4,7 @@ Nitrokey Storage FAQ As the Nitrokey Storage 2 is essentially a Nitrokey Pro 2 including a non-volatile (encrypted) storage, the :doc:`Nitrokey Pro 2 FAQ <../pro/faq>` also partly applies. -.. include:: ../shared-faqs/nitrokeys.rst.inc +.. include:: ../../shared-faqs/nitrokeys.rst.inc **Q:** What are the default PINs? * **User PIN:** "123456" @@ -25,7 +25,7 @@ non-volatile (encrypted) storage, the :doc:`Nitrokey Pro 2 FAQ <../pro/faq>` als make sure you first "Destroy encrypted data" inside the Nitrokey App. -.. include:: ../shared-faqs/pins.rst.inc +.. include:: ../../shared-faqs/pins.rst.inc **Q:** Why does my Nitrokey Storage hang when switching between nitrokey-app and GnuPG? @@ -57,7 +57,7 @@ non-volatile (encrypted) storage, the :doc:`Nitrokey Pro 2 FAQ <../pro/faq>` als * 256 bit AES, 240 bytes per command -> 910 bytes per second * 128 bit AES, 240 bytes per command -> 930 bytes per second -.. include:: ../shared-faqs/algos.rst.inc +.. include:: ../../shared-faqs/algos.rst.inc **Q:** Does the Nitrokey Storage contain a secure chip or just a normal microcontroller? Nitrokey Storage contains a tamper resistant smart card. @@ -115,4 +115,4 @@ non-volatile (encrypted) storage, the :doc:`Nitrokey Pro 2 FAQ <../pro/faq>` als Hidden volumes are like containers inside of a container, the encrypted volume. -.. include:: ../shared-faqs/hyperlinks.rst.inc +.. include:: ../../shared-faqs/hyperlinks.rst.inc diff --git a/source/components/storage/firmware-update-manually.rst b/source/components/nitrokeys/storage/firmware-update-manually.rst similarity index 79% rename from source/components/storage/firmware-update-manually.rst rename to source/components/nitrokeys/storage/firmware-update-manually.rst index e9c486b675..6146f335a4 100644 --- a/source/components/storage/firmware-update-manually.rst +++ b/source/components/nitrokeys/storage/firmware-update-manually.rst @@ -1,3 +1,7 @@ +Manual Firmware Update +====================== + + .. contents:: :local: .. note:: @@ -24,12 +28,12 @@ Install Balena Etcher Balena Etcher helps us to install the USB image on the USB stick. Please double click on the `previously downloaded installation file `__ and follow the instructions. -.. figure:: /components/storage/images/firmware-update-manually/1.png +.. figure:: images/firmware-update-manually/1.png :alt: img1 -.. figure:: /components/storage/images/firmware-update-manually/2.png +.. figure:: images/firmware-update-manually/2.png :alt: img2 @@ -39,29 +43,29 @@ Installing the USB image with Balena Etcher The program usually opens immediately after installation. If not, you will find a shortcut on the desktop. Using the application, select the `previously downloaded image file `__, which ends with “.img.zip”. Now insert the USB stick. It should be recognized automatically. Press “Flash!” to proceed. -.. figure:: /components/storage/images/firmware-update-manually/3.png +.. figure:: images/firmware-update-manually/3.png :alt: img3 -.. figure:: /components/storage/images/firmware-update-manually/4.png +.. figure:: images/firmware-update-manually/4.png :alt: img4 You must allow the application to make changes. -.. figure:: /components/storage/images/firmware-update-manually/5.png +.. figure:: images/firmware-update-manually/5.png :alt: img5 -.. figure:: /components/storage/images/firmware-update-manually/7.png +.. figure:: images/firmware-update-manually/7.png :alt: img7 -.. figure:: /components/storage/images/firmware-update-manually/8.png +.. figure:: images/firmware-update-manually/8.png :alt: img8 After the image has been successfully transferred, Windows may ask if the device should be formatted. It is important that you click “Cancel”, otherwise the USB stick will be overwritten by Windows. -.. figure:: /components/storage/images/firmware-update-manually/9.png +.. figure:: images/firmware-update-manually/9.png :alt: img9 @@ -73,14 +77,14 @@ Now the system must be restarted. The USB stick must remain in the USB port so t After the system has started, please choose the language by typing 1 (English) and hit Enter. -.. figure:: /components/storage/images/firmware-update-manually/10.png +.. figure:: images/firmware-update-manually/10.png :alt: img10 Please insert the Nitrokey Storage when asked to. -.. figure:: /components/storage/images/firmware-update-manually/11.png +.. figure:: images/firmware-update-manually/11.png :alt: img11 @@ -88,7 +92,7 @@ Please insert the Nitrokey Storage when asked to. The Firmware Update Mode will be started automatically if the standard password is set. Otherwise you need to input your password and hit enter. -.. figure:: /components/storage/images/firmware-update-manually/12.png +.. figure:: images/firmware-update-manually/12.png :alt: img12 @@ -99,6 +103,6 @@ Restoring the USB Stick Windows should automatically ask to format your USB Stick as soon as you insert the USB Stick the first time again in Windows. Just accept the request for being able to use the USB Stick as previously. -.. figure:: /components/storage/images/firmware-update-manually/13.png +.. figure:: images/firmware-update-manually/13.png :alt: img13 diff --git a/source/components/nitrokeys/storage/firmware-update.rst b/source/components/nitrokeys/storage/firmware-update.rst new file mode 100644 index 0000000000..e90b40eb64 --- /dev/null +++ b/source/components/nitrokeys/storage/firmware-update.rst @@ -0,0 +1,104 @@ +Firmware Update +=============== + +.. contents:: :local: + +.. warning:: + + You should backup all data from the device before upgrading, as + firmware upgrades may destroy all data on the device (especially + coming from firmware version <0.45)! + +.. important:: + Never disconnect the Nitrokey Start or abort the process while updating, + this will likely render your device useless + + +.. tabs:: + .. tab:: Linux + 1. Download the `Nitrokey App `__ and the program “dfu-programmer” which should be available through your package-manager, e.g. ``apt-get update && apt-get install dfu-programmer`` on Debian-based systems. + + 2. Download the latest firmware ".hex" file from `here `__ and store it as "firmware.hex" in your home folder. Older releases are `here `__. + + 3. Right click on the icon of the Nitrokey App and go to “Configure” -> “Enable Firmware Update”. The default firmware password is ‘12345678’. + + .. figure:: images/firmware-update/enable-firmware-update.png + :alt: Enable firmware update + + .. note:: + + The Nitrokey Storage is not detected by Nitrokey App anymore once update mode got + activated. You have to proceed with the instructions described below + to make it work again. + + + 4. Open a terminal and execute: + + .. code-block:: bash + + sudo dfu-programmer at32uc3a3256s erase + sudo dfu-programmer at32uc3a3256s flash --suppress-bootloader-mem firmware.hex + sudo dfu-programmer at32uc3a3256s launch + # versions <0.7 of dfu-programmer use "start" instead of "launch" + + whereas “firmware.hex” needs to be the path and file name of the firmware which you downloaded in step 2. + + .. tab:: MacOS + 1. Download the `Nitrokey App `__ and the `Nitrokey Update Tool `__. The Nitrokey Update Tool is currently available for macOS and Windows only. + + 2. Download the latest firmware ".hex" file from `here `__. Older releases are `here `__. + + 3. Right click on the icon of the Nitrokey App and go to “Configure” -> “Enable Firmware Update”. The default firmware password is ‘12345678’. + + .. figure:: images/firmware-update/enable-firmware-update.png + :alt: Enable firmware update + + .. note:: + + The Nitrokey Storage is not detected by Nitrokey App anymore once update mode got + activated. You have to proceed with the instructions described below + to make it work again. + + .. note:: + + If you are using Microsoft Windows Build 1809 and Nitrokey Storage + Firmware 0.52 or lower, you need to use another system or if this is not + feasible use `these + instructions `_ to + enable the Firmware Update mode. + + 4. Start the Nitrokey Update Tool and click “Select firmware file”. Select the previously downloaded firmware ".hex" file. Click on “Update firmware” to start the update process. Your device should get detected by the Nitrokey App again as soon as the update is finished. + + .. figure:: images/firmware-update/nitrokey-update-tool.png + :alt: Nitrokey Update Tool + + .. tab:: Windows + + 1. Download the `Nitrokey App `__ and the `Nitrokey Update Tool `__. The Nitrokey Update Tool is currently available for macOS and Windows only. + + 2. Download the latest firmware ".hex" file from `here `__. Older releases are `here `__. + + 3. Right click on the icon of the Nitrokey App and go to “Configure” -> “Enable Firmware Update”. The default firmware password is ‘12345678’. + + .. figure:: images/firmware-update/enable-firmware-update.png + :alt: Enable firmware update + + .. note:: + + The Nitrokey Storage is not detected by Nitrokey App anymore once update mode got + activated. You have to proceed with the instructions described below + to make it work again. + + .. note:: + + If you are using Microsoft Windows Build 1809 and Nitrokey Storage + Firmware 0.52 or lower, you need to use another system or if this is not + feasible use `these + instructions `_ to + enable the Firmware Update mode. + + 4. Start the Nitrokey Update Tool and click “Select firmware file”. Select the previously downloaded firmware ".hex" file. Click on “Update firmware” to start the update process. Your device should get detected by the Nitrokey App again as soon as the update is finished. + + .. figure:: images/firmware-update/nitrokey-update-tool.png + :alt: Nitrokey Update Tool + diff --git a/source/components/nitrokeys/storage/getting-started.rst b/source/components/nitrokeys/storage/getting-started.rst new file mode 100644 index 0000000000..d89c16028d --- /dev/null +++ b/source/components/nitrokeys/storage/getting-started.rst @@ -0,0 +1,78 @@ +Getting Started +=============== + +.. contents:: :local: + + +1. + .. tabs:: + .. group-tab:: Linux + To access the OpenPGP smart card of the Nitrokey, install the package + libccid. On Debian/Ubuntu based Distributions type in terminal: + .. code-block:: bash + + $ sudo apt-get update && sudo apt-get install libccid + + .. group-tab:: MacOS + Important: Once you plug in the Nitrokey, your computer will start + the Keyboard Setup Assistant. **Don’t run through this assistant but + exit it right away.** + + .. group-tab:: Windows + Connect your Nitrokey to your computer and confirm all dialogs so that the USB smart card device driver gets installed almost automatically. + + .. note:: + + Windows may fail to install an additional device driver for the smart card. Its safe to ignore this warning. + +2. + .. tabs:: + .. group-tab:: Linux + Download and start the `Nitrokey App `__. + + .. group-tab:: MacOS + Download and start the `Nitrokey App `__. Perhaps you want to store + it on the unencrypted partition of your Nitrokey Storage + + .. group-tab:: Windows + Download and start the `Nitrokey App `__. Perhaps you want to store it on the unencrypted partition of your Nitrokey Storage. There won’t open a window, but an icon appears in the system tray (see screenshot below). Please right-click on this icon to use all the options of the App. + + .. figure:: images/getting-started/Windows10-Systemtray.png + :alt: img1 + +3. Open the About window from Nitrokey App’s menu and check if you have + the `latest + firmware `__ + installed. If it’s not the latest, please + `update `_. + +4. Use the Nitrokey App to change the default User PIN (default: 123456) + and Admin PIN (default: 12345678) to your own choices. + +Your Nitrokey is now ready to use. + +.. note:: + + - For some Versions of MacOS it is necessary to install custom `ccid + driver `__ + (for information see + `here `__), + but in general MacOS should have the driver onboard. + + - For many use cases described, it is necessary to have either + OpenPGP or S/MIME keys installed on the device (see below). + +Key Creation with OpenPGP or S/MIME +----------------------------------- + +There are two widely used standards for email encryption. While +OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used +by enterprises. If you are in doubt which one to choose, you should use +OpenPGP. + +To learn more about how to use OpenPGP for email encryption with the Nitrokey, +please refer to chapter `OpenPGP Email Encryption <../features/openpgp/index.html>`_. + +To learn more about how to use S/MIME for email encryption with the Nitrokey, +please refer to chapter `S/MIME Email Encryption <../features/smime/index.html>`_. + diff --git a/source/components/storage/images/factory-reset-menu-item.png b/source/components/nitrokeys/storage/images/factory-reset/factory-reset-menu-item.png similarity index 100% rename from source/components/storage/images/factory-reset-menu-item.png rename to source/components/nitrokeys/storage/images/factory-reset/factory-reset-menu-item.png diff --git a/source/components/storage/images/firmware-update-manually/1.png b/source/components/nitrokeys/storage/images/firmware-update-manually/1.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/1.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/1.png diff --git a/source/components/storage/images/firmware-update-manually/10.png b/source/components/nitrokeys/storage/images/firmware-update-manually/10.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/10.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/10.png diff --git a/source/components/storage/images/firmware-update-manually/11.png b/source/components/nitrokeys/storage/images/firmware-update-manually/11.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/11.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/11.png diff --git a/source/components/storage/images/firmware-update-manually/12.png b/source/components/nitrokeys/storage/images/firmware-update-manually/12.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/12.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/12.png diff --git a/source/components/storage/images/firmware-update-manually/13.png b/source/components/nitrokeys/storage/images/firmware-update-manually/13.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/13.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/13.png diff --git a/source/components/storage/images/firmware-update-manually/2.png b/source/components/nitrokeys/storage/images/firmware-update-manually/2.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/2.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/2.png diff --git a/source/components/storage/images/firmware-update-manually/3.png b/source/components/nitrokeys/storage/images/firmware-update-manually/3.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/3.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/3.png diff --git a/source/components/storage/images/firmware-update-manually/4.png b/source/components/nitrokeys/storage/images/firmware-update-manually/4.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/4.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/4.png diff --git a/source/components/storage/images/firmware-update-manually/5.png b/source/components/nitrokeys/storage/images/firmware-update-manually/5.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/5.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/5.png diff --git a/source/components/storage/images/firmware-update-manually/6.png b/source/components/nitrokeys/storage/images/firmware-update-manually/6.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/6.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/6.png diff --git a/source/components/storage/images/firmware-update-manually/7.png b/source/components/nitrokeys/storage/images/firmware-update-manually/7.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/7.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/7.png diff --git a/source/components/storage/images/firmware-update-manually/8.png b/source/components/nitrokeys/storage/images/firmware-update-manually/8.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/8.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/8.png diff --git a/source/components/storage/images/firmware-update-manually/9.png b/source/components/nitrokeys/storage/images/firmware-update-manually/9.png similarity index 100% rename from source/components/storage/images/firmware-update-manually/9.png rename to source/components/nitrokeys/storage/images/firmware-update-manually/9.png diff --git a/source/components/storage/images/enable-firmware-update.png b/source/components/nitrokeys/storage/images/firmware-update/enable-firmware-update.png similarity index 100% rename from source/components/storage/images/enable-firmware-update.png rename to source/components/nitrokeys/storage/images/firmware-update/enable-firmware-update.png diff --git a/source/components/storage/windows/images/nitrokey-update-tool.png b/source/components/nitrokeys/storage/images/firmware-update/nitrokey-update-tool.png similarity index 100% rename from source/components/storage/windows/images/nitrokey-update-tool.png rename to source/components/nitrokeys/storage/images/firmware-update/nitrokey-update-tool.png diff --git a/source/components/storage/windows/images/Windows10-Systemtray.png b/source/components/nitrokeys/storage/images/getting-started/Windows10-Systemtray.png similarity index 100% rename from source/components/storage/windows/images/Windows10-Systemtray.png rename to source/components/nitrokeys/storage/images/getting-started/Windows10-Systemtray.png diff --git a/source/components/nitrokeys/storage/index.rst b/source/components/nitrokeys/storage/index.rst new file mode 100644 index 0000000000..dd2c5e6be9 --- /dev/null +++ b/source/components/nitrokeys/storage/index.rst @@ -0,0 +1,32 @@ +Nitrokey Storage 2 +================== + +.. contents:: :local: + +First check the: + +.. toctree:: + :maxdepth: 1 + :glob: + + Getting Started + Frequently Asked Questions + +and the product guides: + +.. toctree:: + :maxdepth: 2 + + Firmware-Update + Manual Firmware-Update + Factory Reset + +or check out the features: + +* `U2F <../features/u2f/index.html>`_ +* `TOTP <../features/totp/index.html>`_ +* `OpenPGP Card <../features/openpgp-card/index.html>`_ +* `Encrypted Mobile Storage <../features/encrypted-storage/index.html>`_ +* `Hidden Storage <../features/hidden-storage/index.html>`_ +* `Automatic Screen Lock (Linux) <../features/misc/automatic-screen-lock/index.html>`_ +* `ECC <../features/misc/ecc/index.html>`_ \ No newline at end of file diff --git a/source/components/nitrokeys/u2f/index.rst b/source/components/nitrokeys/u2f/index.rst new file mode 100644 index 0000000000..cce321a267 --- /dev/null +++ b/source/components/nitrokeys/u2f/index.rst @@ -0,0 +1,8 @@ +Nitrokey U2F +============ + +.. contents:: :local: + +Check out the features: + +* `U2F <../features/u2f/index.html>`_ diff --git a/source/components/nitropad/qubes/change-pins.rst b/source/components/nitropad/qubes/change-pins.rst index c14cd241e1..177ab7edae 100644 --- a/source/components/nitropad/qubes/change-pins.rst +++ b/source/components/nitropad/qubes/change-pins.rst @@ -1 +1 @@ -.. include:: ../../pro/change-pins.rst.inc +.. include:: ../../nitrokeys/features/openpgp-card/change-pins.rst diff --git a/source/components/nitropad/ubuntu/change-pins.rst b/source/components/nitropad/ubuntu/change-pins.rst index 5e1a030d4a..177ab7edae 100644 --- a/source/components/nitropad/ubuntu/change-pins.rst +++ b/source/components/nitropad/ubuntu/change-pins.rst @@ -1 +1 @@ -.. include:: ../../pro/change-pins.rst.inc +.. include:: ../../nitrokeys/features/openpgp-card/change-pins.rst diff --git a/source/components/pro/2fa-odoo.rst.inc b/source/components/pro/2fa-odoo.rst.inc deleted file mode 100644 index cdf8ede5d4..0000000000 --- a/source/components/pro/2fa-odoo.rst.inc +++ /dev/null @@ -1,29 +0,0 @@ -Two-Factor Authentication For ERP Software Odoo -=============================================== - -.. only:: comment - - .. contents:: :local: - -`Odoo `__ is a powerful ERP (Enterprise Resource Planning) software for companies of all sizes. Odoo is available as open source and contains modules for CRM, website, e-commerce, accounting, financial accounting, production, warehouse management, project management, document management, among others. - -The secure access to such a central software is especially important and can now be realized with the Nitrokey. For this purpose access is protected by two-factor authentication (2FA) and critical users are given a Nitrokey. From now on during login the Nitrokey will be checked in addition to the user's password. Phishing attacks are thus foiled and your critical company data is protected. - -The two-factor authentication can be carried out using one-time passwords (TOTP, RFC 6238) and FIDO U2F, thus enabling Nitrokey Pro, Nitrokey Storage and Nitrokey FIDO U2F to be used. It is also possible to configure authentication centrally and to activate it only for selected users. - -The FIDO solution was developed together with our partner `initOS `__, who are specialized in the development and customization of Odoo. If you are interested, `contact us `__. - -.. only::: comment - - `Contact `__ - -Video: Two-Factor Authentication With The Nitrokey Pro in Odoo --------------------------------------------------------------- - -.. raw:: html - - diff --git a/source/components/pro/change-pins.rst.inc b/source/components/pro/change-pins.rst.inc deleted file mode 100644 index 5b30611d16..0000000000 --- a/source/components/pro/change-pins.rst.inc +++ /dev/null @@ -1,48 +0,0 @@ -Change User and Admin PIN -========================= - -.. contents:: :local: - -User PIN --------- - -The user PIN is at least 6-digits long and is used to get access to the content of the Nitrokey. This is the PIN you will use a lot in every day use e.g. for decrypting messages, for unlocking your encrypted storage (NK Storage only) etc. - -You can change the user PIN with the Nitrokey App if using a Nitrokey Pro or Nitrokey Storage. In the `Nitrokey `__ App open ‘Menu -> -Configure -> Change User PIN’ to open the dialog to change the PIN. - -.. figure:: /components/pro/images/change-pins/1.png - :alt: img1 - - - -You can change the User PIN in the dialog window now. - -The user PIN can have up to 20 digits and other characters (e.g. alphabetic and special characters). But as the user PIN is blocked as soon three wrong PIN attempts were done, it is sufficiently secure to only have a 6 digits PIN. The default PIN is 123456. - -.. figure:: /components/pro/images/change-pins/2.png - :alt: img2 - - - -Admin PIN ---------- - -The admin PIN is at least 8-digits long and is used to change contents/settings of the Nitrokey. That is to say after initializing the Nitrokey you probably won’t need this PIN too often (e.g. if you want to add another password to the password safe of the Nitrokey Pro or Nitrokey Storage). - -You can change the admin PIN with the Nitrokey App if using a Nitrokey Pro or Nitrokey Storage. In the `Nitrokey App `__ open ‘Menu -> Configure -> -Change Admin PIN’ to open the dialog to change the PIN. - -.. figure:: /components/pro/images/change-pins/3.png - :alt: img3 - - - -You can change the admin PIN in the dialog window now. - -The admin PIN can have up to 20 digits and other characters (e.g. alphabetic and special characters). But as the admin PIN is blocked as soon three wrong PIN attempts were done, it is sufficiently secure to only have 8 digits PIN. The default PIN is 12345678. - -.. figure:: /components/pro/images/change-pins/4.png - :alt: img4 - - diff --git a/source/components/pro/hard-disk-encryption.rst.inc b/source/components/pro/hard-disk-encryption.rst.inc deleted file mode 100644 index d9b8a1887e..0000000000 --- a/source/components/pro/hard-disk-encryption.rst.inc +++ /dev/null @@ -1,36 +0,0 @@ -.. only:: comment - - .. contents:: :local: - -VeraCrypt (formerly TrueCrypt) ------------------------------- - -`VeraCrypt `__ is a free and Open Source disk encryption software for Windows, macOS, and GNU+Linux. It is the successor of TrueCrypt and thus recommended, although the following instructions should apply to TrueCrypt as well. - -Follow these steps to use the program with `Nitrokey `__: - -1. Install the latest release of - `OpenSC `__, or download the - `PKCS#11 library `__. -2. Choose the library in VeraCrypt under Settings>Preferences>Security - Token (location depends on system, e.g. ``/usr/lib/opensc``). -3. Generate a 64 Byte key file via Tools>Keyfile Generator. -4. Now you should be able to import the generated key file via - Tools>Manage Security Token Keyfiles. You should choose the first - Slot (``[0] User PIN``). The keyfile is then stored on the Nitrokey - as ‘Private Data Object 1’ (``PrivDO1``). -5. After this you should wipe the original keyfile on your Computer - securely! -6. Now you can use VeraCrypt with the Nitrokey: Create a container, - choose the keyfile on the device as an alternative to a password. - -.. warning:: - - Security Consideration - - Please note that VeraCrypt doesn’t make use of the full security - which Nitrokey (and smart cards in general) offer. Instead it stores - a keyfile on the Nitrokey which theoretically could be stolen by a - computer virus after the user enters the PIN. - -Note: `Aloaha Crypt `__ is based on TrueCrypt/VeraCrypt but without the described security limitation. diff --git a/source/components/pro/index.rst b/source/components/pro/index.rst deleted file mode 100644 index 8cde11bc4d..0000000000 --- a/source/components/pro/index.rst +++ /dev/null @@ -1,24 +0,0 @@ -Nitrokey Pro 2 -============== - -.. contents:: :local: - - -First check the: - -.. toctree:: - :maxdepth: 1 - :glob: - - Frequently Asked Questions - -or choose your operating system: - -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - diff --git a/source/components/pro/linux/2fa-google.rst b/source/components/pro/linux/2fa-google.rst deleted file mode 100644 index 86dba65c75..0000000000 --- a/source/components/pro/linux/2fa-google.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-google.rst.inc diff --git a/source/components/pro/linux/2fa-nextcloud.rst b/source/components/pro/linux/2fa-nextcloud.rst deleted file mode 100644 index 386b9c5756..0000000000 --- a/source/components/pro/linux/2fa-nextcloud.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../windows/2fa-nextcloud.rst diff --git a/source/components/pro/linux/2fa-odoo.rst b/source/components/pro/linux/2fa-odoo.rst deleted file mode 100644 index afac57530c..0000000000 --- a/source/components/pro/linux/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-odoo.rst.inc \ No newline at end of file diff --git a/source/components/pro/linux/certificate-authority.rst b/source/components/pro/linux/certificate-authority.rst deleted file mode 100644 index a0e4791b50..0000000000 --- a/source/components/pro/linux/certificate-authority.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../hsm/certificate-authority.rst.inc diff --git a/source/components/pro/linux/change-pins.rst b/source/components/pro/linux/change-pins.rst deleted file mode 100644 index 253d97d4bb..0000000000 --- a/source/components/pro/linux/change-pins.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../change-pins.rst.inc diff --git a/source/components/pro/linux/ecc.rst b/source/components/pro/linux/ecc.rst deleted file mode 100644 index ff7150cad4..0000000000 --- a/source/components/pro/linux/ecc.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../ecc.rst.inc diff --git a/source/components/pro/linux/factory-reset.rst b/source/components/pro/linux/factory-reset.rst deleted file mode 100644 index 41182c6c07..0000000000 --- a/source/components/pro/linux/factory-reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../factory-reset.rst.inc diff --git a/source/components/pro/linux/firmware-update.rst b/source/components/pro/linux/firmware-update.rst deleted file mode 100644 index edcb6af54c..0000000000 --- a/source/components/pro/linux/firmware-update.rst +++ /dev/null @@ -1,13 +0,0 @@ -.. include:: ../firmware-update.rst.inc - -**Issue:** I get ``permission denied for /dev/hidrawX`` during update. - This likely means your user has not the needed permissions to - read/write the device. Please make sure you have set up the correct - `udev-rules`_. Download this `udev-rules`_ set and place it in your - udev rules directory (e.g., ``/etc/udev/rules.d``). Then remove - your Nitrokey Pro from the USB slot and run: - ``udevadm control --reload-rules && udevadm trigger`` or reboot - your machine. Afterwards the update should work without the - permission issue. - -.. _udev-rules: https://raw.githubusercontent.com/Nitrokey/libnitrokey/master/data/41-nitrokey.rules diff --git a/source/components/pro/linux/gpa.rst b/source/components/pro/linux/gpa.rst deleted file mode 100644 index c2bb5534e0..0000000000 --- a/source/components/pro/linux/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../gpa.rst diff --git a/source/components/pro/linux/index.rst b/source/components/pro/linux/index.rst deleted file mode 100644 index e9c7c61de3..0000000000 --- a/source/components/pro/linux/index.rst +++ /dev/null @@ -1,52 +0,0 @@ -Nitrokey Pro, Linux -=================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. To access the OpenPGP smart card of the Nitrokey, install the package - libccid. On Debian/Ubuntu based Distributions type in terminal: *sudo - apt-get update && sudo apt-get install libccid* - - If your distribution has a rather old version of libccid (<1.4.21) - you have to add the device information by yourself (for example if - you are using Ubuntu 14.04 or older). In this case please follow - these - `instructions `__. - -2. Download and start the `Nitrokey - App `__. Follow the - `instructions `_ - to change the default User PIN (default: 123456) and Admin PIN - (default: 12345678) to your own choices. - -.. figure:: ./images/App-change-pin.png - :alt: img - - -Your Nitrokey is now ready to use. - -.. tip:: - - Note: For many use cases described, it is necessary to have either - OpenPGP or S/MIME keys installed on the device (see below). - -Key Creation with OpenPGP or S/MIME ------------------------------------ - -There are two widely used standards for email encryption. While -OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used -by enterprises. If you are in doubt which one to choose, you should use -OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. diff --git a/source/components/pro/linux/ipsec.rst b/source/components/pro/linux/ipsec.rst deleted file mode 100644 index cfc9264144..0000000000 --- a/source/components/pro/linux/ipsec.rst +++ /dev/null @@ -1,4 +0,0 @@ -IPsec -===== - -.. include:: ../../hsm/ipsec.rst.inc diff --git a/source/components/pro/linux/login-with-pam.rst b/source/components/pro/linux/login-with-pam.rst deleted file mode 100644 index d31038785b..0000000000 --- a/source/components/pro/linux/login-with-pam.rst +++ /dev/null @@ -1,4 +0,0 @@ -Login With PAM -=========================== - -.. include:: ../login-with-pam.rst.inc diff --git a/source/components/pro/linux/openpgp-keygen-backup.rst b/source/components/pro/linux/openpgp-keygen-backup.rst deleted file mode 100644 index 7d3886ecef..0000000000 --- a/source/components/pro/linux/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-backup.rst.inc diff --git a/source/components/pro/linux/openpgp-keygen-gpa.rst b/source/components/pro/linux/openpgp-keygen-gpa.rst deleted file mode 100644 index 797b8412fc..0000000000 --- a/source/components/pro/linux/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-gpa.rst.inc diff --git a/source/components/pro/linux/openpgp-keygen-on-device.rst b/source/components/pro/linux/openpgp-keygen-on-device.rst deleted file mode 100644 index 9d0b148be6..0000000000 --- a/source/components/pro/linux/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-on-device.rst.inc diff --git a/source/components/pro/linux/openpgp-outlook.rst b/source/components/pro/linux/openpgp-outlook.rst deleted file mode 100644 index 53ef3da2da..0000000000 --- a/source/components/pro/linux/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-outlook.rst.inc diff --git a/source/components/pro/linux/openpgp-thunderbird.rst b/source/components/pro/linux/openpgp-thunderbird.rst deleted file mode 100644 index 2a21baf43f..0000000000 --- a/source/components/pro/linux/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-thunderbird.rst.inc diff --git a/source/components/pro/linux/openpgp.rst b/source/components/pro/linux/openpgp.rst deleted file mode 100644 index dd1a2cdd44..0000000000 --- a/source/components/pro/linux/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp.rst.inc diff --git a/source/components/pro/linux/otp.rst b/source/components/pro/linux/otp.rst deleted file mode 100644 index 9c050e58fa..0000000000 --- a/source/components/pro/linux/otp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../otp.rst.inc diff --git a/source/components/pro/linux/smime-outlook.rst b/source/components/pro/linux/smime-outlook.rst deleted file mode 100644 index ce4ca6f530..0000000000 --- a/source/components/pro/linux/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime-outlook.rst.inc diff --git a/source/components/pro/linux/smime-thunderbird.rst b/source/components/pro/linux/smime-thunderbird.rst deleted file mode 100644 index fb35c7a207..0000000000 --- a/source/components/pro/linux/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime-thunderbird.rst.inc diff --git a/source/components/pro/linux/smime.rst b/source/components/pro/linux/smime.rst deleted file mode 100644 index 9a7ca24e7c..0000000000 --- a/source/components/pro/linux/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime.rst.inc diff --git a/source/components/pro/linux/ssh.rst b/source/components/pro/linux/ssh.rst deleted file mode 100644 index fa067a4ab1..0000000000 --- a/source/components/pro/linux/ssh.rst +++ /dev/null @@ -1,4 +0,0 @@ -SSH For Server Administration -============================= - -.. include:: ../ssh.rst diff --git a/source/components/pro/linux/stunnel.rst b/source/components/pro/linux/stunnel.rst deleted file mode 100644 index 94a9982dac..0000000000 --- a/source/components/pro/linux/stunnel.rst +++ /dev/null @@ -1,4 +0,0 @@ -Stunnel -======= - -.. include:: ../../hsm/stunnel.rst.inc diff --git a/source/components/pro/mac/2fa-google.rst b/source/components/pro/mac/2fa-google.rst deleted file mode 100644 index 86dba65c75..0000000000 --- a/source/components/pro/mac/2fa-google.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-google.rst.inc diff --git a/source/components/pro/mac/2fa-nextcloud.rst b/source/components/pro/mac/2fa-nextcloud.rst deleted file mode 100644 index 0d3141141f..0000000000 --- a/source/components/pro/mac/2fa-nextcloud.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-nextcloud.rst.inc diff --git a/source/components/pro/mac/2fa-odoo.rst b/source/components/pro/mac/2fa-odoo.rst deleted file mode 100644 index afac57530c..0000000000 --- a/source/components/pro/mac/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-odoo.rst.inc \ No newline at end of file diff --git a/source/components/pro/mac/change-pins.rst b/source/components/pro/mac/change-pins.rst deleted file mode 100644 index 253d97d4bb..0000000000 --- a/source/components/pro/mac/change-pins.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../change-pins.rst.inc diff --git a/source/components/pro/mac/ecc.rst b/source/components/pro/mac/ecc.rst deleted file mode 100644 index ff7150cad4..0000000000 --- a/source/components/pro/mac/ecc.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../ecc.rst.inc diff --git a/source/components/pro/mac/factory-reset.rst b/source/components/pro/mac/factory-reset.rst deleted file mode 100644 index 41182c6c07..0000000000 --- a/source/components/pro/mac/factory-reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../factory-reset.rst.inc diff --git a/source/components/pro/mac/firmware-update.rst b/source/components/pro/mac/firmware-update.rst deleted file mode 100644 index 97c722b20c..0000000000 --- a/source/components/pro/mac/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../firmware-update.rst.inc diff --git a/source/components/pro/mac/gpa.rst b/source/components/pro/mac/gpa.rst deleted file mode 100644 index c2bb5534e0..0000000000 --- a/source/components/pro/mac/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../gpa.rst diff --git a/source/components/pro/mac/hard-disk-encryption.rst b/source/components/pro/mac/hard-disk-encryption.rst deleted file mode 100644 index 8091011fe8..0000000000 --- a/source/components/pro/mac/hard-disk-encryption.rst +++ /dev/null @@ -1,4 +0,0 @@ -Hard Disk Encryption -=========================== - -.. include:: ../hard-disk-encryption.rst.inc diff --git a/source/components/pro/mac/images/App-change-pin.png b/source/components/pro/mac/images/App-change-pin.png deleted file mode 100644 index 17ffc072d2cc9cf4b57719cc5005ec2d531c860a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 21458 zcmag_WmFwo*9Ho1EVxT>cXxMp0s(?UaCdiim*5iIArM@H26qVV?(WdVdAs`?GAz^yMqGp6_o?}VPck=++kTjBY(7U-Lcj#y zkdJKXajUAiwnY&9g0Fwy?}~e5dMjFKk0_g6acq2vV&GhV{BnAI{&;BJzJA`tU*)I! z>b#nK`E>Az^MIoVad$oAQe6@UM$uUvH?g3QJ^`(-kKSS1u7Lf!?(V{~x|0&_t>sLw zEAtL_VHSj*Gb`&9rd`WMOzWr!`bPW?!*0^^td&I6ZaU4!xFj;a{7{%+@>Z4nvjBOd@h^+{VlI zPxhS!OzBg`j=$V-^uP86L3|D6qrX;r5V~wxsTugT8;%~w(9ZLaF~G6^Yr|oRVPVzb z`7O(~uK%Ek>E*`v$-ZXpi}&?4FU8Rafxi7H>qAdi!~%Hg>$Bd9Zqw>*aYbc2zLMvl zaV)BkPx?9In||jS6|dBrtKvZ4?U_UEH~D%*55;v4xUlByI*Zo34*k8=Dx&wDfBw)j z98SCbtFdO02`f_8A;n+o3Q)3diO56xAl%wmjPe>#=n`Q&$h^>o>jr%GRZ$WgAh8!EDzxlZ91Rp}r+p zsvPGlnvxvXr?v$>z1I_t`+ldc`wTA+1;VKNma9z;#?&j$5cDkaM})Y?gA4ZrXc%** z+{Giqo2x8u(@ZLw#6c^@A)b*TBX?%o{TYYz&gY92yH`_{7rL%TeUI_KF7HG+Y>ulV zPD0P8cr{hNbh6DzDp1XU(!Cf2!eXnpXiiS&@@N(}Q;$`%mY_BG7mvks)ek>5JRp@_dpfpIM*D z5F5Jxr=xvCDKA$=o<$$}f|kasyYbjb$xR_b!&d>*0#yt72D7-Gl4G(~1JhGXzohOF zq%IrA>g?>L^o|L3(jUDDQRyp!RZZM%iV&ZtGr*)jVYK#QnR2`|Vzm)nf{2WiGQXZe z%A|2D=JlTK!vEZ~S!|r`gu!mBsA&0@CU@)+{~9@g>J%5VXmm&)uxMqf@b=Z=y&!jw z3wgFhGBPN7@%th^ERJ$0X4IH3Im1L}8{w^T5~dG2(H!{h+l8fHuuW^4b8cbEWeo^J z^c7fQZH+4Did52OzSJB3a}C>mt}_uwE5`a3UTST{8w1C8`HE9CT3<1kwu)xTcG@5< ztBzP9`Z|7xZYlP{Bx;fHJ0#|z+1_a|JGozB{5<2Cz5@Bkm%C5Ho_vesPqy|B_7^K% zYATd*VN#EUwo&lRDWLOIq6urh^q` z4at;fJQzOw41D>I5;N^!Y&e@T;lsrqNxPL8&R$7bI!<-URmf;@ObUJLG3*cJ5~vXS zMO=3u&Qk1Vu`TYe!(3kzbWgh7HWJ4ATfyS~Z3+r9$1-?0dc`GfX9c<%1adEpgq{dj zl7z0dE|rb)bda5Pb=#+{6e$pHM3t|nLlkjTWfQ@ zs-MX(K^W7DSxz&O^!qzh)tug@>=1~O<$0KD#}ZGiw}(@{GDKT-oGOqx*q&|Hk`Qhv z2brzlq7#Ji?`J|p300)sa(~5iUB^q(J0cGh+hm7b<=f|`(TV#>##dEo+&@iRcu^xM z2@rEd!C06PS2GdK#f)u%k8t5Ptd+D9L8}@}PW@u|wnuqHLNR0%FW#yn=DEv}R zvum>*2?9pCooqzRF(zg#hyWp2=R;x}iA z1Y=9d8tcd+b^BM<3q`d2t~oddTYr+MMK->W4NyMBe#5;$IHy?GgiR)|NHgDVD2=YE z*S?rQ=c-`0mI#cI_$yKod^u~^?NbYO#B{2Kt=W2IO;U93;qkeU&&P&)?Jo^qc~o)*lHp-uhen{_;X3JK*q zI}&j$y5q@D>kEoWZfv=1BiFt;cfWYP?^pv|Y0x1B{vyPpEf%ng$2F*@VW_6@22Gx= z<fq5J|ene)9gw{1sqSb|dXEzl^9kU#&xNMQRzjlt@N}UAKb!6QdpGcL_H(2f;`< zT9GYn%(zUD>TI+x!@2^e#n;$1Lge1jkDfVeEoJo*?kZ8B zS(uCA8at!4Z(x8ywHAz%$iheVDUeoa!8C+9dJ+Ze zvsN`S7af)gPwyt8C)~UfOa^~6p#V!#V2_RU_p&mA3Q4#trRIPYv)C3T?R6ZIe#F?Ubv;>(*>s-&KH)De~p_~^I zk_N=Jl`(#Qg1T9v z2Y1&W#yvgb2(4Hu6rTdZO9t2kB#3l>I}nIwQs1S~D=!Ogv#cgn&pIVw(~;|mFSA3h zqtl8!D$WIPeJ4I7m~X6c^eOHB;+DmQ8`>Y>yMWs#z@P$)reHkr$z~iz976zltvV@G z7cpq6NRZeF(%vl6r!D^{xYtqJciGvx;C!mss+L@o^sW~g6b#5f|2(imhu(s<^ZcY* zzdK)phL#c}EknMcmdYgZuYY{|`o4vGMQQz5dx7+V*1vBu$n)wb6xKOHX|z=&1G% zy~tq4!C47$gHH5xA>}_r^`R^w&?t}Cmmt5QA5$lm))6bntQExC4!FClN)n4INgkty zZq84Nus|_RHM?}L!XXtt*#9lJy*+&ZpLKst3({IX#DRQG%g@7f;Lggx{bDQeFD?Ic z)foCe)pEQ>^7g5UL%SPd|3h-vwzSR0ZtB(x(r zk|t8qghN=fb7a3YQ82Sb7HDC+eI+%qL+K*&5(mKk+%+_CTLlm!IbDD_kS-$K=unFS zx>vs`=#3+)UIar6lCoOK0v2|14 zsO1y69i(fT79v`8!&<@^iC49CqNEpTos=4gol*y)QM$J)BgkZbPa&NvaMQ z#qs;0D_pZkq$Tq-hoWaH%~Omk=fNwqD+SM2Mzfk|Q) z{##Fo<)Qvkm*c_kpcOl)2Omgr5SGt~5zd$|t7B3wa03+p2~(!PJx9|#&SFROcDv6u zm1>zXYwDGZw>XUwvif;Q)d;9lrvqDqR*VlQ%1^Or{LiGGRHpte-F zleA(kv}(qNrRDaq`tkKtsLSfj(tPA1ovik8}OaSAiaW7sXg_IkmbB%Po#;w+bcl{G7xae=?5iI$$Jl(BO3TUeh`z>;d0q#x ztzR2*W*YvOSbX6~Z^2quL9rYvY=~+8anIMgn)y@pr+hr!gLu_Kb?W!t;}pujfsoqn zhy$VI4zoXOXoe0ne>dnlR3M^$*TuI^hT))BIzy94AqRHtkBYkQ$=M+{xIT;1T<(li;)b_TRqEJYlw|8#8ITt4#Fk zmZmJk*|LVCpA$4%E*oGR4TJvT=J-p2$jo$HlF)-Hc8Cd4ZXE=*D-@0;3+jt2pEv{e z8jlTV{`#P#R-S?VYSXou|8o>6Mrl4$7)7=Ey(6tbM(034I>Quy$n@1F72Rj+62nVU z$ZHl2e>O77G2TTV7sm9qCwNE1KJha!B~tUk6*Dzn%6bJ6K!){Z;Q-5<-oWMk&Q2Gm<==fC`;eyYmr zdq0T5F9k2*w7~o?mOeR(;`%pV+aoXr{Xh{3c`GfG@Yl41Dg9mhtkLl%ZlI3O^@E9l zJKntvu~1W;utS#C$kCaTcIBx`(pL^!ql#A>A@LhSN2t`}g10DJ>YKAjlGCJDN6fqx zN5t2P`w?_5L#7T|$wzz9Flx3FtO%i?H^w~S>Il>Xb(hFky}_~xdlO~lt^n0`{HB&G zW6JcEIUA)<3nytgZnGu@S(<|^!$WN0xmJ2aN;t#hq|jq=)`R7XNp|=@BISpAtjH!B zNW~S$TrJYW6-R8oo(ImuUmJ+3iVw(2M|oMl#)QP~&l+BvQITo$-sVphiP#~P4<-nc zEoRaDqHfGPqs+HWiM7thjfYekIpPr_QhjDU1^c0#MpT%>$^u4k>uR9 zoTt(JOqFoVv)Zn}V!?_4@s1?vX*OJM%jgesDoH8DgmIa5hXkQ*LD#^s>xEr}L z`A2GFBtstkr+wRdub9u;zqiz!+V^^T+&Bw@O?#RieOWT|AHp8>>KjH8*64CVdCH1{ z>+qU50xwcYOf&K1JB#0XUo+P29wzRseAk%kO>RN@l^X*#8MlsL`L{FQz50%Yv0=&- zd74E=RWxo>(aG2E>5aR!<&tPM%*P*!#4P{PW08D&`y5(Ib`iSoq6+w-pA6-s#6j;L zfATs?l7KU?_R^Y8AP`dD$6v4%IwU;cB($@Pf&}yyED|gl+^Ja!4G2UGk`WhCbzeGN z^>Y8J*2#6D?2>Pc9H?}1F&S*3e zQVr@8EsZ0kzgD2&3T~)zeO&hOxMGIh;qJ4C zw|7QLcE`Nl;)&h-5+5Ib=9nZfut^V*gAZRfm>T#J#Q?rY0OQvm1q%484n1&N_bE{+ z3l`mcxZKwFJS-YXWhyuafega8T^=w~Cj_5QZWr{|o9xzC-PSv-7wa}QHnREL8h`(O zdG30DE?28yWo4a=0NP5R);2NO?L`*K%F6OSnk^&XbIlU+(<@T3S!uppX>qb^zmzmG z+K$FyOH4`{RxnD*<@aEvpeV9pxa2|Wa5EhD()>!)`CfSW5%pMFH=0RscsVqn3d{aAmQ`6 z$H~F5(&}o(+{=rhBq~kV48iTqqobqhDz?)4j#|6*&fwtS+vA0bxuaOUgan79Z}EI~g?8Gw=sH?NMn_3o+-X<8Xx%7z zTc+PqlGb8BP;=n3My?{&D5r!iYrRd2p8xdHL(j-_7ii_Xlf!sZcbJVru0O zLo%Qx>ljN%j+A;7kU{sxW60Yfs-PG zg-J+Aq^GC<`SYiFwUfRZW8LFV_s(jm$*aW z$_fF2nElb6feEiI;N04Wn;IMQKkg*asaK})x*XBfv^zdrY)(&41B;k#La)V9;^!Cs z>rpmj{tIELhCZP-ZJ(oWT}wCy1zS`KE|OU-_S=esrOB*Vr*Ahtj`HUNN*S_znhOm5 zW=#28f#CaTGbumA+)PXHbcuR!=Wxa`s%j@rGvp%avi_TTw}JGR;zDT0*?0H%w)0Lo zX=#+GexcW!B(KM=x7!+MB5!6In#1SwuKP=s!AHfWSyHcvk z-p}^hNmeWic{i`Sgb=D{^UO>xvu)lUp$ok2@L-_4nbsr`fwjb=Bg=EgJ-K{cZL`7q z@ecdVp3!tRsW`$8r~UD=uO(u=k0MHNG_ZKeWbIQ-F4Zpd>&6LE&cn2%Qq5?90a-vh%Ipf z1G@N%(hA)De*srG9Eilk;=rZgqccr&a$V*bYQQW_!`(@M4MksN$^l=q3mN zf6(Oj|9^L(1f34nm_;VLi2tS_r4p58YXKZ`~_=Pd*Ok{4kLmhK(Zuh?IX7SDuM%C_d5^@h#$h7+^(+1Xj6gqj=~QKy*pnDV}wu^d2x{QuAuZc9)a zM;(?a#U^gb-G+kCJB>8?c98YnUcm4I(8i4B^7%d3@Tfu#* zSzB4Pxg7r(GZhO1{KJq#orB*1mZPKQPQ*n=i`)IzK(_tu(cJMu4O{P*XkZnREO8;g zbtZ`$wbbL;epz|sT>0)T*k#3JZD%Lt3J!Wem;yQi0JkMor``Q>x=8Mf!o|g9p<4IY z*rlu-w_?t+N;!emEnMnf_c*X9H;|@)w)H!`J$8pvM%OtrPxr<$pYP8X4xPDdS85ln zfs0i6yCbRkEsi0NZS}z(kB$YM7&MXi0LmGY@LJ7R0zj@=H4kj6&X=o^hK2^xgwo2& z698kR<>gzA!_F=&Ly@QKKSkp&$Iw}wK}V+s)~w$M@RSb=g;rozXNdf5C+*D9vdr3g>Z{v zV{KhoQSrRI{&v^4{(1(m9Ar4Sr4FwqdCE4Q=R3ah_UnD2_s6@_Wy=PwnuQvjmbzcR zF5jNdk(+r7Skr6BNfVDNJw*34l#3}y^HniX`zZ=7O%fr!K#u(E=?vtyv@9~$MNfe$ za(e1zIfct1#xxuW{JAn>-}O3mG^fSM$@5h$e#D3WHRLQRZ;Z;G_-tQE1dHpBN+u~T zArXViaRdZML}cW1#c(}f3H&8=4!vqbo*)0-`3fZ_AYP)F?Rj%B6&@aLG#DEa8j3dc zbbFj$!IF;G9ugev{jeE^ii$e=&i7TfJTgTcD@I(Bw?a)GD~3FEsEO4oM}lngI>s?u zjloo4G*QL2jG}XmT(@dGKd?#x%aAp>)ipFlmjDgeLg4*AE{y0g?qqq9w83`9w5 zZ*kXX<)xU_qbXxEvC=l-;!h+^9L47WvGf+@ly7T}R)zBV@nywRnHIH$kzH0j^6EPH zBuqXMm!Kt`g2O`LZcz)Z!b+7Ar~bE|*0w-7Mum%GRrJLEwUZ1jRrL`NC%^|Ps;hI@ zEzmaa#eeo9>xhVm&rVJnFk>4U8d54`V4$N1Ipte_Jb*@M`&gfDYp-tYzP;v^pYT+& zpU!xcv-St1G4ddA$EbY#9)p(`Qq#^kTRw9SbJ;r6Z9fbrF35fo^?zK==Uby)Up4>o zSAKL%&GS+vNLb5oN;+$T=iQYFQaD^xe|W^JIZnu0n?2FEX8N*z z(UM)T34=EOu)|mS3NQuH~lNB4n=n6u-)No^ljRp1dY202r918lTcskc@ ztKa&%{D3JdJ?zuL&n2x3x&fOFH$`Ru-#2>r$=XzvcmeBXWpluglc)3eSi0Li;a8AD zn8epS6ULXj2DIld#e(ZB>~n1QPNsGtxhAuQdvYq{s8{oPS@tfrsBMx_l;3EkdBTh; z!(uz@l8+=DX<1N|zY0+F@tg@5HfVLMi8TB>)wGJCO(EFRO5ca3s8K|z$Yz5yxzz69 zs~r?nuhrUmHHE!yT-H|kk$U*#bxHk9$Gv7dfoOJ1^>zp$is9M4Ta%fH(NZ4~9;`X7 zy4NOARz5enSkoLl%Qwedz`E!WzY^+9xm%*RXzd{* z`5x<+<;M!A+onSpwU54y?^|?CS`<~d%|DrgEk=XT9Hmrlp9CI3W8gM{v)2!@wpn!` z(2p@XAg;eSgPTF$sYcdmO^39$uiMUt)<2^IOa>x~S+DP@1w3kTM{xLtpK@s;;TPI$ z1KM}J^yP!$miAmagBSX3-~1E-!()<4hON?s2sE?AT0#{a@Hs9ZTEaT?(3h3u4Ju)S`nQ?hsnY+#g$(b2(BqJWG87RIKyYn}cSp+dCuiQ6JWw#g0c< z-S(yJrfY;qV+s$YF;`oPapO~SxW-!&kg~4cB{O1B&uSl&v_TTMNukQ(0gvK5YgN1optlG7=Dj4rc%HB82xHDfN zzGAuhfj7g8d=^e!>3YlCa)XB|2oK-ktw^Ka)5DM2OPP!B^IbO~^+@$)^>0X2Rf~xa zKEh2QU%aH_EGy4A)#=3-8iBdKlJGXoE_3wImpAlUppK>*6e##8-PCQ_y^Y~gp}ALy;P6?*_$Gsob_XNY`}79`}>;hA{2j-;c9UKTs@Y zXP^yuMJAXdw>cl8wYuA5vza3Bf`x)FOvti8IQ#Qq=W}0ycXw|+gc$kzZ}gA?tkahV zEkva3|AAAhJXEq`&u-C|c;i7eP8T^yxL`SJlHsBys{lwF4Ma!8#9+ce0?~aHK^f%# zR{ZlPNjC*cHarkZB|f<9f6j#PI^0cG>6ob(K)tQ3tkSz8sM*<_&sJK#7R!rJ0sL2V zHdn1e{dBQDOzmNquI6N|gO867?-k~Q58DE)#OwYnCNeT{WOrPSg-Nfy+3)>L==D(P zqXXgar`eSi>-t3%6%_yxHt1gf@Vq}?_uCuAaR#P^ppe~M8$P)G=z$Fi3S@G4rl6e{ zdxv*(-F;P0U9$M{&rckej~>+Rj~DSNv1~G`g>GiprQ=e20GPoH$u98|ZRk>=Od)^2TW#iOiTmm)I@c_V;8ukeG;XAsEzD5o?eB;Ob7 zOu8QWneqz&{z2GbF+*u86CutDXb?hdi%SaJn81m97Bh<}=?7Oh2&uB3ZY{iuzj+&S z?4O>u#&7X3DpTsz4=yM3?5n431n2V;n2Yck*r^}TLPUGC(#5x5N9IltFRih!+vFup z>I&5Lml1&hkcf9Z9nlFf0gUYJ^8s2xo!|#$aB(bftO&sTH6)ub4*XihL7NmEffgm1 zSeZJnQ3b>RpPZTegul{ew;50DwD9I_|6_ltuw=h7JQ@_M874Kt5wr>BH0BKN#2gxR zw0p#LB4|=>im*t5U`RtUE(IU)*If3WZ9{p#Exa{V$B$Rko_amk-ag9;MMZ#4S^?bX zZ=StvQ!Jc)A_ge0E94+MzFcbzQo1oq-t^wQHcf$i!jx4xEtQFDo(ok|_EyrvHz&RU z%g44(PpjAEj9INgKmTBGB;D&=yn+dRP9g9OF5(Nr`&h$BDW?b!dIZYa?Cm8L)_ zre4tiaEFO5)(RKC-KBk*MPz_NFg0My%1_ff{762^#K&3Et&D8P8=!28)2>q2v4R9K zJBz9UG=i7%D*%5M&e7|4qDnt1+lf(7>;yv^hXLwPx=5)={p8uRo z<`nbMJk86_0P8cz049_=Vvd8>QC>1bl>-d1un&kvG6Vb9kKPN$Rm?T=RCP5&+u(S= zS|!Vs?ppb2)KqgvfUCd?P-LJay|na_b3B$9^`CGMP^wc&&ZROIGFF*A_&Y{lCS&Co zEykmL&;rZbqW;lh3wcU?j&G|!dVp%b zzn#Amaxa^IxqwHr9KH&6Z)>{`prZ~C$Hm1Je0wko5N7tcGJc`v0wKsEA|g&rP3huC zunx-l{fSzp2ZDwDn)UbPMjNcCex<r_@sH)S!LgxJb&iILn-xM19 z$r&8MA#EJ+M-Rpl%vY(TB9oO+l+S+jqJK60xe!Xc-@y%{_P0xdK)6jf7&{i4!;53} z^SiqbYO-5v_PHK79A+&p{Pk3jx!@;y4~#-GUk}!EdkLxkrFcRp-CqBxfk>MvLy2W~ z@D5AQyb=+I^Tb(VG5C4LY3?1}^BXoVs=;4ND=T=|{|+Riy-WAzY#d_oh;T-B?`&y{+1PY=To?bRD<$(?g*0lo-($0{zJ%U1iL3tfJGNdGO6$Q};Pq3yS!onq zTw>9#E}uC?9-*UQ6S!DN#j2qh{^#hT%!@izuU2vK<{~6Dr}k|Mc``eJ8Z`!=hn1EV zt^*84nKa*zkk9*QJ8_SRHXF9pb8tOKOf-Ue_nrUJv-)9_h76TMooJ?FfwEYRQt90! z&uB7rKGs2;7&XB_tvIh9Q89`z$_#lORBrH%VMLp=(u zt#5m$k-Rb_<%wh9qh$yRg*`5t)~B4W-wj;DLlA}%KDKjG(X0-_aEu8KYU>IYR^`!lj6P1XWFNbGYzElGiZ+?)`lVu(jM4a-#FE;~S;WbH%OZ;HG5Dy%-k=ls4j2XVYgd!%&5asJ7l9)C~tc@F>=Ua(w7gT0!J) zMXX9ZzPhV#wUQFUD|*8bf~EOfUSEq-j&)w4Kt34x6-{_`zR&vOa&vSycB`E(NsrHW zRhcPaQE6Qs{A*-&?IxK~e9GFVsp}31Vt7mmM!~ci6zTddkNnr-8O}0TsLD_62&_Ka z$GG`UF{z216N*%%t^2=Ra0q@Ap9Vy8OBJbkYJRN0U&W;@i_wrBGxQnYRXY3pJMh1kyRs?9}ob#jk^!*#v^<{(Zl?V%}-wX73%r|Sa^C9n7Qufr|9P$ zr~D+c;=l%Fa6g;tbC$_dgWVI1S5?(s^lKC_lbBQExL$vvCqKv@pH%5k&N+SSt@(($ zLn}oGjtc#>2(jQ1k_84z<67)!UJ)%7R<4yjdK(|OO1~>eWHlw7rm|2+7)67DHb2~) zF<72D#|#jKnMCFElhPC*9NcJyd-6FAH`^JVb;h)eLsI0o^^o#ve$z2kRP4vy*Hn6* zYavhL4#nT}wAEhxPPDJ!V|v}k(qI**hKB0nWsqdV%O%J=#FAg--4uAOrW&ld;wxm& zI`4LarO6Jp1nBPlu06Y1o#an?Fg^sT9_0Rn4CkE__ml@)`@Rx>M7r zvSfMw$*o<@@V%Utr3j5Jt>HiL?Qpe<876n4Y@151UA0t;dgY2!V`}?u*kAzgaO_z44TKg=`!*uEP! z5(`y8IeYs8W4{(WH6uzLTB)N_YsiqvwB|`4#UceX1U35J?g&I>V8dQ>uxb?@h=(u( zxF8lGlfgvcQx-yBz#8qi-YKAa(GlnFG{d* z>JHvrNd?SS%4$Cr*0Vyy50_`vmeT^PH?foxyX)h_=e=rXq~tafQB7sOrciup_{URV z1y~9akAgLkGHP=V&87qYv80B`q5Om$S2Od`>K?DLp7#G24`VvXxh=jlvp__>!-2rI zPRER>4qW&=PF(C9Zba>U;)o!W>iuP&?fra%EbcXy=6x>mvwG*-T6vdm{Ppmgulx4O zjMqG;lRgLmf>`4EYF8`$IyzesAsOJ zl-%X@JHGppMnU0Y8z7TGK@La^)w+h9w1i@2J@LC1y}gWbYlo7|{qn!>lDG^6WDDyC3jNbpDml*4Hw$>b*E$6T;St#KQ%y*zYl8ZO9db6~QSjYra^ zU2hVSt<}DKV(nTIfG*F?)n<~t)y`F{PPqiu0;9~Xu6F&lXO3|ZwUE+Z-@k>WQwf=x zDoOJ@+zeO*ITHBb6~AYIlw}Yj;pAv@9So?O z>pzSBW+Z{ypD68=D37@p5?~bgQDC4}_?Z^qhX23L>Gq%e!}DR2+ATLKl+18&a6myr z1LHp|E6Eui8UhlW2W=!0&%4ad;LP^9HvYn5H$zmp?ARwln_fUhld1Dzt7SijEnU8* z^NIEe2?Pq|_M2&uEJ%=9ILudS)|-w2 z8Q#=0z(W2ID{fuS1gJp9Eh7W>hTy}^_Q??Ny4&mxLnac;`tf5Rd8O4Q>d^?uC1ux) ze25OLcZvXhfEP`kizV+aHCWkoK2oBt`rNOwnT?D8*A+W40|SE+|E0LDEKRMuR;)J#SA7U5tQ8+s6aEs0W0QKijZCJe|TmnJ^4>tF@x_qx>Kz z((vE->rb^w^QX6d^X%?F6}zhIu2#1G<{taSP<@+>RZ_)!>V21@vfcpEZ2&t3G@l_) zNxB5&DAASpr(%wxhmAY&(&y8YhdeF*gFzS7ZbjLGI{!xPs(D;Y8Yk3(p!pV?5DS@9 zr|NP5ZGn$I@z-79^+NWtv+~xXBcl2EH;O&BfWdn7jKcmD_ieCGUg4bV?96^Z-l@cE zuBbe%@b}EnY44Z%q4XNos$ZQEujQv6qNHd*1nbBN7Ge9uktAmf0ujo7)B^ZeoTf2+ z`&`5a2U)>713lEZdi}38dP$73MtKi{CzA=&Ba9A&P>tfEmyCytyJW?XaGbSRj`geo zSW=q|c$K}AWVs7_+G)J5l)wQN0#{(_*ginD&Gf2_Caqu)v^iXcC z;ZW7hxCm{v)Fxek>lCOhBee*S?!Hvr@_bEWnAlLI?gn8_o<{&=_Rf**L%xvnq}Mnj z$j+Tj6h|I8J$jQ}Bd|J8mcL%{<$H1GNGEmH9ubnt=BA2dcJfF?faedZMRG{onPo>Y z43XaVmtLw&@AV&wj|Lz8P!Jd2$7NDh3!&GUXg7c3&u@+$h)SZu|AD1g>T~yto5+ed z|2H)27WdYAr^a|>x!S#bjeynE4>wFNS+<3H3$w0xf!n6chF@P*YS+PTJj2z$ebaAs zjtJiy&&ETW-d(@Ms#t_QP$wOwtKVx8+V8aQIbxmA2oaHDz7HsDXh>N`gWy31_`oKv zma+>+LdI~eNAY#aZsi6c>wpwh%fhsKgt!bisn)IaT)7?csB)p2iFHe>dF4H>tdD9k z<(y9%%|R*8p;e)TOn=Ig;MvuEW7muMnIDN1SSwlH;YyWu6Ceki52uTOWGs3sf~VAf zbR@%mVXl0?G3B|{@%ANkY;@(k1z1&2uzL|kmJ5UxtQqiMt=*+g%&QsgLmaH4KpnsX zu-Q76I?r8=?HM6{*coQ~`|iCsgii0tQ9d!3!<1nu@$0XTP2QP`Wy}rll4&8AxbGt4 z8gXoOYNZIjKK1(%`M5qjoc45q?sc7kbjZlzZDDdQ;Gw+VYWk^jB%uJb+V}tU&ruti znhN;*`>i?I+N2U_j1BCDfK6S;L?Oudf)l9sH)rW8+lN_z#>KW|&t*5s4iX9qRas1| z_i}p>3S7j{FkhG$$V$K zS2tT}{1rmr-JurV;7uC`?6XxsegfTp*f6BHKyHjIj{oXrMv01o;^%oN#^Vm&LGT~( z-R)do)!9{|uIIb_!JN^znbzcFivwzZ##r$h-L~Q{)U0f5QIV0Orq?leKpV~9IWvJ@ zfs?sDcZ)#c?&mY;Q|`fm*P6$3Rq9(EtS;DOf5HLKGZwwZ7v;^?ph#)*$mnQ(hppf- zQ!6{W^$ssLpg`xRSXd}BQ7oV)Cw*TowZ!}ENr$siLe@YB0SN~{&Sn*zoq}RFNlEZ= zBM5oLFQF|z-*C0nw0bU ziV!9?u>Hd7`{I6o<+kQg(%9HouZD}^-PyCDNqqUpX0B`e<-%tcz=c*7T|0KPJbm&5 zz%%G0R=~#x#)y@#$%e|eL2_4&SBC-BfRhpiwC^CM}K3yXp`*v%r0f9gYo3xz` zD=YpuQKQ#r4TWmsVKbxursDqwcHkM#x^C)lKhAfK&uzca9RTq$LOz}5ZG(RUE*Ux^vEl#FmL0989PU;6%2Aq_k${}r1(#VmK&ooYpEW?kY06Z#FlixMi ztDe3&N|jl$gapvzMlAPW@46;vFD&z2AUPK;;DiaA3UYH%#8V)`3FbD8iGK>|fa+9| zcb<5EQ@ZSrLL6uMRahvWNgOTU(<;cqLc-3D!AA;YS7w(JDdap4V1|sTQTZfdhQXI? z8?>xcjg{qGoS~nZ zHai;5VOlCS#{U6s-p_XLmd3t>I|?nptV4PJRszA^BDikZlr4+sR*WOyH1Nk|D^Khr zn>=`S{z!ix5s{-_y2kGJwynhYdOBal%>XwUgF?V%i(gUr^XH$1LlHYB@?LU z$(=~Gh`CiDA9pP*{n=Nj#W1ioH*^BvgtKjKNU(>8TR!shRdmp|lf97`{JFcah={2I zDZCh>*ZanWvo_==6|e)zaKWp;WC2~BZ18xEv@x;&HmT@hcJP~92>y%~=d6ieTB=QW z$8(_-d4{&=>|=9i&KVXLgU9se(=abW;P58tN)DQRw$rPBt>*ditZnt>;=|}Y-!AkQ zFK`$O^c?MV@|!lANNJuoay^@X>l8PtOk~6 z_cG`QFp><8W1xc0v4fjhnlTkR>nDZQb7jh$pjyU}yz=0n-F^b#K{}dNe&n-|Y8+t4 zG1!vLA>O^abWIY6z;$!lEJfi~tXciIl<0op>}c(f3$=-yM&af`epyaPaf9 zb(f;8^C)fj+^Ak*QrjBjhj)DRE6vK(m+!D){Ng$-tjT`jhkGIQz9&C!amuBWMVr}a zPG+|)-o8P*aOQBw`GX(}80eK=JSj2p2czzh9%<^x@_z>#8{4Yb2U-C;TAzw_cKZS7 zpZ6>KhbbAYB*AMcs8m_4oNhdtH^&o33%qly^d2aS60^DL z{lX_>;GvNKzNSQMK!XoOPrG-5I$h72v?0BWpUtnV9nZgk;$rkMq7E zR{fANCD3XcB_IF(W(&}NG{nB=KSZaK)w7tJ8BX;+NF2@=kO`dI2PJtPBNqrIta+;nM8;%AQfKYe|C@fPds+Aw!~iZvhPJhP+X^s zCkkuNj5epULl=W<#D3+H)MR${-c zGalpx#z=Ey8Ob_>Q0)O0CAn?2GN)>1yypv)CKTkV4MgE5l>m`)Uh{wh`J7X`$7LYE zNx-czir2*u9CW4{&dQ^up`oFtmy?u)PDCX1Up_swe{gVrXUF?yN-88IMEXn3AJp93 z%2eAyRoib7bL#uzytxw-MfAVUS#a2raz2z^n`E}nn^0<@quI}U{&qI8mI-eA>V3t2 zbJ{x$|F@uTy1HYd^L4hj(8A)T^&asjgh1N6MKIS3>of2BA>aSZ;aDOeMidw{baVi; z#l^+#?U{L@KLr5#?%?3SHbxxm6MC1Vu@|AqgaGxc(o_z+O zTukf+kUW5L^LsvRNH?XJAZ;SyT{eez`($2n;RD==T@c{)DpCY#b1vtQ)R#lw^ zS~oN@0`y65Z!ap)p}D!aySuxwF*zHy#K)|FwV@~u_`ckz1pMytuv30-*SVuz@yLP? z8ykOuSkq5{v8;Fb3Dw*Cqh?fKw3rnG5;5UP_vjK-?(%7{f6mg2$hYSn;Xb#0)qN~NAo_nEA0F` zSg2?C9a_|)c=8x+wA{gkTQ(3uVwtm-?PAjuMMVBTt($o~lJ)0$UGG$UQ1#c8v zW-S@SGB$J?D9NixDmo6HtY8{805lPP412Clikeq{tbvq2ygbH~#4YE}o%Uk(!?;l_ zFb7Vc!&H8(^@6kD@puCR1Mmhww4@rhyz7GTA8bIzJ_2N+o}M1~&ehdbPcPP7jK1Q+ zAro{l9wmbLrC;NDV%DA#FLPl*Now%*UKzt*$B3C$ zOh>~>9^=t)R#DSd*z_1a5+K#}Amr~Z)`~B8wAwpF-_Gc?126}m8my`UCJueVQ=a%Y za%RqlrXe*2Ndj!jAPyPuc)=Tde3M)?r#CZ~D>;R6i#tah>7*BQ(&m z0HvaPjg?OtJF#~1CgA3QGvbH852g)-yWd}kuI>v<*O-$EOw7TS_?3d7rEoz30ZKn3 z#37eS`9v8wB>#1kLg43KIpRj|MUA}{#m>me+O~I6%I^m?BxFaUZ`@Tw1Mp}dNQ571aoJQr zjNR`{lAIQPNKHcnm45{D!$2VcoLK-KkY;1D6Y^^a#;JzqR>L_uE!wz4+fYE~h#lf8%#Lt`s z$TZ-hffJ5u8Xr)BFPNs{B<1ATDS#OTaoI}$-(?0zH{++$gTEtTkK2x1x1$n;|3ll6 zxAxQT{`A}a!f5_`+fil2pKjkz)e^`4-SK7oUE9%+e>(Q~GLDb^C?34lrj?qK^06Ga zY22-NJZ&k%!ooH1S6K_a!U^)nzc`P7>F;017jT#P5!IXudYXX*F)pE}cLbaK+R$PmiNxUw}KLl2dW65gAAU81F>b^F4Z ztLRd|+$S8U@-hU#J6;3 zGS!9LWd5^DqnZVoJ9L^cX!~8(E1sAluq}bKDIZp-&yrH3VP#31DZnp=iB&BmU6MU~ z8G1TG>c&AjM#X0BpzI`pbzT5JC=`=^blGt*mgrPxLDF6t{6eH<$l?Oe{yNper;QR9 zAv^YrXnn#{y9m}+h4oa4M-GWg(JHwKgN??18}q~EzYYKRaih_9*WJv_j7J++S?THX z!itm4YiZi;@xh)s}U9(UjgcrVo?RWZ#D7zExG!gUuqnhmr$xF(nej5zEg7>8u zjUv0H2lb!Y>@^M1nwpxDV{I)lsc~^}zQopiVJ25A8^nC=`=m1T*i{EB8`#ac;8kgN zFBmN&g=N)Ok47fE)%=N*J?Z?ckx(e~hsbg$V(;Ge_X(slsJ{saK{e*7GXv~L8(CrO zZ79>cP|!&$#ECCYmX1hV0wgRx^)6cQc46JVT6aEH)I>zwL6C1Mg@bI)bn|G?vAZpU z)0>TXgLD&72>lA4@)ZQ(H{0IiEJ{T|j$2)}G9UUq+EvwMq!-i(xv=Y{a2K4`M2+i) zAg8{qvz#U@hUnlD+=zeTN8PK|REI?-cz1btK+Bq$zXsk*nw+s}Cl^BP zpcP!-kxpNE3;T52aB$2c(1G^H#&`>4#A#%datYpNq1ne0E*B@a`8Klw3ee;Aj919M znaFS*XVe~{+|B^mo={f8R^-to@AWzMm9jTVHci+xwm`|YKb;ip9g~W_d8l8(=UoB8c&@|)Y<%vPjHgl!5~AC zl_!Gn6kU3wgtB0W7#1PKAR2{I9{qGq*rZzGx%~HZ_S%PDV{5`w3+h!gLUg!@BpJ{@ zR*sV&qqKmMcl)x+{tS5yhjrnPsC&3?{%vT6BNfywXPfd1(6HgsU0&{o&K z&0I31*co4O3s{il%J4IvL)T?u1=5$u+wV?!S%l0xOZ2H$z-=vzBtBfaHzvJV)Ac~S zK{hoEwTD&Db2_hxvl{cZ5qHgXvCTCTt9jY(yv&aGjA9f@Ka1cElznfl3D$zyuY3xI zlPj^PmANjvuyf3?i-HXe8~}5+iI2PoNyg0!n}sgF}DokQ5zmHp2T`@ z>rDkN@eRoXZy^B~Olj*&5SiF~9cAdj@E~&1QkL)2`g+sAz(BrmC)IbbZf`!G5{F$& z&lB#oR*LbupU%A^pXX+#TmBkV-*h+8jf^ki?8ST~|9f7i(-1=JifQ?YS#51dg>*iB zhl}{?s`zdLE~P0C5tM^~-S6^4Mk-mA1`@I%-cr6#SbC%0=jUtea${+EW<%8pWVp}O z{yVN_d5ugPwG1DK?=tJ5JjmUfJNDeZy2VOun41Hqr@_kY)_=Ys$;WJ8eBD|ZD-qX` z5+gI9YcA>6oxQGzkorA;qV@HWhf5>>=yZ9jI8e?Ka?h5))M!{@tZ=&0&R zYU;P39!USzEw3`+oBE&H(@T_G?`0C+&z_q+34Z}FuzOO*$xgGD6S)IGimPMJY?>q1 z4u)%+8$VmZr|+xol4{0l!d#%0L0v+SGIhxrvZE&=cG-e*`< z)8|io;=mG`ih5EQ5!THj9NEp#Wtb-F?`rD1DwIx7__!q>^J%VR5TRhF6rHhpJ~6SU z^_2OI?`4lSOh@!bJd>A`CwCq&3wgjlwBt6-P6T}gS*gW#|Gz+L7GgW zXS1ilSn#T-pNKH%yQtsEvH*fl# z(6dQHivHd57n~kAtvcpy+T!lYjlOf;iYk0v7|8)`sZVw;cX#^cCV=G(CgvKsLzmzQ zwK;A}?>>&uN-!<7T`sKi4D`)SJnPt%E7jG&=I46F)=`A9$7*319^E33~*O!auF*CwB9W3JUysjAPwXaPoa+COk;XlQ$Ns;aW`FlVh9uFtm0 z)i$N=Ue&p&4;y2*Uw_OKnJkuUbzadUHcTV7K_VoKDNj+`+$gN|x-P=MwDYoa#ye#l zXSEy2k^{T3Ej1Tn5~3A!B}o@qa>TDk!Lr^X;zeRwat3WLagGgKUQB%WlQJ1w~Vpv_$rb zSu`j;_>`klR8deMEGAamf~VtD=;QC@FT+^Ziqo)(`K#Nor=5H<~xb81Q)@IS%d6kcPp&fqL3~wkA6GG`_Vpsmm5YBMpZyeXc42 zR!V)nZ@_*My_<kT4_`)_NjWE?D1jqV&Q z`T&awjYeM{WnT zChdQ$Z2pU8{-0|0Sc4zy@}COwj#cXax9VMtid8i81=V3BisfI6ifGdyL&^}|4yWd) ylpYjKFM&|cWQNpIt+^f1hsWbMR?ExZ56HA4a&r4{IS+tRhiIzlAd9bBKK&1Pz1R@| diff --git a/source/components/pro/mac/index.rst b/source/components/pro/mac/index.rst deleted file mode 100644 index 91aee577ae..0000000000 --- a/source/components/pro/mac/index.rst +++ /dev/null @@ -1,51 +0,0 @@ -Nitrokey Pro, Mac -================= - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Once you plug in the Nitrokey, your computer will start the Keyboard - Setup Assistant. **Don’t run through this assistant but exit it right - away.** -2. Download and start the `Nitrokey - App `__. Follow the - `instructions `_ - to change the default User PIN (default: 123456) and Admin PIN - (default: 12345678) to your own choices. - -.. figure:: ./images/App-change-pin.png - :alt: img - - -Your Nitrokey is now ready to use. - -.. note:: - - - For some Versions of MacOS it is necessary to install custom `ccid - driver `__ - (for information see - `here `__), - but in general MacOS should have the driver onboard. - - - For many use cases described, it is necessary to have either - OpenPGP or S/MIME keys installed on the device (see below). - -Key Creation with OpenPGP or S/MIME ------------------------------------ - -There are two widely used standards for email encryption. While -OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used -by enterprises. If you are in doubt which one to choose, you should use -OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. diff --git a/source/components/pro/mac/openpgp-keygen-backup.rst b/source/components/pro/mac/openpgp-keygen-backup.rst deleted file mode 100644 index 7d3886ecef..0000000000 --- a/source/components/pro/mac/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-backup.rst.inc diff --git a/source/components/pro/mac/openpgp-keygen-gpa.rst b/source/components/pro/mac/openpgp-keygen-gpa.rst deleted file mode 100644 index 797b8412fc..0000000000 --- a/source/components/pro/mac/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-gpa.rst.inc diff --git a/source/components/pro/mac/openpgp-keygen-on-device.rst b/source/components/pro/mac/openpgp-keygen-on-device.rst deleted file mode 100644 index 9d0b148be6..0000000000 --- a/source/components/pro/mac/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-on-device.rst.inc diff --git a/source/components/pro/mac/openpgp-outlook.rst b/source/components/pro/mac/openpgp-outlook.rst deleted file mode 100644 index 53ef3da2da..0000000000 --- a/source/components/pro/mac/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-outlook.rst.inc diff --git a/source/components/pro/mac/openpgp-thunderbird.rst b/source/components/pro/mac/openpgp-thunderbird.rst deleted file mode 100644 index 2a21baf43f..0000000000 --- a/source/components/pro/mac/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-thunderbird.rst.inc diff --git a/source/components/pro/mac/openpgp.rst b/source/components/pro/mac/openpgp.rst deleted file mode 100644 index 56599a3f36..0000000000 --- a/source/components/pro/mac/openpgp.rst +++ /dev/null @@ -1,2 +0,0 @@ -.. include:: ../openpgp.rst.inc - diff --git a/source/components/pro/mac/otp.rst b/source/components/pro/mac/otp.rst deleted file mode 100644 index 9c050e58fa..0000000000 --- a/source/components/pro/mac/otp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../otp.rst.inc diff --git a/source/components/pro/mac/smime-outlook.rst b/source/components/pro/mac/smime-outlook.rst deleted file mode 100644 index ce4ca6f530..0000000000 --- a/source/components/pro/mac/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime-outlook.rst.inc diff --git a/source/components/pro/mac/smime-thunderbird.rst b/source/components/pro/mac/smime-thunderbird.rst deleted file mode 100644 index fb35c7a207..0000000000 --- a/source/components/pro/mac/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime-thunderbird.rst.inc diff --git a/source/components/pro/mac/smime.rst b/source/components/pro/mac/smime.rst deleted file mode 100644 index 9a7ca24e7c..0000000000 --- a/source/components/pro/mac/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime.rst.inc diff --git a/source/components/pro/openpgp.rst.inc b/source/components/pro/openpgp.rst.inc deleted file mode 100644 index e3ff07503e..0000000000 --- a/source/components/pro/openpgp.rst.inc +++ /dev/null @@ -1,6 +0,0 @@ -OpenPGP Email Encryption -======================== - -.. contents:: :local: - -.. include:: ../../shared/openpgp.rst.inc diff --git a/source/components/pro/smart-policy.rst.inc b/source/components/pro/smart-policy.rst.inc deleted file mode 100644 index b11a40a7ea..0000000000 --- a/source/components/pro/smart-policy.rst.inc +++ /dev/null @@ -1,97 +0,0 @@ -Login to Windows Domain Computers With MS Active Directory -========================================================== - -.. contents:: :local: - -1. Download and install the latest - `OpenSC `__. -2. Use a text editor to add the following settings to - ``C:\Program Files:\OpenSC Project\OpenSC\opensc.conf``. - -.. code-block:: bash - - # Nitrokey Pro 2, OpenPGP Card, Nitrokey Storage 2 - card_atr 3b:da:18:ff:81:b1:fe:75:1f:03:00:31:f5:73:c0:01:60:00:90:00:1c { - type = 9002; - driver = "openpgp"; - # name = "Nitrokey Pro 2"; - md_read_only = false; - md_supports_X509_enrollment = true; - } - # Nitrokey Pro, OpenPGP Card - card_atr 3B:DA:18:FF:81:B1:FE:75:1F:03:00:31:C5:73:C0:01:40:00:90:00:0C { - type = 9002; - driver = "openpgp"; - # name = "Nitrokey Pro"; - md_read_only = false; - md_supports_X509_enrollment = true; - } - # Nitrokey HSM 2, SmartCard-HSM - card_atr 3b:de:18:ff:81:91:fe:1f:c3:80:31:81:54:48:53:4d:31:73:80:21:40:81:07:1c { - type = 26000; - driver = "sc-hsm"; - # name = "Nitrokey HSM 2"; - md_read_only = false; - md_supports_X509_enrollment = true; - } - # Nitrokey HSM, SmartCard-HSM - card_atr 3B:FE:18:00:00:81:31:FE:45:80:31:81:54:48:53:4D:31:73:80:21:40:81:07:FA { - type = 26000; - driver = "sc-hsm"; - # name = "Nitrokey HSM"; - md_read_only = false; - md_supports_X509_enrollment = true; - } - - -3. Open a command terminal and enter “regedit”. Use regedit to import - `this - file `__. -4. Now you can enroll Nitrokeys for your users managed in Microsoft - Active Directory. You may either use Microsoft PKI, - `gpgsm `__, - or `Smart - Policy `__. - The following steps describe the usage of Smart Policy. -5. `Download `__ - and install Smart Policy. -6. Select “Read a smart card” - -.. figure:: /components/pro/images/smart-policy/1.png - :alt: img1 - - - -7. Select the certificate, mapping, and user. - -.. figure:: /components/pro/images/smart-policy/2.png - :alt: img2 - - - -8. Verify the device status via CRL. - -.. figure:: /components/pro/images/smart-policy/3.png - :alt: img3 - - - -9. Choose a Group Policy Object (GPO). - -.. figure:: /components/pro/images/smart-policy/4.png - :alt: img4 - - - -10. Confirm applying the mapping. - -.. figure:: /components/pro/images/smart-policy/5.png - :alt: img5 - - - -From now on, when logging on to your Windows computer you need to connect the Nitrokey and enter your PIN. - -.. figure:: /components/pro/images/smart-policy/6.png - :alt: img6 - diff --git a/source/components/pro/windows/2fa-google.rst b/source/components/pro/windows/2fa-google.rst deleted file mode 100644 index 86dba65c75..0000000000 --- a/source/components/pro/windows/2fa-google.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-google.rst.inc diff --git a/source/components/pro/windows/2fa-nextcloud.rst b/source/components/pro/windows/2fa-nextcloud.rst deleted file mode 100644 index 0d3141141f..0000000000 --- a/source/components/pro/windows/2fa-nextcloud.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-nextcloud.rst.inc diff --git a/source/components/pro/windows/2fa-odoo.rst b/source/components/pro/windows/2fa-odoo.rst deleted file mode 100644 index afac57530c..0000000000 --- a/source/components/pro/windows/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../2fa-odoo.rst.inc \ No newline at end of file diff --git a/source/components/pro/windows/certificate-authority.rst b/source/components/pro/windows/certificate-authority.rst deleted file mode 100644 index a0e4791b50..0000000000 --- a/source/components/pro/windows/certificate-authority.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../hsm/certificate-authority.rst.inc diff --git a/source/components/pro/windows/change-pins.rst b/source/components/pro/windows/change-pins.rst deleted file mode 100644 index 253d97d4bb..0000000000 --- a/source/components/pro/windows/change-pins.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../change-pins.rst.inc diff --git a/source/components/pro/windows/ecc.rst b/source/components/pro/windows/ecc.rst deleted file mode 100644 index ff7150cad4..0000000000 --- a/source/components/pro/windows/ecc.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../ecc.rst.inc diff --git a/source/components/pro/windows/eidauthenticate.rst b/source/components/pro/windows/eidauthenticate.rst deleted file mode 100644 index 36d4268852..0000000000 --- a/source/components/pro/windows/eidauthenticate.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../eidauthenticate.rst.inc diff --git a/source/components/pro/windows/factory-reset.rst b/source/components/pro/windows/factory-reset.rst deleted file mode 100644 index 41182c6c07..0000000000 --- a/source/components/pro/windows/factory-reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../factory-reset.rst.inc diff --git a/source/components/pro/windows/firmware-update.rst b/source/components/pro/windows/firmware-update.rst deleted file mode 100644 index 97c722b20c..0000000000 --- a/source/components/pro/windows/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../firmware-update.rst.inc diff --git a/source/components/pro/windows/gpa.rst b/source/components/pro/windows/gpa.rst deleted file mode 100644 index c2bb5534e0..0000000000 --- a/source/components/pro/windows/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../gpa.rst diff --git a/source/components/pro/windows/hard-disk-encryption.rst b/source/components/pro/windows/hard-disk-encryption.rst deleted file mode 100644 index 8091011fe8..0000000000 --- a/source/components/pro/windows/hard-disk-encryption.rst +++ /dev/null @@ -1,4 +0,0 @@ -Hard Disk Encryption -=========================== - -.. include:: ../hard-disk-encryption.rst.inc diff --git a/source/components/pro/windows/images/App-change-pin.png b/source/components/pro/windows/images/App-change-pin.png deleted file mode 100644 index 17ffc072d2cc9cf4b57719cc5005ec2d531c860a..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 21458 zcmag_WmFwo*9Ho1EVxT>cXxMp0s(?UaCdiim*5iIArM@H26qVV?(WdVdAs`?GAz^yMqGp6_o?}VPck=++kTjBY(7U-Lcj#y zkdJKXajUAiwnY&9g0Fwy?}~e5dMjFKk0_g6acq2vV&GhV{BnAI{&;BJzJA`tU*)I! z>b#nK`E>Az^MIoVad$oAQe6@UM$uUvH?g3QJ^`(-kKSS1u7Lf!?(V{~x|0&_t>sLw zEAtL_VHSj*Gb`&9rd`WMOzWr!`bPW?!*0^^td&I6ZaU4!xFj;a{7{%+@>Z4nvjBOd@h^+{VlI zPxhS!OzBg`j=$V-^uP86L3|D6qrX;r5V~wxsTugT8;%~w(9ZLaF~G6^Yr|oRVPVzb z`7O(~uK%Ek>E*`v$-ZXpi}&?4FU8Rafxi7H>qAdi!~%Hg>$Bd9Zqw>*aYbc2zLMvl zaV)BkPx?9In||jS6|dBrtKvZ4?U_UEH~D%*55;v4xUlByI*Zo34*k8=Dx&wDfBw)j z98SCbtFdO02`f_8A;n+o3Q)3diO56xAl%wmjPe>#=n`Q&$h^>o>jr%GRZ$WgAh8!EDzxlZ91Rp}r+p zsvPGlnvxvXr?v$>z1I_t`+ldc`wTA+1;VKNma9z;#?&j$5cDkaM})Y?gA4ZrXc%** z+{Giqo2x8u(@ZLw#6c^@A)b*TBX?%o{TYYz&gY92yH`_{7rL%TeUI_KF7HG+Y>ulV zPD0P8cr{hNbh6DzDp1XU(!Cf2!eXnpXiiS&@@N(}Q;$`%mY_BG7mvks)ek>5JRp@_dpfpIM*D z5F5Jxr=xvCDKA$=o<$$}f|kasyYbjb$xR_b!&d>*0#yt72D7-Gl4G(~1JhGXzohOF zq%IrA>g?>L^o|L3(jUDDQRyp!RZZM%iV&ZtGr*)jVYK#QnR2`|Vzm)nf{2WiGQXZe z%A|2D=JlTK!vEZ~S!|r`gu!mBsA&0@CU@)+{~9@g>J%5VXmm&)uxMqf@b=Z=y&!jw z3wgFhGBPN7@%th^ERJ$0X4IH3Im1L}8{w^T5~dG2(H!{h+l8fHuuW^4b8cbEWeo^J z^c7fQZH+4Did52OzSJB3a}C>mt}_uwE5`a3UTST{8w1C8`HE9CT3<1kwu)xTcG@5< ztBzP9`Z|7xZYlP{Bx;fHJ0#|z+1_a|JGozB{5<2Cz5@Bkm%C5Ho_vesPqy|B_7^K% zYATd*VN#EUwo&lRDWLOIq6urh^q` z4at;fJQzOw41D>I5;N^!Y&e@T;lsrqNxPL8&R$7bI!<-URmf;@ObUJLG3*cJ5~vXS zMO=3u&Qk1Vu`TYe!(3kzbWgh7HWJ4ATfyS~Z3+r9$1-?0dc`GfX9c<%1adEpgq{dj zl7z0dE|rb)bda5Pb=#+{6e$pHM3t|nLlkjTWfQ@ zs-MX(K^W7DSxz&O^!qzh)tug@>=1~O<$0KD#}ZGiw}(@{GDKT-oGOqx*q&|Hk`Qhv z2brzlq7#Ji?`J|p300)sa(~5iUB^q(J0cGh+hm7b<=f|`(TV#>##dEo+&@iRcu^xM z2@rEd!C06PS2GdK#f)u%k8t5Ptd+D9L8}@}PW@u|wnuqHLNR0%FW#yn=DEv}R zvum>*2?9pCooqzRF(zg#hyWp2=R;x}iA z1Y=9d8tcd+b^BM<3q`d2t~oddTYr+MMK->W4NyMBe#5;$IHy?GgiR)|NHgDVD2=YE z*S?rQ=c-`0mI#cI_$yKod^u~^?NbYO#B{2Kt=W2IO;U93;qkeU&&P&)?Jo^qc~o)*lHp-uhen{_;X3JK*q zI}&j$y5q@D>kEoWZfv=1BiFt;cfWYP?^pv|Y0x1B{vyPpEf%ng$2F*@VW_6@22Gx= z<fq5J|ene)9gw{1sqSb|dXEzl^9kU#&xNMQRzjlt@N}UAKb!6QdpGcL_H(2f;`< zT9GYn%(zUD>TI+x!@2^e#n;$1Lge1jkDfVeEoJo*?kZ8B zS(uCA8at!4Z(x8ywHAz%$iheVDUeoa!8C+9dJ+Ze zvsN`S7af)gPwyt8C)~UfOa^~6p#V!#V2_RU_p&mA3Q4#trRIPYv)C3T?R6ZIe#F?Ubv;>(*>s-&KH)De~p_~^I zk_N=Jl`(#Qg1T9v z2Y1&W#yvgb2(4Hu6rTdZO9t2kB#3l>I}nIwQs1S~D=!Ogv#cgn&pIVw(~;|mFSA3h zqtl8!D$WIPeJ4I7m~X6c^eOHB;+DmQ8`>Y>yMWs#z@P$)reHkr$z~iz976zltvV@G z7cpq6NRZeF(%vl6r!D^{xYtqJciGvx;C!mss+L@o^sW~g6b#5f|2(imhu(s<^ZcY* zzdK)phL#c}EknMcmdYgZuYY{|`o4vGMQQz5dx7+V*1vBu$n)wb6xKOHX|z=&1G% zy~tq4!C47$gHH5xA>}_r^`R^w&?t}Cmmt5QA5$lm))6bntQExC4!FClN)n4INgkty zZq84Nus|_RHM?}L!XXtt*#9lJy*+&ZpLKst3({IX#DRQG%g@7f;Lggx{bDQeFD?Ic z)foCe)pEQ>^7g5UL%SPd|3h-vwzSR0ZtB(x(r zk|t8qghN=fb7a3YQ82Sb7HDC+eI+%qL+K*&5(mKk+%+_CTLlm!IbDD_kS-$K=unFS zx>vs`=#3+)UIar6lCoOK0v2|14 zsO1y69i(fT79v`8!&<@^iC49CqNEpTos=4gol*y)QM$J)BgkZbPa&NvaMQ z#qs;0D_pZkq$Tq-hoWaH%~Omk=fNwqD+SM2Mzfk|Q) z{##Fo<)Qvkm*c_kpcOl)2Omgr5SGt~5zd$|t7B3wa03+p2~(!PJx9|#&SFROcDv6u zm1>zXYwDGZw>XUwvif;Q)d;9lrvqDqR*VlQ%1^Or{LiGGRHpte-F zleA(kv}(qNrRDaq`tkKtsLSfj(tPA1ovik8}OaSAiaW7sXg_IkmbB%Po#;w+bcl{G7xae=?5iI$$Jl(BO3TUeh`z>;d0q#x ztzR2*W*YvOSbX6~Z^2quL9rYvY=~+8anIMgn)y@pr+hr!gLu_Kb?W!t;}pujfsoqn zhy$VI4zoXOXoe0ne>dnlR3M^$*TuI^hT))BIzy94AqRHtkBYkQ$=M+{xIT;1T<(li;)b_TRqEJYlw|8#8ITt4#Fk zmZmJk*|LVCpA$4%E*oGR4TJvT=J-p2$jo$HlF)-Hc8Cd4ZXE=*D-@0;3+jt2pEv{e z8jlTV{`#P#R-S?VYSXou|8o>6Mrl4$7)7=Ey(6tbM(034I>Quy$n@1F72Rj+62nVU z$ZHl2e>O77G2TTV7sm9qCwNE1KJha!B~tUk6*Dzn%6bJ6K!){Z;Q-5<-oWMk&Q2Gm<==fC`;eyYmr zdq0T5F9k2*w7~o?mOeR(;`%pV+aoXr{Xh{3c`GfG@Yl41Dg9mhtkLl%ZlI3O^@E9l zJKntvu~1W;utS#C$kCaTcIBx`(pL^!ql#A>A@LhSN2t`}g10DJ>YKAjlGCJDN6fqx zN5t2P`w?_5L#7T|$wzz9Flx3FtO%i?H^w~S>Il>Xb(hFky}_~xdlO~lt^n0`{HB&G zW6JcEIUA)<3nytgZnGu@S(<|^!$WN0xmJ2aN;t#hq|jq=)`R7XNp|=@BISpAtjH!B zNW~S$TrJYW6-R8oo(ImuUmJ+3iVw(2M|oMl#)QP~&l+BvQITo$-sVphiP#~P4<-nc zEoRaDqHfGPqs+HWiM7thjfYekIpPr_QhjDU1^c0#MpT%>$^u4k>uR9 zoTt(JOqFoVv)Zn}V!?_4@s1?vX*OJM%jgesDoH8DgmIa5hXkQ*LD#^s>xEr}L z`A2GFBtstkr+wRdub9u;zqiz!+V^^T+&Bw@O?#RieOWT|AHp8>>KjH8*64CVdCH1{ z>+qU50xwcYOf&K1JB#0XUo+P29wzRseAk%kO>RN@l^X*#8MlsL`L{FQz50%Yv0=&- zd74E=RWxo>(aG2E>5aR!<&tPM%*P*!#4P{PW08D&`y5(Ib`iSoq6+w-pA6-s#6j;L zfATs?l7KU?_R^Y8AP`dD$6v4%IwU;cB($@Pf&}yyED|gl+^Ja!4G2UGk`WhCbzeGN z^>Y8J*2#6D?2>Pc9H?}1F&S*3e zQVr@8EsZ0kzgD2&3T~)zeO&hOxMGIh;qJ4C zw|7QLcE`Nl;)&h-5+5Ib=9nZfut^V*gAZRfm>T#J#Q?rY0OQvm1q%484n1&N_bE{+ z3l`mcxZKwFJS-YXWhyuafega8T^=w~Cj_5QZWr{|o9xzC-PSv-7wa}QHnREL8h`(O zdG30DE?28yWo4a=0NP5R);2NO?L`*K%F6OSnk^&XbIlU+(<@T3S!uppX>qb^zmzmG z+K$FyOH4`{RxnD*<@aEvpeV9pxa2|Wa5EhD()>!)`CfSW5%pMFH=0RscsVqn3d{aAmQ`6 z$H~F5(&}o(+{=rhBq~kV48iTqqobqhDz?)4j#|6*&fwtS+vA0bxuaOUgan79Z}EI~g?8Gw=sH?NMn_3o+-X<8Xx%7z zTc+PqlGb8BP;=n3My?{&D5r!iYrRd2p8xdHL(j-_7ii_Xlf!sZcbJVru0O zLo%Qx>ljN%j+A;7kU{sxW60Yfs-PG zg-J+Aq^GC<`SYiFwUfRZW8LFV_s(jm$*aW z$_fF2nElb6feEiI;N04Wn;IMQKkg*asaK})x*XBfv^zdrY)(&41B;k#La)V9;^!Cs z>rpmj{tIELhCZP-ZJ(oWT}wCy1zS`KE|OU-_S=esrOB*Vr*Ahtj`HUNN*S_znhOm5 zW=#28f#CaTGbumA+)PXHbcuR!=Wxa`s%j@rGvp%avi_TTw}JGR;zDT0*?0H%w)0Lo zX=#+GexcW!B(KM=x7!+MB5!6In#1SwuKP=s!AHfWSyHcvk z-p}^hNmeWic{i`Sgb=D{^UO>xvu)lUp$ok2@L-_4nbsr`fwjb=Bg=EgJ-K{cZL`7q z@ecdVp3!tRsW`$8r~UD=uO(u=k0MHNG_ZKeWbIQ-F4Zpd>&6LE&cn2%Qq5?90a-vh%Ipf z1G@N%(hA)De*srG9Eilk;=rZgqccr&a$V*bYQQW_!`(@M4MksN$^l=q3mN zf6(Oj|9^L(1f34nm_;VLi2tS_r4p58YXKZ`~_=Pd*Ok{4kLmhK(Zuh?IX7SDuM%C_d5^@h#$h7+^(+1Xj6gqj=~QKy*pnDV}wu^d2x{QuAuZc9)a zM;(?a#U^gb-G+kCJB>8?c98YnUcm4I(8i4B^7%d3@Tfu#* zSzB4Pxg7r(GZhO1{KJq#orB*1mZPKQPQ*n=i`)IzK(_tu(cJMu4O{P*XkZnREO8;g zbtZ`$wbbL;epz|sT>0)T*k#3JZD%Lt3J!Wem;yQi0JkMor``Q>x=8Mf!o|g9p<4IY z*rlu-w_?t+N;!emEnMnf_c*X9H;|@)w)H!`J$8pvM%OtrPxr<$pYP8X4xPDdS85ln zfs0i6yCbRkEsi0NZS}z(kB$YM7&MXi0LmGY@LJ7R0zj@=H4kj6&X=o^hK2^xgwo2& z698kR<>gzA!_F=&Ly@QKKSkp&$Iw}wK}V+s)~w$M@RSb=g;rozXNdf5C+*D9vdr3g>Z{v zV{KhoQSrRI{&v^4{(1(m9Ar4Sr4FwqdCE4Q=R3ah_UnD2_s6@_Wy=PwnuQvjmbzcR zF5jNdk(+r7Skr6BNfVDNJw*34l#3}y^HniX`zZ=7O%fr!K#u(E=?vtyv@9~$MNfe$ za(e1zIfct1#xxuW{JAn>-}O3mG^fSM$@5h$e#D3WHRLQRZ;Z;G_-tQE1dHpBN+u~T zArXViaRdZML}cW1#c(}f3H&8=4!vqbo*)0-`3fZ_AYP)F?Rj%B6&@aLG#DEa8j3dc zbbFj$!IF;G9ugev{jeE^ii$e=&i7TfJTgTcD@I(Bw?a)GD~3FEsEO4oM}lngI>s?u zjloo4G*QL2jG}XmT(@dGKd?#x%aAp>)ipFlmjDgeLg4*AE{y0g?qqq9w83`9w5 zZ*kXX<)xU_qbXxEvC=l-;!h+^9L47WvGf+@ly7T}R)zBV@nywRnHIH$kzH0j^6EPH zBuqXMm!Kt`g2O`LZcz)Z!b+7Ar~bE|*0w-7Mum%GRrJLEwUZ1jRrL`NC%^|Ps;hI@ zEzmaa#eeo9>xhVm&rVJnFk>4U8d54`V4$N1Ipte_Jb*@M`&gfDYp-tYzP;v^pYT+& zpU!xcv-St1G4ddA$EbY#9)p(`Qq#^kTRw9SbJ;r6Z9fbrF35fo^?zK==Uby)Up4>o zSAKL%&GS+vNLb5oN;+$T=iQYFQaD^xe|W^JIZnu0n?2FEX8N*z z(UM)T34=EOu)|mS3NQuH~lNB4n=n6u-)No^ljRp1dY202r918lTcskc@ ztKa&%{D3JdJ?zuL&n2x3x&fOFH$`Ru-#2>r$=XzvcmeBXWpluglc)3eSi0Li;a8AD zn8epS6ULXj2DIld#e(ZB>~n1QPNsGtxhAuQdvYq{s8{oPS@tfrsBMx_l;3EkdBTh; z!(uz@l8+=DX<1N|zY0+F@tg@5HfVLMi8TB>)wGJCO(EFRO5ca3s8K|z$Yz5yxzz69 zs~r?nuhrUmHHE!yT-H|kk$U*#bxHk9$Gv7dfoOJ1^>zp$is9M4Ta%fH(NZ4~9;`X7 zy4NOARz5enSkoLl%Qwedz`E!WzY^+9xm%*RXzd{* z`5x<+<;M!A+onSpwU54y?^|?CS`<~d%|DrgEk=XT9Hmrlp9CI3W8gM{v)2!@wpn!` z(2p@XAg;eSgPTF$sYcdmO^39$uiMUt)<2^IOa>x~S+DP@1w3kTM{xLtpK@s;;TPI$ z1KM}J^yP!$miAmagBSX3-~1E-!()<4hON?s2sE?AT0#{a@Hs9ZTEaT?(3h3u4Ju)S`nQ?hsnY+#g$(b2(BqJWG87RIKyYn}cSp+dCuiQ6JWw#g0c< z-S(yJrfY;qV+s$YF;`oPapO~SxW-!&kg~4cB{O1B&uSl&v_TTMNukQ(0gvK5YgN1optlG7=Dj4rc%HB82xHDfN zzGAuhfj7g8d=^e!>3YlCa)XB|2oK-ktw^Ka)5DM2OPP!B^IbO~^+@$)^>0X2Rf~xa zKEh2QU%aH_EGy4A)#=3-8iBdKlJGXoE_3wImpAlUppK>*6e##8-PCQ_y^Y~gp}ALy;P6?*_$Gsob_XNY`}79`}>;hA{2j-;c9UKTs@Y zXP^yuMJAXdw>cl8wYuA5vza3Bf`x)FOvti8IQ#Qq=W}0ycXw|+gc$kzZ}gA?tkahV zEkva3|AAAhJXEq`&u-C|c;i7eP8T^yxL`SJlHsBys{lwF4Ma!8#9+ce0?~aHK^f%# zR{ZlPNjC*cHarkZB|f<9f6j#PI^0cG>6ob(K)tQ3tkSz8sM*<_&sJK#7R!rJ0sL2V zHdn1e{dBQDOzmNquI6N|gO867?-k~Q58DE)#OwYnCNeT{WOrPSg-Nfy+3)>L==D(P zqXXgar`eSi>-t3%6%_yxHt1gf@Vq}?_uCuAaR#P^ppe~M8$P)G=z$Fi3S@G4rl6e{ zdxv*(-F;P0U9$M{&rckej~>+Rj~DSNv1~G`g>GiprQ=e20GPoH$u98|ZRk>=Od)^2TW#iOiTmm)I@c_V;8ukeG;XAsEzD5o?eB;Ob7 zOu8QWneqz&{z2GbF+*u86CutDXb?hdi%SaJn81m97Bh<}=?7Oh2&uB3ZY{iuzj+&S z?4O>u#&7X3DpTsz4=yM3?5n431n2V;n2Yck*r^}TLPUGC(#5x5N9IltFRih!+vFup z>I&5Lml1&hkcf9Z9nlFf0gUYJ^8s2xo!|#$aB(bftO&sTH6)ub4*XihL7NmEffgm1 zSeZJnQ3b>RpPZTegul{ew;50DwD9I_|6_ltuw=h7JQ@_M874Kt5wr>BH0BKN#2gxR zw0p#LB4|=>im*t5U`RtUE(IU)*If3WZ9{p#Exa{V$B$Rko_amk-ag9;MMZ#4S^?bX zZ=StvQ!Jc)A_ge0E94+MzFcbzQo1oq-t^wQHcf$i!jx4xEtQFDo(ok|_EyrvHz&RU z%g44(PpjAEj9INgKmTBGB;D&=yn+dRP9g9OF5(Nr`&h$BDW?b!dIZYa?Cm8L)_ zre4tiaEFO5)(RKC-KBk*MPz_NFg0My%1_ff{762^#K&3Et&D8P8=!28)2>q2v4R9K zJBz9UG=i7%D*%5M&e7|4qDnt1+lf(7>;yv^hXLwPx=5)={p8uRo z<`nbMJk86_0P8cz049_=Vvd8>QC>1bl>-d1un&kvG6Vb9kKPN$Rm?T=RCP5&+u(S= zS|!Vs?ppb2)KqgvfUCd?P-LJay|na_b3B$9^`CGMP^wc&&ZROIGFF*A_&Y{lCS&Co zEykmL&;rZbqW;lh3wcU?j&G|!dVp%b zzn#Amaxa^IxqwHr9KH&6Z)>{`prZ~C$Hm1Je0wko5N7tcGJc`v0wKsEA|g&rP3huC zunx-l{fSzp2ZDwDn)UbPMjNcCex<r_@sH)S!LgxJb&iILn-xM19 z$r&8MA#EJ+M-Rpl%vY(TB9oO+l+S+jqJK60xe!Xc-@y%{_P0xdK)6jf7&{i4!;53} z^SiqbYO-5v_PHK79A+&p{Pk3jx!@;y4~#-GUk}!EdkLxkrFcRp-CqBxfk>MvLy2W~ z@D5AQyb=+I^Tb(VG5C4LY3?1}^BXoVs=;4ND=T=|{|+Riy-WAzY#d_oh;T-B?`&y{+1PY=To?bRD<$(?g*0lo-($0{zJ%U1iL3tfJGNdGO6$Q};Pq3yS!onq zTw>9#E}uC?9-*UQ6S!DN#j2qh{^#hT%!@izuU2vK<{~6Dr}k|Mc``eJ8Z`!=hn1EV zt^*84nKa*zkk9*QJ8_SRHXF9pb8tOKOf-Ue_nrUJv-)9_h76TMooJ?FfwEYRQt90! z&uB7rKGs2;7&XB_tvIh9Q89`z$_#lORBrH%VMLp=(u zt#5m$k-Rb_<%wh9qh$yRg*`5t)~B4W-wj;DLlA}%KDKjG(X0-_aEu8KYU>IYR^`!lj6P1XWFNbGYzElGiZ+?)`lVu(jM4a-#FE;~S;WbH%OZ;HG5Dy%-k=ls4j2XVYgd!%&5asJ7l9)C~tc@F>=Ua(w7gT0!J) zMXX9ZzPhV#wUQFUD|*8bf~EOfUSEq-j&)w4Kt34x6-{_`zR&vOa&vSycB`E(NsrHW zRhcPaQE6Qs{A*-&?IxK~e9GFVsp}31Vt7mmM!~ci6zTddkNnr-8O}0TsLD_62&_Ka z$GG`UF{z216N*%%t^2=Ra0q@Ap9Vy8OBJbkYJRN0U&W;@i_wrBGxQnYRXY3pJMh1kyRs?9}ob#jk^!*#v^<{(Zl?V%}-wX73%r|Sa^C9n7Qufr|9P$ zr~D+c;=l%Fa6g;tbC$_dgWVI1S5?(s^lKC_lbBQExL$vvCqKv@pH%5k&N+SSt@(($ zLn}oGjtc#>2(jQ1k_84z<67)!UJ)%7R<4yjdK(|OO1~>eWHlw7rm|2+7)67DHb2~) zF<72D#|#jKnMCFElhPC*9NcJyd-6FAH`^JVb;h)eLsI0o^^o#ve$z2kRP4vy*Hn6* zYavhL4#nT}wAEhxPPDJ!V|v}k(qI**hKB0nWsqdV%O%J=#FAg--4uAOrW&ld;wxm& zI`4LarO6Jp1nBPlu06Y1o#an?Fg^sT9_0Rn4CkE__ml@)`@Rx>M7r zvSfMw$*o<@@V%Utr3j5Jt>HiL?Qpe<876n4Y@151UA0t;dgY2!V`}?u*kAzgaO_z44TKg=`!*uEP! z5(`y8IeYs8W4{(WH6uzLTB)N_YsiqvwB|`4#UceX1U35J?g&I>V8dQ>uxb?@h=(u( zxF8lGlfgvcQx-yBz#8qi-YKAa(GlnFG{d* z>JHvrNd?SS%4$Cr*0Vyy50_`vmeT^PH?foxyX)h_=e=rXq~tafQB7sOrciup_{URV z1y~9akAgLkGHP=V&87qYv80B`q5Om$S2Od`>K?DLp7#G24`VvXxh=jlvp__>!-2rI zPRER>4qW&=PF(C9Zba>U;)o!W>iuP&?fra%EbcXy=6x>mvwG*-T6vdm{Ppmgulx4O zjMqG;lRgLmf>`4EYF8`$IyzesAsOJ zl-%X@JHGppMnU0Y8z7TGK@La^)w+h9w1i@2J@LC1y}gWbYlo7|{qn!>lDG^6WDDyC3jNbpDml*4Hw$>b*E$6T;St#KQ%y*zYl8ZO9db6~QSjYra^ zU2hVSt<}DKV(nTIfG*F?)n<~t)y`F{PPqiu0;9~Xu6F&lXO3|ZwUE+Z-@k>WQwf=x zDoOJ@+zeO*ITHBb6~AYIlw}Yj;pAv@9So?O z>pzSBW+Z{ypD68=D37@p5?~bgQDC4}_?Z^qhX23L>Gq%e!}DR2+ATLKl+18&a6myr z1LHp|E6Eui8UhlW2W=!0&%4ad;LP^9HvYn5H$zmp?ARwln_fUhld1Dzt7SijEnU8* z^NIEe2?Pq|_M2&uEJ%=9ILudS)|-w2 z8Q#=0z(W2ID{fuS1gJp9Eh7W>hTy}^_Q??Ny4&mxLnac;`tf5Rd8O4Q>d^?uC1ux) ze25OLcZvXhfEP`kizV+aHCWkoK2oBt`rNOwnT?D8*A+W40|SE+|E0LDEKRMuR;)J#SA7U5tQ8+s6aEs0W0QKijZCJe|TmnJ^4>tF@x_qx>Kz z((vE->rb^w^QX6d^X%?F6}zhIu2#1G<{taSP<@+>RZ_)!>V21@vfcpEZ2&t3G@l_) zNxB5&DAASpr(%wxhmAY&(&y8YhdeF*gFzS7ZbjLGI{!xPs(D;Y8Yk3(p!pV?5DS@9 zr|NP5ZGn$I@z-79^+NWtv+~xXBcl2EH;O&BfWdn7jKcmD_ieCGUg4bV?96^Z-l@cE zuBbe%@b}EnY44Z%q4XNos$ZQEujQv6qNHd*1nbBN7Ge9uktAmf0ujo7)B^ZeoTf2+ z`&`5a2U)>713lEZdi}38dP$73MtKi{CzA=&Ba9A&P>tfEmyCytyJW?XaGbSRj`geo zSW=q|c$K}AWVs7_+G)J5l)wQN0#{(_*ginD&Gf2_Caqu)v^iXcC z;ZW7hxCm{v)Fxek>lCOhBee*S?!Hvr@_bEWnAlLI?gn8_o<{&=_Rf**L%xvnq}Mnj z$j+Tj6h|I8J$jQ}Bd|J8mcL%{<$H1GNGEmH9ubnt=BA2dcJfF?faedZMRG{onPo>Y z43XaVmtLw&@AV&wj|Lz8P!Jd2$7NDh3!&GUXg7c3&u@+$h)SZu|AD1g>T~yto5+ed z|2H)27WdYAr^a|>x!S#bjeynE4>wFNS+<3H3$w0xf!n6chF@P*YS+PTJj2z$ebaAs zjtJiy&&ETW-d(@Ms#t_QP$wOwtKVx8+V8aQIbxmA2oaHDz7HsDXh>N`gWy31_`oKv zma+>+LdI~eNAY#aZsi6c>wpwh%fhsKgt!bisn)IaT)7?csB)p2iFHe>dF4H>tdD9k z<(y9%%|R*8p;e)TOn=Ig;MvuEW7muMnIDN1SSwlH;YyWu6Ceki52uTOWGs3sf~VAf zbR@%mVXl0?G3B|{@%ANkY;@(k1z1&2uzL|kmJ5UxtQqiMt=*+g%&QsgLmaH4KpnsX zu-Q76I?r8=?HM6{*coQ~`|iCsgii0tQ9d!3!<1nu@$0XTP2QP`Wy}rll4&8AxbGt4 z8gXoOYNZIjKK1(%`M5qjoc45q?sc7kbjZlzZDDdQ;Gw+VYWk^jB%uJb+V}tU&ruti znhN;*`>i?I+N2U_j1BCDfK6S;L?Oudf)l9sH)rW8+lN_z#>KW|&t*5s4iX9qRas1| z_i}p>3S7j{FkhG$$V$K zS2tT}{1rmr-JurV;7uC`?6XxsegfTp*f6BHKyHjIj{oXrMv01o;^%oN#^Vm&LGT~( z-R)do)!9{|uIIb_!JN^znbzcFivwzZ##r$h-L~Q{)U0f5QIV0Orq?leKpV~9IWvJ@ zfs?sDcZ)#c?&mY;Q|`fm*P6$3Rq9(EtS;DOf5HLKGZwwZ7v;^?ph#)*$mnQ(hppf- zQ!6{W^$ssLpg`xRSXd}BQ7oV)Cw*TowZ!}ENr$siLe@YB0SN~{&Sn*zoq}RFNlEZ= zBM5oLFQF|z-*C0nw0bU ziV!9?u>Hd7`{I6o<+kQg(%9HouZD}^-PyCDNqqUpX0B`e<-%tcz=c*7T|0KPJbm&5 zz%%G0R=~#x#)y@#$%e|eL2_4&SBC-BfRhpiwC^CM}K3yXp`*v%r0f9gYo3xz` zD=YpuQKQ#r4TWmsVKbxursDqwcHkM#x^C)lKhAfK&uzca9RTq$LOz}5ZG(RUE*Ux^vEl#FmL0989PU;6%2Aq_k${}r1(#VmK&ooYpEW?kY06Z#FlixMi ztDe3&N|jl$gapvzMlAPW@46;vFD&z2AUPK;;DiaA3UYH%#8V)`3FbD8iGK>|fa+9| zcb<5EQ@ZSrLL6uMRahvWNgOTU(<;cqLc-3D!AA;YS7w(JDdap4V1|sTQTZfdhQXI? z8?>xcjg{qGoS~nZ zHai;5VOlCS#{U6s-p_XLmd3t>I|?nptV4PJRszA^BDikZlr4+sR*WOyH1Nk|D^Khr zn>=`S{z!ix5s{-_y2kGJwynhYdOBal%>XwUgF?V%i(gUr^XH$1LlHYB@?LU z$(=~Gh`CiDA9pP*{n=Nj#W1ioH*^BvgtKjKNU(>8TR!shRdmp|lf97`{JFcah={2I zDZCh>*ZanWvo_==6|e)zaKWp;WC2~BZ18xEv@x;&HmT@hcJP~92>y%~=d6ieTB=QW z$8(_-d4{&=>|=9i&KVXLgU9se(=abW;P58tN)DQRw$rPBt>*ditZnt>;=|}Y-!AkQ zFK`$O^c?MV@|!lANNJuoay^@X>l8PtOk~6 z_cG`QFp><8W1xc0v4fjhnlTkR>nDZQb7jh$pjyU}yz=0n-F^b#K{}dNe&n-|Y8+t4 zG1!vLA>O^abWIY6z;$!lEJfi~tXciIl<0op>}c(f3$=-yM&af`epyaPaf9 zb(f;8^C)fj+^Ak*QrjBjhj)DRE6vK(m+!D){Ng$-tjT`jhkGIQz9&C!amuBWMVr}a zPG+|)-o8P*aOQBw`GX(}80eK=JSj2p2czzh9%<^x@_z>#8{4Yb2U-C;TAzw_cKZS7 zpZ6>KhbbAYB*AMcs8m_4oNhdtH^&o33%qly^d2aS60^DL z{lX_>;GvNKzNSQMK!XoOPrG-5I$h72v?0BWpUtnV9nZgk;$rkMq7E zR{fANCD3XcB_IF(W(&}NG{nB=KSZaK)w7tJ8BX;+NF2@=kO`dI2PJtPBNqrIta+;nM8;%AQfKYe|C@fPds+Aw!~iZvhPJhP+X^s zCkkuNj5epULl=W<#D3+H)MR${-c zGalpx#z=Ey8Ob_>Q0)O0CAn?2GN)>1yypv)CKTkV4MgE5l>m`)Uh{wh`J7X`$7LYE zNx-czir2*u9CW4{&dQ^up`oFtmy?u)PDCX1Up_swe{gVrXUF?yN-88IMEXn3AJp93 z%2eAyRoib7bL#uzytxw-MfAVUS#a2raz2z^n`E}nn^0<@quI}U{&qI8mI-eA>V3t2 zbJ{x$|F@uTy1HYd^L4hj(8A)T^&asjgh1N6MKIS3>of2BA>aSZ;aDOeMidw{baVi; z#l^+#?U{L@KLr5#?%?3SHbxxm6MC1Vu@|AqgaGxc(o_z+O zTukf+kUW5L^LsvRNH?XJAZ;SyT{eez`($2n;RD==T@c{)DpCY#b1vtQ)R#lw^ zS~oN@0`y65Z!ap)p}D!aySuxwF*zHy#K)|FwV@~u_`ckz1pMytuv30-*SVuz@yLP? z8ykOuSkq5{v8;Fb3Dw*Cqh?fKw3rnG5;5UP_vjK-?(%7{f6mg2$hYSn;Xb#0)qN~NAo_nEA0F` zSg2?C9a_|)c=8x+wA{gkTQ(3uVwtm-?PAjuMMVBTt($o~lJ)0$UGG$UQ1#c8v zW-S@SGB$J?D9NixDmo6HtY8{805lPP412Clikeq{tbvq2ygbH~#4YE}o%Uk(!?;l_ zFb7Vc!&H8(^@6kD@puCR1Mmhww4@rhyz7GTA8bIzJ_2N+o}M1~&ehdbPcPP7jK1Q+ zAro{l9wmbLrC;NDV%DA#FLPl*Now%*UKzt*$B3C$ zOh>~>9^=t)R#DSd*z_1a5+K#}Amr~Z)`~B8wAwpF-_Gc?126}m8my`UCJueVQ=a%Y za%RqlrXe*2Ndj!jAPyPuc)=Tde3M)?r#CZ~D>;R6i#tah>7*BQ(&m z0HvaPjg?OtJF#~1CgA3QGvbH852g)-yWd}kuI>v<*O-$EOw7TS_?3d7rEoz30ZKn3 z#37eS`9v8wB>#1kLg43KIpRj|MUA}{#m>me+O~I6%I^m?BxFaUZ`@Tw1Mp}dNQ571aoJQr zjNR`{lAIQPNKHcnm45{D!$2VcoLK-KkY;1D6Y^^a#;JzqR>L_uE!wz4+fYE~h#lf8%#Lt`s z$TZ-hffJ5u8Xr)BFPNs{B<1ATDS#OTaoI}$-(?0zH{++$gTEtTkK2x1x1$n;|3ll6 zxAxQT{`A}a!f5_`+fil2pKjkz)e^`4-SK7oUE9%+e>(Q~GLDb^C?34lrj?qK^06Ga zY22-NJZ&k%!ooH1S6K_a!U^)nzc`P7>F;017jT#P5!IXudYXX*F)pE}cLbaK+R$PmiNxUw}KLl2dW65gAAU81F>b^F4Z ztLRd|+$S8U@-hU#J6;3 zGS!9LWd5^DqnZVoJ9L^cX!~8(E1sAluq}bKDIZp-&yrH3VP#31DZnp=iB&BmU6MU~ z8G1TG>c&AjM#X0BpzI`pbzT5JC=`=^blGt*mgrPxLDF6t{6eH<$l?Oe{yNper;QR9 zAv^YrXnn#{y9m}+h4oa4M-GWg(JHwKgN??18}q~EzYYKRaih_9*WJv_j7J++S?THX z!itm4YiZi;@xh)s}U9(UjgcrVo?RWZ#D7zExG!gUuqnhmr$xF(nej5zEg7>8u zjUv0H2lb!Y>@^M1nwpxDV{I)lsc~^}zQopiVJ25A8^nC=`=m1T*i{EB8`#ac;8kgN zFBmN&g=N)Ok47fE)%=N*J?Z?ckx(e~hsbg$V(;Ge_X(slsJ{saK{e*7GXv~L8(CrO zZ79>cP|!&$#ECCYmX1hV0wgRx^)6cQc46JVT6aEH)I>zwL6C1Mg@bI)bn|G?vAZpU z)0>TXgLD&72>lA4@)ZQ(H{0IiEJ{T|j$2)}G9UUq+EvwMq!-i(xv=Y{a2K4`M2+i) zAg8{qvz#U@hUnlD+=zeTN8PK|REI?-cz1btK+Bq$zXsk*nw+s}Cl^BP zpcP!-kxpNE3;T52aB$2c(1G^H#&`>4#A#%datYpNq1ne0E*B@a`8Klw3ee;Aj919M znaFS*XVe~{+|B^mo={f8R^-to@AWzMm9jTVHci+xwm`|YKb;ip9g~W_d8l8(=UoB8c&@|)Y<%vPjHgl!5~AC zl_!Gn6kU3wgtB0W7#1PKAR2{I9{qGq*rZzGx%~HZ_S%PDV{5`w3+h!gLUg!@BpJ{@ zR*sV&qqKmMcl)x+{tS5yhjrnPsC&3?{%vT6BNfywXPfd1(6HgsU0&{o&K z&0I31*co4O3s{il%J4IvL)T?u1=5$u+wV?!S%l0xOZ2H$z-=vzBtBfaHzvJV)Ac~S zK{hoEwTD&Db2_hxvl{cZ5qHgXvCTCTt9jY(yv&aGjA9f@Ka1cElznfl3D$zyuY3xI zlPj^PmANjvuyf3?i-HXe8~}5+iI2PoNyg0!n}sgF}DokQ5zmHp2T`@ z>rDkN@eRoXZy^B~Olj*&5SiF~9cAdj@E~&1QkL)2`g+sAz(BrmC)IbbZf`!G5{F$& z&lB#oR*LbupU%A^pXX+#TmBkV-*h+8jf^ki?8ST~|9f7i(-1=JifQ?YS#51dg>*iB zhl}{?s`zdLE~P0C5tM^~-S6^4Mk-mA1`@I%-cr6#SbC%0=jUtea${+EW<%8pWVp}O z{yVN_d5ugPwG1DK?=tJ5JjmUfJNDeZy2VOun41Hqr@_kY)_=Ys$;WJ8eBD|ZD-qX` z5+gI9YcA>6oxQGzkorA;qV@HWhf5>>=yZ9jI8e?Ka?h5))M!{@tZ=&0&R zYU;P39!USzEw3`+oBE&H(@T_G?`0C+&z_q+34Z}FuzOO*$xgGD6S)IGimPMJY?>q1 z4u)%+8$VmZr|+xol4{0l!d#%0L0v+SGIhxrvZE&=cG-e*`< z)8|io;=mG`ih5EQ5!THj9NEp#Wtb-F?`rD1DwIx7__!q>^J%VR5TRhF6rHhpJ~6SU z^_2OI?`4lSOh@!bJd>A`CwCq&3wgjlwBt6-P6T}gS*gW#|Gz+L7GgW zXS1ilSn#T-pNKH%yQtsEvH*fl# z(6dQHivHd57n~kAtvcpy+T!lYjlOf;iYk0v7|8)`sZVw;cX#^cCV=G(CgvKsLzmzQ zwK;A}?>>&uN-!<7T`sKi4D`)SJnPt%E7jG&=I46F)=`A9$7*319^E33~*O!auF*CwB9W3JUysjAPwXaPoa+COk;XlQ$Ns;aW`FlVh9uFtm0 z)i$N=Ue&p&4;y2*Uw_OKnJkuUbzadUHcTV7K_VoKDNj+`+$gN|x-P=MwDYoa#ye#l zXSEy2k^{T3Ej1Tn5~3A!B}o@qa>TDk!Lr^X;zeRwat3WLagGgKUQB%WlQJ1w~Vpv_$rb zSu`j;_>`klR8deMEGAamf~VtD=;QC@FT+^Ziqo)(`K#Nor=5H<~xb81Q)@IS%d6kcPp&fqL3~wkA6GG`_Vpsmm5YBMpZyeXc42 zR!V)nZ@_*My_<kT4_`)_NjWE?D1jqV&Q z`T&awjYeM{WnT zChdQ$Z2pU8{-0|0Sc4zy@}COwj#cXax9VMtid8i81=V3BisfI6ifGdyL&^}|4yWd) ylpYjKFM&|cWQNpIt+^f1hsWbMR?ExZ56HA4a&r4{IS+tRhiIzlAd9bBKK&1Pz1R@| diff --git a/source/components/pro/windows/index.rst b/source/components/pro/windows/index.rst deleted file mode 100644 index 1e0d8956df..0000000000 --- a/source/components/pro/windows/index.rst +++ /dev/null @@ -1,46 +0,0 @@ -Nitrokey Pro, Windows -===================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -Getting Started ---------------- - -1. Connect your Nitrokey to your computer and confirm all dialogs so - that the USB smart card device driver gets installed almost - automatically. Windows may fail to install an additional device - driver for the smart card. Its safe to ignore this warning. -2. Download and start the `Nitrokey - App `__. -3. Go to “Menu” -> “Configure” to change the User PIN (default: 123456) - and Admin PIN (default: 12345678) to your own choices. - -.. figure:: ./images/App-change-pin.png - :alt: img - - -Your Nitrokey is now ready to use. - -.. note:: - For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below). - -Key Creation with OpenPGP or S/MIME -~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ - -There are two widely used standards for email encryption. While -OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used -by enterprises. If you are in doubt which one to choose, you should use -OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. diff --git a/source/components/pro/windows/openpgp-keygen-backup.rst b/source/components/pro/windows/openpgp-keygen-backup.rst deleted file mode 100644 index 7d3886ecef..0000000000 --- a/source/components/pro/windows/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-backup.rst.inc diff --git a/source/components/pro/windows/openpgp-keygen-gpa.rst b/source/components/pro/windows/openpgp-keygen-gpa.rst deleted file mode 100644 index 797b8412fc..0000000000 --- a/source/components/pro/windows/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-gpa.rst.inc diff --git a/source/components/pro/windows/openpgp-keygen-on-device.rst b/source/components/pro/windows/openpgp-keygen-on-device.rst deleted file mode 100644 index 9d0b148be6..0000000000 --- a/source/components/pro/windows/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-keygen-on-device.rst.inc diff --git a/source/components/pro/windows/openpgp-outlook.rst b/source/components/pro/windows/openpgp-outlook.rst deleted file mode 100644 index 53ef3da2da..0000000000 --- a/source/components/pro/windows/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-outlook.rst.inc diff --git a/source/components/pro/windows/openpgp-thunderbird.rst b/source/components/pro/windows/openpgp-thunderbird.rst deleted file mode 100644 index 2a21baf43f..0000000000 --- a/source/components/pro/windows/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp-thunderbird.rst.inc diff --git a/source/components/pro/windows/openpgp.rst b/source/components/pro/windows/openpgp.rst deleted file mode 100644 index dd1a2cdd44..0000000000 --- a/source/components/pro/windows/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../openpgp.rst.inc diff --git a/source/components/pro/windows/openvpn-easyrsa.rst b/source/components/pro/windows/openvpn-easyrsa.rst deleted file mode 100644 index 5131a6e41c..0000000000 --- a/source/components/pro/windows/openvpn-easyrsa.rst +++ /dev/null @@ -1,674 +0,0 @@ -OpenVPN Configuration with Easy-RSA -=================================== - -.. contents:: :local: - :depth: 2 - -.. note:: - - This guide is work-in-progress, and will be updated accordinlgy. Please take this status into consideration. - -This guide shows how to configure OpenVPN clients to login using a `Nitrokey Pro -2 `__ or a `Nitrokey Storage -2 `__. For software key management we will be using `Easy-RSA `__, a utility that has been evolving alongside OpenVPN. - -To sign the certificates, we will use a `Nitrokey HSM -2 `__ set up as `Certificate Authority <../../hsm/windows/certificate-authority.html#creating-the-intermediate-certificate-authority>`_, however this guide does not cover the set up of the CA itself (it is clear and `well documented here <../../hsm/windows/certificate-authority.html#sign-a-server-certificate>`_). - -We will use Easy-RSA, because it seems to provide some flexibility, and allows key management via external PKIs. We will use it on the server to issue the signing request, and repeat the same process on the client. The Certificate Signing Requests will be signed by the CA on the Nitorkey HSM, and re-transmitted to the server and the client. - - -Prerequisites -------------- - -In the following documentation we will require 3 different machines as following: - -- OpenVPN server (v. 2.5) on Debian 10 (EC2 virtual machine - AWS) - -- OpenVPN client (v. 2.4.9) on Fedora 30 (local machine) - -- The Certificate Authority will be accessible from a standalone - machine with Fedora 30 (local machine) - -To interact with the devices we will require `OpenSC -0.20 `__ installed on the client and CA machine (the local machines). You can follow the instructions to set it up in `this link (*Unix) `__. - -To download the dependencies on Fedora machines we can this instruction: - -.. code-block:: bash - - su -c 'dnf install readline-devel openssl-devel libxslt docbook-style-xsl pcsc-lite-devel automake autoconf libtool gcc zlib-devel' - -For Debian Linux, more recent OpenSC packages are available `here `__. - -We will use the following Nitrokeys for physical key management: - -- An authentication key using the `Nitrokey Pro 2 - (pdf) `__ - -- A Certificate Authority (CA) using the `Nitrokey HSM 2 - (pdf) `__ - -As a reminder, to build a Certificate Authority on Nitrokey HSM 2, you may follow the instructions available `in the documentation `_. - -Alternatively you may set up your own CA on a `on a separate machine `__, or use the OpenVPN tutorial which also relies on `Easy-RSA `__. The last 2 options rely on software solutions for key management. - --------------- - -Server side ------------ - -1. Install OpenVPN -^^^^^^^^^^^^^^^^^^ - - 1. First we need to enable IP Forwarding by editing ``/etc/sysctl.conf`` file - - .. code-block:: bash - - $ editor /etc/sysctl.conf - - 2. Uncomment or edit accordingly the following line - - .. code-block:: bash - - net.ipv4.ip_forward=1 - - 3. Close after saving it, and enter this command - - .. code-block:: bash - - $ sysctl -p - - Once IP forwarding is done, we will need to download the latest release of OpenvPN for our Debian 10 server, according to `these instructions `__: - - 4. Change to root and download the GPG key that signed the package - - .. code-block:: bash - - $ sudo -s - # wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg | apt-key add - - - 5. Add the URL of the adequate OpenVPN packages to the ``sources.list`` file - - .. code-block:: bash - - # echo "deb http://build.openvpn.net/debian/openvpn/release/2.5 buster main" > /etc/apt/sources.list.d/openvpn-aptrepo.list - # exit - - We downloaded OpenVPN 2.5 as “password prompt” requires at least OpenVPN `version - 2.4.8 `__ to login. - - 6. Next we download OpenVPN - - .. code-block:: bash - - $ sudo apt install openvpn - - If you want to check the version, it possible by calling ``--version`` - and print the following: - - :: - - $ sudo openvpn --version - OpenVPN 2.5_beta3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 1 2020 - library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10 - Originally developed by James Yonan - Copyright (C) 2002-2018 OpenVPN Inc - Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dependency_tracking=no \ enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=yes \ enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_maintainer_mode=no enable_management=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no \ enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=yes enable_plugin_down_root=yes enable_plugins=yes enable_port_share=yes enable_selinux=no \ enable_shared=yes enable_shared_with_static_runtimes=no enable_silent_rules=no enable_small=no enable_static=yes enable_strict=no enable_strict_options=no \ enable_systemd=yes enable_werror=no enable_win32_dll=yes enable_x509_alt_username=yes with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes \ with_mem_check=no with_sysroot=no - -2. Install Easy-RSA -^^^^^^^^^^^^^^^^^^^ - - To build the PKI, we will download the latest version of Easy-RSA on the server and client machines. To get the latest release, go to the `Releases page on the official EasyRSA GitHub project `__, copy the download link for the file ending in ``.tgz``, and then paste it into the following command: - - 1. Download the latest release - - .. code-block:: bash - - $ cd ~ - $ wget -P ~/ https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.7/EasyRSA-3.0.7.tgz - - 2. Extract the tarball - - .. code-block:: bash - - $ cd ~ - $ tar xvf EasyRSA-3.0.7.tgz - $ mv EasyRSA-3.0.7/ easyrsa/ # rename folder - -3. Create a PKI for OpenVPN server -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - Before you can create your OpenVPN server’s private key and certificate, you need to create a local Public Key Infrastructure directory on your OpenVPN server. You will use this directory to manage the server and clients’ certificate requests, instead of making them directly on your CA server. - - To build a PKI directory on your OpenVPN server, you’ll need to populate a file called ``vars`` with some default values. - - 1. Create a ``vars`` file - - .. code-block:: bash - - $ touch ~/easyrsa/vars - $ cd easyrsa/ - $ editor vars - - 2. Once the file is opened, paste in the following two lines - - .. code-block:: bash - - set_var EASYRSA_ALGO "ec" - set_var EASYRSA_DIGEST "sha512" - - These are the only two lines that you need in this ``vars`` file on your OpenVPN server since it will not be used as a Certificate Authority. They will ensure that your private keys and certificate requests are configured to use Elliptic Curve Cryptography (ECC) to generate keys, and secure signatures for your clients and OpenVPN server. - - In regards to the choice of the cryptographic algorithms, I follow the model in `this tutorial `__, and you can customize these according to your specific needs. - - 3. Initialize the PKI - - Once you have populated the ``vars`` file you can proceed with creating the PKI directory. To do so, run the easyrsa script with the init-pki option: - - .. code-block:: bash - - $ ./easyrsa init-pki - - After you’ve initialized your PKI on the OpenVPN server, you are ready to move on to the next step, which is creating an OpenVPN server certificate request and private key. - -4. Create ``server.req`` and ``server.key`` -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - Now that your OpenVPN server has all the prerequisites installed, the next step is to generate a key pair composed of a private key (to keep secret), and a Certificate Signing Request (``.csr``) on your OpenVPN server. - - In general terms, on systems where we generate a key and request, these files are left unencrypted by using the ``nopass`` argument, since servers usually need to start up without any password input. This generates an *unencrypted key*, so mind *protect its access and file permissions* carefully. - - .. tip:: - - Configuration notes from OpenVPN: - - 1. The server, and each client, must have their own cert and key - file. The server and all clients will use the same CA file. - 2. Server certificate should have the following: - - - ``keyUsage: digitalSignature, keyEncipherment`` - - - ``extendedKeyUsage: serverAuth`` - - 1. Create the signing request for the server - - Navigate to the ``~/easyrsa`` directory on your OpenVPN Server as your non-root user, and enter the following commands: - - .. code-block:: bash - - $ cd easyrsa/ - $ ./easyrsa gen-req server nopass - - This will create a private key for the server and a certificate request file called ``server.req``. - - Once you have a signed certificate, you’ll transfer it back to the OpenVPN server. - - 2. Copy the key to the OpenVPN server directory - - .. code-block:: bash - - $ sudo cp /home/admin/EasyRSA/pki/private/server.key /etc/openvpn/server/ - - After completing these steps, you have successfully created a private key for your OpenVPN server. You have also generated a Certificate Signing Request for the OpenVPN server. - - .. tip:: - - File extensions for certificate signing requests - - The file extension that is adopted by the CA and HSM tutorial - indicates the creation of a ``.csr`` file, however Easy-RSA creates - certificate signing requests with a ``.req`` extension. - - We will use interchangeably both extensions, while making sure that - we transfer the right files to the Certificate Authority, and - generate a final certificate with a ``.crt`` extension. - - In the next section of this guide, we will sign a ``.req`` file with our CA on deployed on the HSM 2 device. For this purpose, I will use a dedicated machine to sign the requests. - -5. Sign and retrieve ``server.crt`` -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - The following instructions require the transfer of the ``server.req`` - (or ``server.csr``) file to the CA system. - - The transfer itself is not security sensitive, though it is wise to verify if the received file matches the sender’s copy, if the transport is untrusted. - - In order to go through these steps, I will extensively rely on `these instructions `_, to sign the certificate signing requests, once we generated them with Easy-RSA. - - 1. Sign the ``server.req`` file - - On the local machine dedicated to access the HSM, we will use the tools provided by Opensc 0.20 in order to sign the ``.req`` file, and send it back to the OpenVPN server. We assume we have transferred the file from the server machine to the CA machine. - - First we start by plugging the HSM Nitrokey, and enter this instruction for listing the keys available. - - 1. Query the list of available devices - - :: - - $ p11tool --list-all - - **(Required step)** If this is the first time you sign a certificate with the CA, you might want to retrieve the URI of the CA’s private key from the HSM, and include it in the config file. - - - The key’s URI should be in this format: - - :: - - pkcs11:model=PKCS%2315%20emulated;manufacturer=www.CardContact.de;serial=DENK0104068;token=SmartCard-HSM%20%28UserPIN%29%00%00%00%00%00%00%00%00%00;id=%E0%16%1C%C8%B6%F5%D6%6A%C6%83%5E%CD%EC%B6%23%FC%05%06%A6%75;object=root;type=private - - 2. Create ``openvpn/`` directory under ``certificate-authority/`` - - .. code-block:: bash - - $ mkdir/opt/certificate-authority/ - $ cd /opt/certificate-authority/ - - 3. Sign the ``server.req`` - - .. code-block:: bash - - $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -days 375 -notext -md sha512 -create_serial -in server.req -out /home/user/pki/issued/server.crt - - 2. Retrieve the ``server.crt`` file to the server machine - - 1. Transfer the signed certificates to the server - - From the CA machine, copy the files ``server.crt`` and ``chain.crt`` to the OpenVPN server. In this example we will use the ``scp`` command as following: - - .. code-block:: bash - - $ scp openvpn/{server.crt,chain.crt} admin@your_openvpnserver_ip:/tmp - - 2. Place the certificates on the server’s directory - - .. code-block:: bash - - $ mv /tmp/{server.crt,chain.crt} /etc/openvpn/server - - .. warning:: - - CA Certificate and ``chain.crt`` - - In the above, the CA returns the signed sever certificate, and - includes the CA certificate ``CA.crt`` which is the ``chain.crt`` - file. This can be done over an insecure channel, though the client is - encouraged to confirm if the received ``chain.crt`` is valid, if the - transport is untrusted. - - It is possible to rename the file ``chain.crt`` file to ``CA.crt`` on - the target machine, however we will use ``chain.crt`` in the next - instructions. - -6. Configure the OpenVPN server -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - A connection that uses TLS requires multiple `certificates and keys for authentication `__. Now that we issued and signed those, we can place them in the right directories. The breakdown of the certificates and keys that must be located at the root directory are the following: - - :: - - OpenVPN server - - - The root certificate file (CA.crt or chain.crt in our setup) - - Server certificate - - Server key - - Diffie Hellman Parameters (optional) - - On your OpenVPN server, now you can create the configuration file ``server.conf`` with your favorite text editor. The file can be configured according to your needs, while we make sure to change the server certificate and key sections according the names you chose for the your the files we signed: - - .. code-block:: bash - - # OpenVPN Server Certificate - CA, server key and certificate - ca chain.crt - cert server.crt - key server.key - - Here is the configuration file we can use for testing these instructions: - - .. code-block:: bash - - port 1194 - proto udp - dev tun - ca ca.crt - cert server.crt - key server.key # This file should be kept secret - dh dh.pem - server 10.8.0.0 255.255.255.0 - push "redirect-gateway def1 bypass-dhcp" - push "dhcp-option DNS 208.67.222.222" - push "dhcp-option DNS 208.67.220.220" - keepalive 10 120 - tls-auth ta.key 0 # This file is secret - cipher AES-256-CBC - user nobody - group nogroup - persist-key - persist-tun - status /var/log/openvpn/openvpn-status.log - log /var/log/openvpn/openvpn.log - log-append /var/log/openvpn/openvpn.log - verb 3 - explicit-exit-notify 1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - - To test if the configuration functions properly, we can use this command: - - .. code-block:: bash - - $ sudo openvpn --server --config server.conf - -7. Start the OpenVPN service on the server -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - Enable the OpenVPN service by adding it to systemctl, and start it using these commands: - - .. code-block:: bash - - $ sudo systemctl -f enable openvpn@server - $ sudo systemctl start openvpn@server - - To Double check if the OpenVPN service is active use this command: - - .. code-block:: bash - - $ sudo systemctl status openvpn@server - - The OpenVPN should be running at this point. - --------------- - -Client side configuration -------------------------- - -1. Install OpenVPN and Easy-RSA -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - 1. Install the software - - We can use directly ``dnf install`` to install OpenVPN 2.4.9 and Easy-RSA 3.0.7 - - .. code-block:: bash - - $ sudo dnf install openvpn easy-rsa - - 2. Then we create as non-root a directory for Easy RSA called ``Easy-RSA`` - - .. code-block:: bash - - $ mkdir ~/easyrsa - - 3. And link it to the Easy RSA package we just installed - - .. code-block:: bash - - $ ln -s /usr/share/easy-rsa/3/* ~/easyrsa/ - -2. Create a PKI for the OpenVPN client -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - In the same manner we created a PKI on the OpenVPN server, we will create a PKI using Easy-RSA on the client side. - -3. Create a ``client.req`` and ``client.key`` -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - In the same manner we issued the key pair on the sever, we generate a key pair for the client which will be composed of the ``client.req`` - file and the ``client.key`` file. The latter must be kept secret on the client machine. - -4. Sign ``client.req`` and issue the ``client.crt`` file -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - To transfer the ``client.req`` file to the CA machine, we will use the same method as we did for the ``server.req`` file. - - Once transferred, on the CA machine we sign the certificate signing request file with this command - - .. code-block:: bash - - $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -days 375 -notext -md sha512 -create_serial -in client.req -out /home/user/pki/issued/client.crt - -5. Import ``client.crt`` on the Nitrokey from the CA machine -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - After creating the ``client.crt`` file, we plug the Nitrokey Pro 2 device in the CA machine, and import the ``.crt`` to the Pro 2 device using this command: - - .. code-block:: bash - - $ pkcs15-init --store-certificate client.crt --id 3 - - You can see if the key is effectively stored on the Nitrokey using this command: - - .. code-block:: bash - - $ pkcs15-tool -c - - Or alternatively - - .. code-block:: bash - - $ pkcs11-tool --list-objects - - Fore more commands you can refer to the `OpenSC wiki `__. - -6. Retrieve the ``chain.crt`` file from the CA machine -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - While we keep the ``client.crt``\ stored on the nitrokey Pro 2 device, we must retrieve the ``chain.crt`` file on the client machine, and store it in the adequate directory. We may use ``scp`` as in the method explained in the server section of this guide. - -7. Configure the client to interact with the Nitrokey -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - Now back on the client machine, we will plug the Nitrokey Pro and use it to establish the VPN connection with the server. In general terms, a connection that uses TLS requires multiple certificates and keys for authentication: - - :: - - OpenVPN client - - The root certificate file (`chain.crt`) - - Client certificate - - Client key - - For this guide we can the following ``client.conf`` file, and add the required options to it accordingly: - - .. code-block:: bash - - client - dev tun - proto udp - remote 1194 - resolv-retry infinite - nobind - user nobody - group nobody - persist-key - persist-tun - ca ca.crt - remote-cert-tls server - cipher AES-256-CBC - verb 3 - redirect-gateway def1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - - 1. Determine the correct object - - Each PKCS#11 provider can support multiple devices. In order to view the available object list you can use the following command: - - .. code-block:: bash - - $ openvpn --show-pkcs11-ids /usr/lib64/pkcs11/opensc-pkcs11.so - - The following objects are available for use. - Each object shown below may be used as parameter to - - --pkcs11-id option please remember to use single quote mark. - - Certificate - DN: CN=client - Serial: E53DA75C5B8F1518F520BCEF0128C09F - Serialized id: pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03 - - Each certificate/private key pair have unique ``Serialized id`` string. The serialized id string of the requested certificate should be specified, in the configuration file. We can do this by adding the ``pkcs11-id`` option using single quote marks. - - .. code-block:: bash - - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - - 2. Add retrieved Serialized ID to the configuration file - - Using your favorite text editor, open the server.conf file, and add the following lines, while taking care to insert your own ``Serialized id``: - - .. code-block:: bash - - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - - For additional `settings related to OpenVPN `__ authentication, you may also add few lines to handle key maganagement, although it is optional. - - .. note:: - - Click to view the code - - .. code-block:: bash - - # nitrokey config - - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - # pkcs11-pin-cache 300 - # daemon - # auth-retry nointeract - # management-hold - # management-signal - # management 127.0.0.1 8888 - # management-query-passwords - pkcs11-cert-private 1 # Prompt for PIN - - Optional step - - - If you need to test the configuration, with and without the token on the Nitrokey, you may add lines to the same ``client.conf`` and comment/uncomment the relevant lines according to your needs: - - .. note:: - - Click to view the code - - .. code-block:: bash - - # non_nitrokey login - - # cert client.crt - # key client.key - # tls-auth ta.key 1 - - 3. Configure the OpenVPN client - - The final configuration file ``client.conf`` should look like this one: - - .. code-block:: bash - - client - dev tun - proto udp - remote 1194 - resolv-retry infinite - nobind - user nobody - group nobody - persist-key - persist-tun - ca ca.crt - remote-cert-tls server - cipher AES-256-CBC - verb 3 - redirect-gateway def1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - - # nitrokey login - - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - # pkcs11-pin-cache 300 - # daemon - # auth-retry nointeract - # management-hold - # management-signal - # management 127.0.0.1 8888 - # management-query-passwords - pkcs11-cert-private 1 # Prompt for PIN - - # OR - - # non_nitrokey login - - # cert client.crt - # key client.key - # tls-auth ta.key 1 - - 4. Configure OpenVPN - - In order to establish a handshake, you must configure OpenSSL included in OpenVPN. - - Create the directory ``ssl`` in ``C:\Program Files\OpenVPN`` and create file ``openssl.cnf`` with the following content : - - openssl_conf = default_conf - - [ default_conf ] - ssl_conf = ssl_sect - - [ ssl_sect ] - system_default = ssl_default_sect - - [ ssl_default_sect ] - SignatureAlgorithms = RSA+SHA512:ECDSA+SHA512:RSA+SHA384:ECDSA+SHA384:RSA+SHA256:ECDSA+SHA256 - MaxProtocol = TLSv1.2 - MinProtocol = TLSv1.2 - - - With this modification, you will not have error as reported `here `__, `here `__ and `here `__ - - - - 5. Known issues - - There are some known issues related to OpenVPN login with OpenSC. Please consult these issues `here `__. - -8. Start the OpenVPN client -^^^^^^^^^^^^^^^^^^^^^^^^^^^ - - 1. Start the OpenVPN service on the client - - Enable the OpenVPN service, and start it using these commands: - - .. code-block:: bash - - $ sudo systemctl -f enable openvpn-server@server.service - $ sudo systemctl start openvpn-server@server.service - - To double check if the OpenVPN service is active use this command: - - .. code-block:: bash - - $ sudo systemctl status openvpn-server@server.service - - 2. Enter your User PIN - - When executing OpenVPN client, Nitrokey’s PIN needs to be entered: - - :: - - $ sudo openvpn --client --config client.conf - Fri Sep 11 17:42:01 2020 OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2020 - Fri Sep 11 17:42:01 2020 library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.08 - Fri Sep 11 17:42:01 2020 PKCS#11: Adding PKCS#11 provider '/usr/lib64/pkcs11/opensc-pkcs11.so' - Enter User PIN (OpenPGP card) token Password: ****** - - - In some reported cases it does not prompt for a PIN on the terminal. One workaround would be to use to use this command to login with the PIN: - - :: - - $ telnet 8888 password 'User PIN (OpenPGP card) token' - - Alternatively, you could `recompile OpenVPN `__ client with systemd support disabled, and it will prompt you for the PIN as expected. - - Another option, would be to login to your OpenVPN instance with the Viscosity client which provides a better user experience especially for entering the PIN. diff --git a/source/components/pro/windows/otp.rst b/source/components/pro/windows/otp.rst deleted file mode 100644 index 9c050e58fa..0000000000 --- a/source/components/pro/windows/otp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../otp.rst.inc diff --git a/source/components/pro/windows/putty.rst b/source/components/pro/windows/putty.rst deleted file mode 100644 index 186e1d37a7..0000000000 --- a/source/components/pro/windows/putty.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../putty.rst.inc diff --git a/source/components/pro/windows/smart-policy.rst b/source/components/pro/windows/smart-policy.rst deleted file mode 100644 index 1b921eef8e..0000000000 --- a/source/components/pro/windows/smart-policy.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smart-policy.rst.inc diff --git a/source/components/pro/windows/smime-outlook.rst b/source/components/pro/windows/smime-outlook.rst deleted file mode 100644 index ce4ca6f530..0000000000 --- a/source/components/pro/windows/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime-outlook.rst.inc diff --git a/source/components/pro/windows/smime-thunderbird.rst b/source/components/pro/windows/smime-thunderbird.rst deleted file mode 100644 index fb35c7a207..0000000000 --- a/source/components/pro/windows/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../smime-thunderbird.rst.inc diff --git a/source/components/pro/windows/smime.rst b/source/components/pro/windows/smime.rst deleted file mode 100644 index c2fe514a64..0000000000 --- a/source/components/pro/windows/smime.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. include:: ../smime.rst.inc - :end-line: 20 - -.. note:: - Windows users with 64-bit system (standard) need to install both, the 32-bit and the 64-bit version of OpenSC! - -.. include:: ../smime.rst.inc - :start-line: 20 - diff --git a/source/components/start/index.rst b/source/components/start/index.rst deleted file mode 100644 index 05f3ccd653..0000000000 --- a/source/components/start/index.rst +++ /dev/null @@ -1,23 +0,0 @@ -Nitrokey Start -============== - -.. contents:: :local: - -First check the: - -.. toctree:: - :maxdepth: 1 - :glob: - - Frequently Asked Questions - -or choose your operating system: - -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - diff --git a/source/components/start/linux/factory-reset.rst b/source/components/start/linux/factory-reset.rst deleted file mode 100644 index c1fcf5041f..0000000000 --- a/source/components/start/linux/factory-reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../factory-reset.rst diff --git a/source/components/start/linux/gpa.rst b/source/components/start/linux/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/start/linux/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/start/linux/ipsec.rst b/source/components/start/linux/ipsec.rst deleted file mode 100644 index cfc9264144..0000000000 --- a/source/components/start/linux/ipsec.rst +++ /dev/null @@ -1,4 +0,0 @@ -IPsec -===== - -.. include:: ../../hsm/ipsec.rst.inc diff --git a/source/components/start/linux/login-with-pam.rst b/source/components/start/linux/login-with-pam.rst deleted file mode 100644 index 4eee0f04a2..0000000000 --- a/source/components/start/linux/login-with-pam.rst +++ /dev/null @@ -1,4 +0,0 @@ -Login With PAM -=========================== - -.. include:: ../../pro/login-with-pam.rst.inc diff --git a/source/components/start/linux/multiple-identities.rst b/source/components/start/linux/multiple-identities.rst deleted file mode 100644 index 46ed8387d4..0000000000 --- a/source/components/start/linux/multiple-identities.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../multiple-identities.rst.inc diff --git a/source/components/start/linux/openpgp-keygen-backup.rst b/source/components/start/linux/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/start/linux/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/start/linux/openpgp-keygen-gpa.rst b/source/components/start/linux/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/start/linux/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/start/linux/openpgp-keygen-on-device.rst b/source/components/start/linux/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/start/linux/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/start/linux/openpgp-outlook.rst b/source/components/start/linux/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/start/linux/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/start/linux/openpgp-thunderbird.rst b/source/components/start/linux/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/start/linux/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/start/linux/openpgp.rst b/source/components/start/linux/openpgp.rst deleted file mode 100644 index fb8b25042e..0000000000 --- a/source/components/start/linux/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp.rst.inc diff --git a/source/components/start/linux/setting-kdf-do.rst b/source/components/start/linux/setting-kdf-do.rst deleted file mode 100644 index f9ff6236c0..0000000000 --- a/source/components/start/linux/setting-kdf-do.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../setting-kdf-do.rst.inc diff --git a/source/components/start/linux/smime-outlook.rst b/source/components/start/linux/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/start/linux/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/start/linux/smime-thunderbird.rst b/source/components/start/linux/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/start/linux/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/start/linux/smime.rst b/source/components/start/linux/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/start/linux/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/start/linux/ssh.rst b/source/components/start/linux/ssh.rst deleted file mode 100644 index 792071f9a1..0000000000 --- a/source/components/start/linux/ssh.rst +++ /dev/null @@ -1,4 +0,0 @@ -SSH For Server Administration -============================= - -.. include:: ../../pro/ssh.rst diff --git a/source/components/start/linux/stunnel.rst b/source/components/start/linux/stunnel.rst deleted file mode 100644 index 94a9982dac..0000000000 --- a/source/components/start/linux/stunnel.rst +++ /dev/null @@ -1,4 +0,0 @@ -Stunnel -======= - -.. include:: ../../hsm/stunnel.rst.inc diff --git a/source/components/start/mac/factory-reset.rst b/source/components/start/mac/factory-reset.rst deleted file mode 100644 index c1fcf5041f..0000000000 --- a/source/components/start/mac/factory-reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../factory-reset.rst diff --git a/source/components/start/mac/gpa.rst b/source/components/start/mac/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/start/mac/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/start/mac/index.rst b/source/components/start/mac/index.rst deleted file mode 100644 index 04e1917cea..0000000000 --- a/source/components/start/mac/index.rst +++ /dev/null @@ -1,58 +0,0 @@ -Nitrokey Start, Mac -=================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Install `GnuPG 2.1 `__ or higher. -2. Connect your Nitrokey to your computer and confirm all dialogs so - that the USB smart card device driver gets installed almost - automatically. -3. Use GnuPG to `generate new keys or import existing - ones `_. - - .. note:: - It is indeed necessary to first import or create new keys and - change the PINs afterwards. Otherwise changing User PIN will fail! - Furthermore overriding keys results in PIN reset (default values), - please keep this in mind! - -4. Change the Admin PIN (default: ``12345678``) and then the User PIN (default: ``123456``) to your own choices. - - * The PIN must consist of at least 14 characters (starting from RTM.8), can contain any character (not only numbers). Do not select only numbers. If your environment allows that, use emoticons or national characters. - * The longer the PIN the better. It is possible to use 6 randomly selected words instead as well for the same or better security than random character string. - * Use ‘gpg –card-edit’ -> ‘admin’ -> ‘passwd’ to achieve this (for Admin PIN case). - * Please be careful to change Admin PIN first and User PIN second! Otherwise the admin-less mode got activated, see `this instructions `__ for further information. - * Optionally Reset code can be set up (`guide `__). The minimum length accepted is 8 characters, however it should be as long as User PIN. - * KDF-DO allows for a shorter PIN of 8 characters minimum, by executing part of the calculations on the PC. - -**Firmware version 1.2.5 or below: In case you forget a PIN or enter it -wrongly three times you need the reset code to unblock the PIN. -Otherwise the device wouldn’t be usable anymore! Therefore -please** `set the reset -code `__ **as -well when initialising the key!** - -Your Nitrokey is now ready to use. - -Key Creation with OpenPGP or S/MIME -################################### - -There are two widely used standards for email -encryption. While OpenPGP/GnuPG is popular among individuals, -S/MIME/x.509 is mostly used by enterprises. If you are in doubt which -one to choose, you should use OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. - -Please note that the Nitrokey App can not be used for this device! diff --git a/source/components/start/mac/multiple-identities.rst b/source/components/start/mac/multiple-identities.rst deleted file mode 100644 index 46ed8387d4..0000000000 --- a/source/components/start/mac/multiple-identities.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../multiple-identities.rst.inc diff --git a/source/components/start/mac/openpgp-keygen-backup.rst b/source/components/start/mac/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/start/mac/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/start/mac/openpgp-keygen-gpa.rst b/source/components/start/mac/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/start/mac/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/start/mac/openpgp-keygen-on-device.rst b/source/components/start/mac/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/start/mac/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/start/mac/openpgp-outlook.rst b/source/components/start/mac/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/start/mac/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/start/mac/openpgp-thunderbird.rst b/source/components/start/mac/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/start/mac/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/start/mac/openpgp.rst b/source/components/start/mac/openpgp.rst deleted file mode 100644 index fb8b25042e..0000000000 --- a/source/components/start/mac/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp.rst.inc diff --git a/source/components/start/mac/setting-kdf-do.rst b/source/components/start/mac/setting-kdf-do.rst deleted file mode 100644 index f9ff6236c0..0000000000 --- a/source/components/start/mac/setting-kdf-do.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../setting-kdf-do.rst.inc diff --git a/source/components/start/mac/smime-outlook.rst b/source/components/start/mac/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/start/mac/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/start/mac/smime-thunderbird.rst b/source/components/start/mac/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/start/mac/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/start/mac/smime.rst b/source/components/start/mac/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/start/mac/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/start/windows/factory-reset.rst b/source/components/start/windows/factory-reset.rst deleted file mode 100644 index c1fcf5041f..0000000000 --- a/source/components/start/windows/factory-reset.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../factory-reset.rst diff --git a/source/components/start/windows/gpa.rst b/source/components/start/windows/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/start/windows/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/start/windows/index.rst b/source/components/start/windows/index.rst deleted file mode 100644 index 9333e86a0d..0000000000 --- a/source/components/start/windows/index.rst +++ /dev/null @@ -1,57 +0,0 @@ -Nitrokey Start, Windows -======================= - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Install `Gpg4win `__ on your Computer. -2. Connect your Nitrokey to your computer and confirm all dialogs so - that the USB smart card device driver gets installed almost - automatically. - - .. note:: - Windows may fail to install an additional device driver for the smart card. Its safe to ignore this warning. - -3. Use GnuPG to `generate new keys or import existing ones `_. - - .. note:: - It is indeed necessary to first import or create new keys and change the PINs afterwards. Otherwise changing User PIN will fail! Furthermore overriding keys results in PIN reset (default values), please keep this in mind! - -4. Change the Admin PIN (default: ``12345678``) and then the User PIN (default: ``123456``) to your own choices. - - * The PIN must consist of at least 14 characters (starting from RTM.8), can contain any character (not only numbers). Do not select only numbers. If your environment allows that, use emoticons or national characters. - * The longer the PIN the better. It is possible to use 6 randomly selected words instead as well for the same or better security than random character string. - * Use ‘gpg –card-edit’ -> ‘admin’ -> ‘passwd’ to achieve this (for Admin PIN case). - Please be careful to change Admin PIN first and User PIN second! Otherwise the admin-less mode got activated, see `this instructions `__ for further information. - * Optionally Reset code can be set up (`guide `__). The minimum length accepted is 8 characters, however it should be as long as User PIN. - * KDF-DO allows for a shorter PIN of 8 characters minimum, by executing part of the calculations on the PC. - -**Firmware version 1.2.5 or below: In case you forget a PIN or enter it -wrongly three times you need the reset code to unblock the PIN. -Otherwise the device wouldn’t be usable anymore! Therefore -please** `set the reset -code `__ **as -well when initialising the key!** - -Your Nitrokey is now ready to use. - -Key Creation with OpenPGP or S/MIME -################################### - -There are two widely used standards for email -encryption. While OpenPGP/GnuPG is popular among individuals, -S/MIME/x.509 is mostly used by enterprises. If you are in doubt which -one to choose, you should use OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. - -Please note that the Nitrokey App can not be used for this device! diff --git a/source/components/start/windows/multiple-identities.rst b/source/components/start/windows/multiple-identities.rst deleted file mode 100644 index 46ed8387d4..0000000000 --- a/source/components/start/windows/multiple-identities.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../multiple-identities.rst.inc diff --git a/source/components/start/windows/openpgp-keygen-backup.rst b/source/components/start/windows/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/start/windows/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/start/windows/openpgp-keygen-gpa.rst b/source/components/start/windows/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/start/windows/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/start/windows/openpgp-keygen-on-device.rst b/source/components/start/windows/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/start/windows/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/start/windows/openpgp-outlook.rst b/source/components/start/windows/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/start/windows/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/start/windows/openpgp-thunderbird.rst b/source/components/start/windows/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/start/windows/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/start/windows/openpgp.rst b/source/components/start/windows/openpgp.rst deleted file mode 100644 index fb8b25042e..0000000000 --- a/source/components/start/windows/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp.rst.inc diff --git a/source/components/start/windows/putty.rst b/source/components/start/windows/putty.rst deleted file mode 100644 index 6f0427a82f..0000000000 --- a/source/components/start/windows/putty.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/putty.rst.inc diff --git a/source/components/start/windows/setting-kdf-do.rst b/source/components/start/windows/setting-kdf-do.rst deleted file mode 100644 index f9ff6236c0..0000000000 --- a/source/components/start/windows/setting-kdf-do.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../setting-kdf-do.rst.inc diff --git a/source/components/start/windows/smime-outlook.rst b/source/components/start/windows/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/start/windows/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/start/windows/smime-thunderbird.rst b/source/components/start/windows/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/start/windows/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/start/windows/smime.rst b/source/components/start/windows/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/start/windows/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/storage/hidden.rst b/source/components/storage/hidden.rst deleted file mode 100644 index 40b9a952e6..0000000000 --- a/source/components/storage/hidden.rst +++ /dev/null @@ -1,42 +0,0 @@ -Hidden Volumes -============== - -Hidden volumes allow hiding data inside of the encrypted volume. This data is protected by an additional passphrase. Without the passphrase, it is impossible to know whether hidden volumes are present. -They are not configured with a default password so that their existence can be `denied plausibly `__. -The concept is similar to `VeraCrypt's/TrueCrypt's hidden volume `__ but with Nitrokey Storage the entire functionality of hidden volumes is implemented in hardware. - -You can configure up to four hidden volumes. Once unlocked, hidden volumes behave like ordinary storage where you can create various partitions, filesystems and store files as you like. - -.. warning:: - If you chose to use hidden volumes, you must not write any data to the encrypted volume, or you risk loosing data in the hidden volume. - -.. note:: - Hidden volumes are hidden within the free space of the encrypted volume, which will be overwritten when writing data to the encrypted volume. - There are no mechanisms to prevent accidental overwritting of hidden data, as they would reveal the existence of hidden volumes. - Data written to the encrypted volume before the creation of the hidden volume can still be read. - -.. figure:: /components/storage/images/hidden-schema.svg - :alt: Hidden volume description. The hidden volumes are within the free space of the encrypted volume. - - -Configuring hidden volumes --------------------------- - -.. tip:: - Copy some files to the encrypted volume prior to creating the hidden volume. - -.. note:: - Using a journaling filesystem may risk overwriting the hidden data. The encrypted filesystem is formated to FAT32 by default, and it is recommended to leave it that way when using hidden volumes. - - -1. Unlock the encrypted volume using the Nitrokey App. -2. In the menu, select "setup hidden volume". - - .. figure:: /components/storage/images/setup_hidden_volume.png - :alt: menu containing the hidden volume setup utility. - -3. Enter a strong passphrase twice. Unlike the encrypted volume PIN, there are no limit to the number of attempts at opening hidden volumes, so the strength of the passphrase is extremely important. -4. Define the storage area to be used. Hidden volumes are stored in the free areas of the encrypted volume. When creating multiple hidden volume, you need to allocate a part of the free area for each volume, making sure they do not overlap. - - .. figure:: /components/storage/images/hidden-storage-passphrase.png - :alt: Hidden volume dialog box diff --git a/source/components/storage/index.rst b/source/components/storage/index.rst deleted file mode 100644 index ce3f0ab978..0000000000 --- a/source/components/storage/index.rst +++ /dev/null @@ -1,23 +0,0 @@ -Nitrokey Storage 2 -================== - -.. contents:: :local: - -First check the: - -.. toctree:: - :maxdepth: 1 - :glob: - - Frequently Asked Questions - -or choose your operating system: - -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - \ No newline at end of file diff --git a/source/components/storage/linux/2fa-google.rst b/source/components/storage/linux/2fa-google.rst deleted file mode 100644 index 3a1e74fcc1..0000000000 --- a/source/components/storage/linux/2fa-google.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-google.rst.inc diff --git a/source/components/storage/linux/2fa-nextcloud.rst b/source/components/storage/linux/2fa-nextcloud.rst deleted file mode 100644 index fe77d2b27e..0000000000 --- a/source/components/storage/linux/2fa-nextcloud.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-nextcloud.rst.inc diff --git a/source/components/storage/linux/2fa-odoo.rst b/source/components/storage/linux/2fa-odoo.rst deleted file mode 100644 index dc5f45a3f0..0000000000 --- a/source/components/storage/linux/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-odoo.rst.inc diff --git a/source/components/storage/linux/automatic-screen-lock.rst b/source/components/storage/linux/automatic-screen-lock.rst deleted file mode 100644 index d8f8332ad1..0000000000 --- a/source/components/storage/linux/automatic-screen-lock.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/linux/automatic-screen-lock.rst diff --git a/source/components/storage/linux/certificate-authority.rst b/source/components/storage/linux/certificate-authority.rst deleted file mode 100644 index a0e4791b50..0000000000 --- a/source/components/storage/linux/certificate-authority.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../hsm/certificate-authority.rst.inc diff --git a/source/components/storage/linux/change-pins.rst b/source/components/storage/linux/change-pins.rst deleted file mode 100644 index c14cd241e1..0000000000 --- a/source/components/storage/linux/change-pins.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/change-pins.rst.inc diff --git a/source/components/storage/linux/disk-encryption-luks.rst b/source/components/storage/linux/disk-encryption-luks.rst deleted file mode 100644 index ae24b6874d..0000000000 --- a/source/components/storage/linux/disk-encryption-luks.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/linux/disk-encryption-luks.rst diff --git a/source/components/storage/linux/ecc.rst b/source/components/storage/linux/ecc.rst deleted file mode 100644 index f9d9992dca..0000000000 --- a/source/components/storage/linux/ecc.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/ecc.rst.inc diff --git a/source/components/storage/linux/encrypted-mobile-storage.rst b/source/components/storage/linux/encrypted-mobile-storage.rst deleted file mode 100644 index cc9287dae7..0000000000 --- a/source/components/storage/linux/encrypted-mobile-storage.rst +++ /dev/null @@ -1,4 +0,0 @@ -Encrypted Mobile Storage -======================== - -.. include:: ../encrypted-mobile-storage.rst diff --git a/source/components/storage/linux/factory-reset.rst b/source/components/storage/linux/factory-reset.rst deleted file mode 100644 index 1fadfcfeee..0000000000 --- a/source/components/storage/linux/factory-reset.rst +++ /dev/null @@ -1,4 +0,0 @@ -Factory Reset -============= - -.. include:: ../factory-reset.rst diff --git a/source/components/storage/linux/firmware-update-manually.rst b/source/components/storage/linux/firmware-update-manually.rst deleted file mode 100644 index 1f0848f0f0..0000000000 --- a/source/components/storage/linux/firmware-update-manually.rst +++ /dev/null @@ -1,4 +0,0 @@ -Activate Update Mode Manually -============================= - -.. include:: ../firmware-update-manually.rst diff --git a/source/components/storage/linux/firmware-update.rst b/source/components/storage/linux/firmware-update.rst deleted file mode 100644 index e15da85569..0000000000 --- a/source/components/storage/linux/firmware-update.rst +++ /dev/null @@ -1,42 +0,0 @@ -Firmware Update -=============== - -.. contents:: :local: - -.. warning:: - - You should backup all data from the device before upgrading, as - firmware upgrades may destroy all data on the device (especially - coming from firmware version <0.45)! - -.. important:: - Never disconnect the Nitrokey Start or abort the process while updating, - this will likely render your device useless - - -1. Download the `Nitrokey App `__ and the program “dfu-programmer” which should be available through your package-manager, e.g. ``apt-get update && apt-get install dfu-programmer`` on Debian-based systems. - -2. Download the latest firmware ".hex" file from `here `__ and store it as "firmware.hex" in your home folder. Older releases are `here `__. - -3. Right click on the icon of the Nitrokey App and go to “Configure” -> “Enable Firmware Update”. The default firmware password is ‘12345678’. - - .. figure:: /components/storage/images/enable-firmware-update.png - :alt: Enable firmware update - - .. note:: - - The Nitrokey Storage is not detected by Nitrokey App anymore once update mode got - activated. You have to proceed with the instructions described below - to make it work again. - - -4. Open a terminal and execute: - - .. code-block:: bash - - sudo dfu-programmer at32uc3a3256s erase - sudo dfu-programmer at32uc3a3256s flash --suppress-bootloader-mem firmware.hex - sudo dfu-programmer at32uc3a3256s launch - # versions <0.7 of dfu-programmer use "start" instead of "launch" - - whereas “firmware.hex” needs to be the path and file name of the firmware which you downloaded in step 2. diff --git a/source/components/storage/linux/gpa.rst b/source/components/storage/linux/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/storage/linux/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/storage/linux/hard-disk-encryption.rst b/source/components/storage/linux/hard-disk-encryption.rst deleted file mode 100644 index 95e1694368..0000000000 --- a/source/components/storage/linux/hard-disk-encryption.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/linux/hard-disk-encryption.rst diff --git a/source/components/storage/linux/hidden.rst b/source/components/storage/linux/hidden.rst deleted file mode 100644 index 67076af055..0000000000 --- a/source/components/storage/linux/hidden.rst +++ /dev/null @@ -1,15 +0,0 @@ -.. include:: ../hidden.rst - -Using hidden volumes --------------------- - -1. Unlock the encrypted volume. - -2. Select "unlock hidden volume" and enter any of the hidden volume's passwords. - -3. If this is the first time you unlock the hidden volume, you may need to create a partition on the hidden volume. You will need to open a partition manager such as `GParted `__ and create one or more partitions manually. Make sure to create the partitions on the device that appeared when unlocking the hidden volume. - -.. figure:: ./images/hidden-storage-partition.png - :alt: Hidden volume partitioning - -4. Make sure to unmount/eject all partitions on the hidden volumes before locking or disconnecting the Nitrokey. diff --git a/source/components/storage/linux/index.rst b/source/components/storage/linux/index.rst deleted file mode 100644 index 3b93b376a3..0000000000 --- a/source/components/storage/linux/index.rst +++ /dev/null @@ -1,49 +0,0 @@ -Nitrokey Storage, Linux -======================= - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. To access the OpenPGP smart card of the Nitrokey, install the package - libccid. On Debian/Ubuntu based Distributions type in terminal: *sudo - apt-get update && sudo apt-get install libccid* - -2. Download and start the `Nitrokey - App `__. - -3. Open the About window from Nitrokey App’s menu and check if you have - the `latest - firmware `__ - installed. If it’s not the latest, please - `update `_. - -4. Use the Nitrokey App to change the default User PIN (default: 123456) - and Admin PIN (default: 12345678) to your own choices. - -Your Nitrokey is now ready to use. - -.. note:: - - For many use cases described, it is necessary to have either OpenPGP - or S/MIME keys installed on the device (see below). - -Key Creation with OpenPGP or S/MIME ------------------------------------ - -There are two widely used standards for email encryption. While -OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used -by enterprises. If you are in doubt which one to choose, you should use -OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. - diff --git a/source/components/storage/linux/ipsec.rst b/source/components/storage/linux/ipsec.rst deleted file mode 100644 index cfc9264144..0000000000 --- a/source/components/storage/linux/ipsec.rst +++ /dev/null @@ -1,4 +0,0 @@ -IPsec -===== - -.. include:: ../../hsm/ipsec.rst.inc diff --git a/source/components/storage/linux/login-with-pam.rst b/source/components/storage/linux/login-with-pam.rst deleted file mode 100644 index 1975c28e82..0000000000 --- a/source/components/storage/linux/login-with-pam.rst +++ /dev/null @@ -1,4 +0,0 @@ -Login With PAM -=========================== - -.. include:: ../../pro/login-with-pam.rst.inc diff --git a/source/components/storage/linux/openpgp-keygen-backup.rst b/source/components/storage/linux/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/storage/linux/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/storage/linux/openpgp-keygen-gpa.rst b/source/components/storage/linux/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/storage/linux/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/storage/linux/openpgp-keygen-on-device.rst b/source/components/storage/linux/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/storage/linux/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/storage/linux/openpgp-outlook.rst b/source/components/storage/linux/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/storage/linux/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/storage/linux/openpgp-thunderbird.rst b/source/components/storage/linux/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/storage/linux/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/storage/linux/openpgp.rst b/source/components/storage/linux/openpgp.rst deleted file mode 100644 index fb8b25042e..0000000000 --- a/source/components/storage/linux/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp.rst.inc diff --git a/source/components/storage/linux/openvpn-easyrsa.rst b/source/components/storage/linux/openvpn-easyrsa.rst deleted file mode 100644 index f8412c4186..0000000000 --- a/source/components/storage/linux/openvpn-easyrsa.rst +++ /dev/null @@ -1,678 +0,0 @@ -OpenVPN Configuration with Easy-RSA -=================================== - -.. contents:: :local: - :depth: 2 - -.. note:: - - This guide is work-in-progress, and will be updated accordinlgy. Please take this status into consideration. - -This guide shows how to configure OpenVPN clients to login using a `Nitrokey Pro -2 `__ or a `Nitrokey Storage -2 `__. For software key management we will be using `Easy-RSA `__, a utility that has been evolving alongside OpenVPN. - -To sign the certificates, we will use a `Nitrokey HSM -2 `__ set up as `Certificate Authority <../../hsm/linux/certificate-authority.html#creating-the-intermediate-certificate-authority>`_, however this guide does not cover the set up of the CA itself (it is clear and `well documented here <../../hsm/linux/certificate-authority.html#sign-a-server-certificate>`_). - -We will use Easy-RSA, because it seems to provide some flexibility, and allows key management via external PKIs. We will use it on the server to issue the signing request, and repeat the same process on the client. The Certificate Signing Requests will be signed by the CA on the Nitorkey HSM, and re-transmitted to the server and the client. - - -Prerequisites -------------- - -In the following documentation we will require 3 different machines as following: - -- OpenVPN server (v. 2.5) on Debian 10 (EC2 virtual machine - AWS) - -- OpenVPN client (v. 2.4.9) on Fedora 30 (local machine) - -- The Certificate Authority will be accessible from a standalone - machine with Fedora 30 (local machine) - -To interact with the devices we will require `OpenSC -0.20 `__ installed on the client and CA machine (the local machines). You can follow the instructions to set it up in `this link (*Unix) `__. - -To download the dependencies on Fedora machines we can this instruction: - -.. code-block:: bash - - su -c 'dnf install readline-devel openssl-devel libxslt docbook-style-xsl pcsc-lite-devel automake autoconf libtool gcc zlib-devel' - -For Debian Linux, more recent OpenSC packages are available `here `__. - -We will use the following Nitrokeys for physical key management: - -- An authentication key using the `Nitrokey Pro 2 - (pdf) `__ - -- A Certificate Authority (CA) using the `Nitrokey HSM 2 - (pdf) `__ - -As a reminder, to build a Certificate Authority on Nitrokey HSM 2, you may follow the instructions available `in the documentation `_. - -Alternatively you may set up your own CA on a `on a separate machine `__, or use the OpenVPN tutorial which also relies on `Easy-RSA `__. The last 2 options rely on software solutions for key management. - -Server side ------------ - -Install OpenVPN -^^^^^^^^^^^^^^^ - -1. First we need to enable IP Forwarding by editing ``/etc/sysctl.conf`` file - - .. code-block:: bash - - $ editor /etc/sysctl.conf - -2. Uncomment or edit accordingly the following line - - .. code-block:: bash - - net.ipv4.ip_forward=1 - -3. Close after saving it, and enter this command - - .. code-block:: bash - - $ sysctl -p - - Once IP forwarding is done, we will need to download the latest release of OpenvPN for our Debian 10 server, according to `these instructions `__: - -4. Change to root and download the GPG key that signed the package - - .. code-block:: bash - - $ sudo -s - # wget -O - https://swupdate.openvpn.net/repos/repo-public.gpg|apt-key add - - -5. Add the URL of the adequate OpenVPN packages to the ``sources.list`` file - - .. code-block:: bash - - # echo "deb http://build.openvpn.net/debian/openvpn/release/2.5 buster main" > /etc/apt/sources.list.d/openvpn-aptrepo.list - # exit - - We downloaded OpenVPN 2.5 as “password prompt” requires at least OpenVPN `version - 2.4.8 `__ to login. - -6. Next we download OpenVPN - - .. code-block:: bash - - $ sudo apt install openvpn - - If you want to check the version, it possible by calling ``--version`` - and print the following: - - .. rstcheck: ignore-next-code-block - .. code-block:: bash - - $ sudo openvpn --version - OpenVPN 2.5_beta3 x86_64-pc-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Sep 1 2020 - library versions: OpenSSL 1.1.1d 10 Sep 2019, LZO 2.10 - Originally developed by James Yonan - Copyright (C) 2002-2018 OpenVPN Inc - Compile time defines: enable_async_push=no enable_comp_stub=no enable_crypto_ofb_cfb=yes enable_debug=yes enable_def_auth=yes enable_dependency_tracking=no \ enable_dlopen=unknown enable_dlopen_self=unknown enable_dlopen_self_static=unknown enable_fast_install=needless enable_fragment=yes enable_iproute2=yes \ enable_libtool_lock=yes enable_lz4=yes enable_lzo=yes enable_maintainer_mode=no enable_management=yes enable_multihome=yes enable_pam_dlopen=no enable_pedantic=no \ enable_pf=yes enable_pkcs11=yes enable_plugin_auth_pam=yes enable_plugin_down_root=yes enable_plugins=yes enable_port_share=yes enable_selinux=no \ enable_shared=yes enable_shared_with_static_runtimes=no enable_silent_rules=no enable_small=no enable_static=yes enable_strict=no enable_strict_options=no \ enable_systemd=yes enable_werror=no enable_win32_dll=yes enable_x509_alt_username=yes with_aix_soname=aix with_crypto_library=openssl with_gnu_ld=yes \ with_mem_check=no with_sysroot=no - -Install Easy-RSA -^^^^^^^^^^^^^^^^ - -To build the PKI, we will download the latest version of Easy-RSA on the server and client machines. To get the latest release, go to the `Releases page on the official EasyRSA GitHub project `__, copy the download link for the file ending in ``.tgz``, and then paste it into the following command: - -1. Download the latest release - - .. code-block:: bash - - $ cd ~ - wget -P ~/ https://github.com/OpenVPN/easy-rsa/releases/download/v3.0.7/EasyRSA-3.0.7.tgz - -2. Extract the tarball - - .. code-block:: bash - - $ cd ~ - $ tar xvf EasyRSA-3.0.7.tgz - $ mv EasyRSA-3.0.7/ easyrsa/ # rename folder - -Create a PKI for OpenVPN server -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -Before you can create your OpenVPN server’s private key and certificate, you need to create a local Public Key Infrastructure directory on your OpenVPN server. You will use this directory to manage the server and clients’ certificate requests, instead of making them directly on your CA server. - -To build a PKI directory on your OpenVPN server, you’ll need to populate a file called ``vars`` with some default values. - -1. Create a ``vars`` file - - .. code-block:: bash - - $ touch ~/easyrsa/vars - $ cd easyrsa/ - $ editor vars - -2. Once the file is opened, paste in the following two lines - - .. code-block:: bash - - set_var EASYRSA_ALGO "ec" - set_var EASYRSA_DIGEST "sha512" - - These are the only two lines that you need in this ``vars`` file on your OpenVPN server since it will not be used as a Certificate Authority. - They will ensure that your private keys and certificate requests are configured to use Elliptic Curve Cryptography (ECC) to generate keys, and secure signatures for your clients and OpenVPN server. - - In regards to the choice of the cryptographic algorithms, I follow the model in `this tutorial `__, and you can customize these according to your specific needs. - -3. Initialize the PKI - - Once you have populated the ``vars`` file you can proceed with creating the PKI directory. - To do so, run the easyrsa script with the init-pki option: - - .. code-block:: bash - - $ ./easyrsa init-pki - -After you’ve initialized your PKI on the OpenVPN server, you are ready to move on to the next step, which is creating an OpenVPN server certificate request and private key. - -Create ``server.req`` and ``server.key`` -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -Now that your OpenVPN server has all the prerequisites installed, the next step is to generate a key pair composed of a private key (to keep secret), and a Certificate Signing Request (``.csr``) on your OpenVPN server. - -In general terms, on systems where we generate a key and request, these files are left unencrypted by using the ``nopass`` argument, since servers usually need to start up without any password input. This generates an *unencrypted key*, so mind *protect its access and file permissions* carefully. - -.. tip:: - - Configuration notes from OpenVPN: - - 1. The server, and each client, must have their own cert and key - file. The server and all clients will use the same CA file. - 2. Server certificate should have the following: - - - ``keyUsage: digitalSignature, keyEncipherment`` - - - ``extendedKeyUsage: serverAuth`` - -1. Create the signing request for the server - - Navigate to the ``~/easyrsa`` directory on your OpenVPN Server as your non-root user, and enter the following commands: - - .. code-block:: bash - - $ cd easyrsa/ - $ ./easyrsa gen-req server nopass - - This will create a private key for the server and a certificate request file called ``server.req``. - - Once you have a signed certificate, you’ll transfer it back to the OpenVPN server. - -2. Copy the key to the OpenVPN server directory - - .. code-block:: bash - - $ sudo cp /home/admin/EasyRSA/pki/private/server.key /etc/openvpn/server/ - - After completing these steps, you have successfully created a private key for your OpenVPN server. You have also generated a Certificate Signing Request for the OpenVPN server. - - .. tip:: - - File extensions for certificate signing requests - - The file extension that is adopted by the CA and HSM tutorial - indicates the creation of a ``.csr`` file, however Easy-RSA creates - certificate signing requests with a ``.req`` extension. - - We will use interchangeably both extensions, while making sure that - we transfer the right files to the Certificate Authority, and - generate a final certificate with a ``.crt`` extension. - -In the next section of this guide, we will sign a ``.req`` file with our CA on deployed on the HSM 2 device. For this purpose, I will use a dedicated machine to sign the requests. - -Sign and retrieve ``server.crt`` -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -The following instructions require the transfer of the ``server.req`` -(or ``server.csr``) file to the CA system. - -The transfer itself is not security sensitive, though it is wise to verify if the received file matches the sender’s copy, if the transport is untrusted. - -In order to go through these steps, I will extensively rely on `these instructions `_, to sign the certificate signing requests, once we generated them with Easy-RSA. - -Sign the ``server.req`` file -'''''''''''''''''''''''''''' - -On the local machine dedicated to access the HSM, we will use the tools provided by Opensc 0.20 in order to sign the ``.req`` file, and send it back to the OpenVPN server. We assume we have transferred the file from the server machine to the CA machine. - -First we start by plugging the HSM Nitrokey, and enter this instruction for listing the keys available. - -1. Query the list of available devices - - .. code-block:: bash - - $ p11tool --list-all - - **(Required step)** If this is the first time you sign a certificate with the CA, you might want to retrieve the URI of the CA’s private key from the HSM, and include it in the config file. - - - The key’s URI should be in this format: - - .. code-block:: bash - - pkcs11:model=PKCS%2315%20emulated;manufacturer=www.CardContact.de;serial=DENK0104068;token=SmartCard-HSM%20%28UserPIN%29%00%00%00%00%00%00%00%00%00;id=%E0%16%1C%C8%B6%F5%D6%6A%C6%83%5E%CD%EC%B6%23%FC%05%06%A6%75;object=root;type=private - -2. Create ``openvpn/`` directory under ``certificate-authority/`` - - .. code-block:: bash - - $ mkdir/opt/certificate-authority/ - $ cd /opt/certificate-authority/ - -3. Sign the ``server.req`` - - .. code-block:: bash - - $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -days 375 -notext -md sha512 -create_serial -in server.req -out /home/user/pki/issued/server.crt - -Retrieve the ``server.crt`` file to the server machine -'''''''''''''''''''''''''''''''''''''''''''''''''''''' - -1. Transfer the signed certificates to the server - - From the CA machine, copy the files ``server.crt`` and ``chain.crt`` to the OpenVPN server. In this example we will use the ``scp`` command as following: - - .. code-block:: bash - - $ scp openvpn/{server.crt,chain.crt} admin@your_openvpnserver_ip:/tmp - -2. Place the certificates on the server’s directory - - .. code-block:: bash - - $ mv /tmp/{server.crt,chain.crt} /etc/openvpn/server - - .. warning:: - - CA Certificate and ``chain.crt`` - - In the above, the CA returns the signed sever certificate, and - includes the CA certificate ``CA.crt`` which is the ``chain.crt`` - file. This can be done over an insecure channel, though the client is - encouraged to confirm if the received ``chain.crt`` is valid, if the - transport is untrusted. - - It is possible to rename the file ``chain.crt`` file to ``CA.crt`` on - the target machine, however we will use ``chain.crt`` in the next - instructions. - -Configure the OpenVPN server -^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -A connection that uses TLS requires multiple `certificates and keys for authentication `__. Now that we issued and signed those, we can place them in the right directories. The breakdown of the certificates and keys that must be located at the root directory are the following: - -- The root certificate file (CA.crt or chain.crt in our setup) -- Server certificate -- Server key -- Diffie Hellman Parameters (optional) - -On your OpenVPN server, now you can create the configuration file ``server.conf`` with your favorite text editor. The file can be configured according to your needs, while we make sure to change the server certificate and key sections according the names you chose for the your the files we signed: - -.. code-block:: bash - - # OpenVPN Server Certificate - CA, server key and certificate - ca chain.crt - cert server.crt - key server.key - -Here is the configuration file we can use for testing these instructions: - -.. code-block:: bash - - port 1194 - proto udp - dev tun - ca ca.crt - cert server.crt - key server.key # This file should be kept secret - dh dh.pem - server 10.8.0.0 255.255.255.0 - push "redirect-gateway def1 bypass-dhcp" - push "dhcp-option DNS 208.67.222.222" - push "dhcp-option DNS 208.67.220.220" - keepalive 10 120 - tls-auth ta.key 0 # This file is secret - cipher AES-256-CBC - user nobody - group nogroup - persist-key - persist-tun - status /var/log/openvpn/openvpn-status.log - log /var/log/openvpn/openvpn.log - log-append /var/log/openvpn/openvpn.log - verb 3 - explicit-exit-notify 1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - -To test if the configuration functions properly, we can use this command: - -.. code-block:: bash - - $ sudo openvpn --server --config server.conf - -Start the OpenVPN service on the server -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -Enable the OpenVPN service by adding it to systemctl, and start it using these commands: - -.. code-block:: bash - - $ sudo systemctl -f enable openvpn@server - $ sudo systemctl start openvpn@server - -To Double check if the OpenVPN service is active use this command: - -.. code-block:: bash - - $ sudo systemctl status openvpn@server - -The OpenVPN should be running at this point. - -Client side configuration -------------------------- - -Install OpenVPN and Easy-RSA -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -1. Install the software - - We can use directly ``dnf install`` to install OpenVPN 2.4.9 and Easy-RSA 3.0.7 - - .. code-block:: bash - - $ sudo dnf install openvpn easy-rsa - -2. Then we create as non-root a directory for Easy RSA called ``Easy-RSA`` - - .. code-block:: bash - - $ mkdir ~/easyrsa - -3. And link it to the Easy RSA package we just installed - - .. code-block:: bash - - $ ln -s /usr/share/easy-rsa/3/* ~/easyrsa/ - -Create a PKI for the OpenVPN client -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -In the same manner we created a PKI on the OpenVPN server, we will create a PKI using Easy-RSA on the client side. - -Create a ``client.req`` and ``client.key`` -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -In the same manner we issued the key pair on the sever, we generate a key pair for the client which will be composed of the ``client.req`` -file and the ``client.key`` file. The latter must be kept secret on the client machine. - -Sign ``client.req`` and issue the ``client.crt`` file -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -To transfer the ``client.req`` file to the CA machine, we will use the same method as we did for the ``server.req`` file. - -Once transferred, on the CA machine we sign the certificate signing request file with this command - -.. code-block:: bash - - $ openssl ca -config sign_server_csrs.ini -engine pkcs11 -keyform engine -days 375 -notext -md sha512 -create_serial -in client.req -out /home/user/pki/issued/client.crt - -Import ``client.crt`` on the Nitrokey from the CA machine -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -After creating the ``client.crt`` file, we plug the Nitrokey Pro 2 device in the CA machine, and import the ``.crt`` to the Pro 2 device using this command: - -.. code-block:: bash - - $ pkcs15-init --store-certificate client.crt --id 3 - -You can see if the key is effectively stored on the Nitrokey using this command: - -.. code-block:: bash - - $ pkcs15-tool -c - -Or alternatively - -.. code-block:: bash - - $ pkcs11-tool --list-objects - -Fore more commands you can refer to the `OpenSC wiki `__. - -Retrieve the ``chain.crt`` file from the CA machine -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -While we keep the ``client.crt``\ stored on the nitrokey Pro 2 device, we must retrieve the ``chain.crt`` file on the client machine, and store it in the adequate directory. We may use ``scp`` as in the method explained in the server section of this guide. - -Configure the client to interact with the Nitrokey -^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^ - -Now back on the client machine, we will plug the Nitrokey Pro and use it to establish the VPN connection with the server. In general terms, a connection that uses TLS requires multiple certificates and keys for authentication: - -- The root certificate file (`chain.crt`) -- Client certificate -- Client key - -For this guide we can the following ``client.conf`` file, and add the required options to it accordingly: - -.. code-block:: bash - - client - dev tun - proto udp - remote 1194 - resolv-retry infinite - nobind - user nobody - group nobody - persist-key - persist-tun - ca ca.crt - remote-cert-tls server - cipher AES-256-CBC - verb 3 - redirect-gateway def1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - -1. Determine the correct object - - Each PKCS#11 provider can support multiple devices. In order to view the available object list you can use the following command: - - .. code-block:: bash - - $ openvpn --show-pkcs11-ids /usr/lib64/pkcs11/opensc-pkcs11.so - - The following objects are available for use. - Each object shown below may be used as parameter to - - --pkcs11-id option please remember to use single quote mark. - - Certificate - DN: CN=client - Serial: E53DA75C5B8F1518F520BCEF0128C09F - Serialized id: pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03 - - Each certificate/private key pair have unique ``Serialized id`` string. The serialized id string of the requested certificate should be specified, in the configuration file. We can do this by adding the ``pkcs11-id`` option using single quote marks. - - .. code-block:: bash - - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - -2. Add retrieved Serialized ID to the configuration file - - Using your favorite text editor, open the server.conf file, and add the following lines, while taking care to insert your own ``Serialized id``: - - .. code-block:: bash - - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - - For additional `settings related to OpenVPN `__ authentication, you may also add few lines to handle key maganagement, although it is optional. - - .. note:: - - Click to view the code - - .. code-block:: bash - - # nitrokey config - - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - # pkcs11-pin-cache 300 - # daemon - # auth-retry nointeract - # management-hold - # management-signal - # management 127.0.0.1 8888 - # management-query-passwords - pkcs11-cert-private 1 # Prompt for PIN - - Optional step - - - If you need to test the configuration, with and without the token on the Nitrokey, you may add lines to the same ``client.conf`` and comment/uncomment the relevant lines according to your needs: - - .. note:: - - Click to view the code - - .. code-block:: bash - - # non_nitrokey login - - # cert client.crt - # key client.key - # tls-auth ta.key 1 - -3. Configure the OpenVPN client - - The final configuration file ``client.conf`` should look like this one: - - .. code-block:: bash - - client - dev tun - proto udp - remote 1194 - resolv-retry infinite - nobind - user nobody - group nobody - persist-key - persist-tun - ca ca.crt - remote-cert-tls server - cipher AES-256-CBC - verb 3 - redirect-gateway def1 - tls-version-min 1.2 # Lower boundary for TLS version - tls-version-max 1.2 # Higher boundary for TLS version - - # nitrokey login - - pkcs11-providers /usr/lib64/pkcs11/opensc-pkcs11.so - pkcs11-id 'pkcs11:model=pkcs11:model=PKCS%NNNN%20emulated;token=User%20PIN%20%28OpenPGP%20card%29;manufacturer=ZeitControl;serial=000NNNNNN;id=%03' - # pkcs11-pin-cache 300 - # daemon - # auth-retry nointeract - # management-hold - # management-signal - # management 127.0.0.1 8888 - # management-query-passwords - pkcs11-cert-private 1 # Prompt for PIN - - # OR - - # non_nitrokey login - - # cert client.crt - # key client.key - # tls-auth ta.key 1 - -4. Known issues - - There are some known issues related to OpenVPN login with OpenSC. Please consult these issues `here `__. - -Start the OpenVPN client -^^^^^^^^^^^^^^^^^^^^^^^^ - -1. Start the OpenVPN service on the client - - Enable the OpenVPN service, and start it using these commands: - - .. code-block:: bash - - $ sudo systemctl -f enable openvpn-server@server.service - $ sudo systemctl start openvpn-server@server.service - - To double check if the OpenVPN service is active use this command: - - .. code-block:: bash - - $ sudo systemctl status openvpn-server@server.service - -2. Enter your User PIN - - When executing OpenVPN client, Nitrokey’s PIN needs to be entered: - - .. rstcheck: ignore-next-code-block - .. code-block:: bash - - $ sudo openvpn --client --config client.conf - Fri Sep 11 17:42:01 2020 OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2020 - Fri Sep 11 17:42:01 2020 library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.08 - Fri Sep 11 17:42:01 2020 PKCS#11: Adding PKCS#11 provider '/usr/lib64/pkcs11/opensc-pkcs11.so' - Enter User PIN (OpenPGP card) token Password: ****** - - .. warning:: - - Unfortunately OpenVPN doesn’t seem to be able to establish a handshake and stops at an error as reported `here `__, `here `__ and `here `__ - - .. rstcheck: ignore-next-code-block - .. code-block:: bash - - This is what the error output looks like: - - $ sudo openvpn --client --config client.conf - Fri Sep 11 17:42:01 2020 OpenVPN 2.4.9 x86_64-redhat-linux-gnu [SSL (OpenSSL)] [LZO] [LZ4] [EPOLL] [PKCS11] [MH/PKTINFO] [AEAD] built on Apr 24 2020 - Fri Sep 11 17:42:01 2020 library versions: OpenSSL 1.1.1g FIPS 21 Apr 2020, LZO 2.08 - Fri Sep 11 17:42:01 2020 PKCS#11: Adding PKCS#11 provider '/usr/lib64/pkcs11/opensc-pkcs11.so' - Enter User PIN (OpenPGP card) token Password: ******`` - Fri Sep 11 17:42:12 2020 TCP/UDP: Preserving recently used remote address: [AF_INET]18.157.180.240:1194`` - Fri Sep 11 17:42:12 2020 Socket Buffers: R=[212992->212992] S=[212992->212992]`` - Fri Sep 11 17:42:12 2020 UDP link local: (not bound) - Fri Sep 11 17:42:12 2020 UDP link remote: [AF_INET]18.157.180.240:1194 - Fri Sep 11 17:42:12 2020 NOTE: UID/GID downgrade will be delayed because of --client, --pull, or --up-delay - Fri Sep 11 17:42:12 2020 TLS: Initial packet from [AF_INET]18.157.180.240:1194, sid=d79690cf 9e38ce89 - Fri Sep 11 17:42:12 2020 VERIFY OK: depth=1, CN=server_CA - Fri Sep 11 17:42:12 2020 VERIFY KU OK - Fri Sep 11 17:42:12 2020 Validating certificate extended key usage - Fri Sep 11 17:42:12 2020 ++ Certificate has EKU (str) TLS Web Server Authentication, expects TLS Web Server Authentication - Fri Sep 11 17:42:12 2020 VERIFY EKU OK - Fri Sep 11 17:42:12 2020 VERIFY OK: depth=0, CN=server - Fri Sep 11 17:42:12 2020 OpenSSL: error:141F0006:SSL routines:tls_construct_cert_verify:EVP lib - Fri Sep 11 17:42:12 2020 TLS_ERROR: BIO read tls_read_plaintext error - Fri Sep 11 17:42:12 2020 TLS Error: TLS object -> incoming plaintext read error - Fri Sep 11 17:42:12 2020 TLS Error: TLS handshake failed - Fri Sep 11 17:42:12 2020 SIGUSR1[soft,tls-error] received, process restarting - Fri Sep 11 17:42:12 2020 Restart pause, 5 second(s) - - In some reported cases it does not prompt for a PIN on the terminal. One workaround would be to use to use this command to login with the PIN: - - .. rstcheck: ignore-next-code-block - .. code-block:: bash - - $ telnet 8888 password 'User PIN (OpenPGP card) token' - - Alternatively, you could `recompile OpenVPN `__ client with systemd support disabled, and it will prompt you for the PIN as expected. - - Another option, would be to login to your OpenVPN instance with the Viscosity client which provides a better user experience especially for entering the PIN. diff --git a/source/components/storage/linux/otp.rst b/source/components/storage/linux/otp.rst deleted file mode 100644 index 3954bcb99d..0000000000 --- a/source/components/storage/linux/otp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/otp.rst.inc diff --git a/source/components/storage/linux/smime-outlook.rst b/source/components/storage/linux/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/storage/linux/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/storage/linux/smime-thunderbird.rst b/source/components/storage/linux/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/storage/linux/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/storage/linux/smime.rst b/source/components/storage/linux/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/storage/linux/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/storage/linux/ssh.rst b/source/components/storage/linux/ssh.rst deleted file mode 100644 index 792071f9a1..0000000000 --- a/source/components/storage/linux/ssh.rst +++ /dev/null @@ -1,4 +0,0 @@ -SSH For Server Administration -============================= - -.. include:: ../../pro/ssh.rst diff --git a/source/components/storage/linux/stunnel.rst b/source/components/storage/linux/stunnel.rst deleted file mode 100644 index 94a9982dac..0000000000 --- a/source/components/storage/linux/stunnel.rst +++ /dev/null @@ -1,4 +0,0 @@ -Stunnel -======= - -.. include:: ../../hsm/stunnel.rst.inc diff --git a/source/components/storage/mac/2fa-google.rst b/source/components/storage/mac/2fa-google.rst deleted file mode 100644 index 3a1e74fcc1..0000000000 --- a/source/components/storage/mac/2fa-google.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-google.rst.inc diff --git a/source/components/storage/mac/2fa-nextcloud.rst b/source/components/storage/mac/2fa-nextcloud.rst deleted file mode 100644 index fe77d2b27e..0000000000 --- a/source/components/storage/mac/2fa-nextcloud.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-nextcloud.rst.inc diff --git a/source/components/storage/mac/2fa-odoo.rst b/source/components/storage/mac/2fa-odoo.rst deleted file mode 100644 index dc5f45a3f0..0000000000 --- a/source/components/storage/mac/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-odoo.rst.inc diff --git a/source/components/storage/mac/change-pins.rst b/source/components/storage/mac/change-pins.rst deleted file mode 100644 index c14cd241e1..0000000000 --- a/source/components/storage/mac/change-pins.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/change-pins.rst.inc diff --git a/source/components/storage/mac/ecc.rst b/source/components/storage/mac/ecc.rst deleted file mode 100644 index f9d9992dca..0000000000 --- a/source/components/storage/mac/ecc.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/ecc.rst.inc diff --git a/source/components/storage/mac/eidauthenticate.rst b/source/components/storage/mac/eidauthenticate.rst deleted file mode 100644 index 62f3a2a39f..0000000000 --- a/source/components/storage/mac/eidauthenticate.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/eidauthenticate.rst.inc diff --git a/source/components/storage/mac/encrypted-mobile-storage.rst b/source/components/storage/mac/encrypted-mobile-storage.rst deleted file mode 100644 index cc9287dae7..0000000000 --- a/source/components/storage/mac/encrypted-mobile-storage.rst +++ /dev/null @@ -1,4 +0,0 @@ -Encrypted Mobile Storage -======================== - -.. include:: ../encrypted-mobile-storage.rst diff --git a/source/components/storage/mac/factory-reset.rst b/source/components/storage/mac/factory-reset.rst deleted file mode 100644 index 1fadfcfeee..0000000000 --- a/source/components/storage/mac/factory-reset.rst +++ /dev/null @@ -1,4 +0,0 @@ -Factory Reset -============= - -.. include:: ../factory-reset.rst diff --git a/source/components/storage/mac/firmware-update-manually.rst b/source/components/storage/mac/firmware-update-manually.rst deleted file mode 100644 index 1f0848f0f0..0000000000 --- a/source/components/storage/mac/firmware-update-manually.rst +++ /dev/null @@ -1,4 +0,0 @@ -Activate Update Mode Manually -============================= - -.. include:: ../firmware-update-manually.rst diff --git a/source/components/storage/mac/firmware-update.rst b/source/components/storage/mac/firmware-update.rst deleted file mode 100644 index 8b81a9fdee..0000000000 --- a/source/components/storage/mac/firmware-update.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../..//storage/windows/firmware-update.rst diff --git a/source/components/storage/mac/gpa.rst b/source/components/storage/mac/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/storage/mac/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/storage/mac/hard-disk-encryption.rst b/source/components/storage/mac/hard-disk-encryption.rst deleted file mode 100644 index e095906781..0000000000 --- a/source/components/storage/mac/hard-disk-encryption.rst +++ /dev/null @@ -1,4 +0,0 @@ -Hard Disk Encryption -=========================== - -.. include:: ../../pro/hard-disk-encryption.rst.inc diff --git a/source/components/storage/mac/hidden.rst b/source/components/storage/mac/hidden.rst deleted file mode 100644 index f1403d6f8d..0000000000 --- a/source/components/storage/mac/hidden.rst +++ /dev/null @@ -1,12 +0,0 @@ -.. include:: ../hidden.rst - -Using hidden volumes --------------------- - -1. Unlock the encrypted volume. - -2. Select "unlock hidden volume" and enter any of the hidden volume's passwords. - -3. If this is the first time you unlock the hidden volume, you may need to create a partition on the hidden volume. You will need to use `Disk Utility `__. Make sure to create the partitions on the device that appeared when unlocking the hidden volume. - -4. Make sure to unmount/eject all partitions on the hidden volumes before locking or disconnecting the Nitrokey. diff --git a/source/components/storage/mac/index.rst b/source/components/storage/mac/index.rst deleted file mode 100644 index 28c1764d1c..0000000000 --- a/source/components/storage/mac/index.rst +++ /dev/null @@ -1,52 +0,0 @@ -Nitrokey Storage, Mac -===================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Important: Once you plug in the Nitrokey, your computer will start - the Keyboard Setup Assistant. **Don’t run through this assistant but - exit it right away.** -2. Download and start the `Nitrokey - App `__. Perhaps you want to store - it on the unencrypted partition of your Nitrokey Storage -3. Open the About window from Nitrokey App’s menu and check if you have - the `latest - firmware `__ - installed. If it’s not the latest, please - `update `_. -4. Use the Nitrokey App to change the default User PIN (default: 123456) - and Admin PIN (default: 12345678) to your own choices. - -Your Nitrokey is now ready to use. - -.. note:: - - - For some Versions of MacOS it is necessary to install custom `ccid - driver `__ - (for information see - `here `__), - but in general MacOS should have the driver onboard. - - - For many use cases described, it is necessary to have either - OpenPGP or S/MIME keys installed on the device (see below). - -Key Creation with OpenPGP or S/MIME ------------------------------------ - -There are two widely used standards for email encryption. While -OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used -by enterprises. If you are in doubt which one to choose, you should use -OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. diff --git a/source/components/storage/mac/openpgp-keygen-backup.rst b/source/components/storage/mac/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/storage/mac/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/storage/mac/openpgp-keygen-gpa.rst b/source/components/storage/mac/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/storage/mac/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/storage/mac/openpgp-keygen-on-device.rst b/source/components/storage/mac/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/storage/mac/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/storage/mac/openpgp-outlook.rst b/source/components/storage/mac/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/storage/mac/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/storage/mac/openpgp-thunderbird.rst b/source/components/storage/mac/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/storage/mac/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/storage/mac/openpgp.rst b/source/components/storage/mac/openpgp.rst deleted file mode 100644 index fb8b25042e..0000000000 --- a/source/components/storage/mac/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp.rst.inc diff --git a/source/components/storage/mac/otp.rst b/source/components/storage/mac/otp.rst deleted file mode 100644 index 3954bcb99d..0000000000 --- a/source/components/storage/mac/otp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/otp.rst.inc diff --git a/source/components/storage/mac/smime-outlook.rst b/source/components/storage/mac/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/storage/mac/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/storage/mac/smime-thunderbird.rst b/source/components/storage/mac/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/storage/mac/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/storage/mac/smime.rst b/source/components/storage/mac/smime.rst deleted file mode 100644 index 5029a3135c..0000000000 --- a/source/components/storage/mac/smime.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime.rst.inc diff --git a/source/components/storage/windows/2fa-google.rst b/source/components/storage/windows/2fa-google.rst deleted file mode 100644 index 7f4cefa9cc..0000000000 --- a/source/components/storage/windows/2fa-google.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../..//pro/2fa-google.rst.inc diff --git a/source/components/storage/windows/2fa-microsoft.rst b/source/components/storage/windows/2fa-microsoft.rst deleted file mode 100644 index ecf3051bc4..0000000000 --- a/source/components/storage/windows/2fa-microsoft.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: /components/pro/windows/2fa-microsoft.rst diff --git a/source/components/storage/windows/2fa-nextcloud.rst b/source/components/storage/windows/2fa-nextcloud.rst deleted file mode 100644 index fe77d2b27e..0000000000 --- a/source/components/storage/windows/2fa-nextcloud.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-nextcloud.rst.inc diff --git a/source/components/storage/windows/2fa-odoo.rst b/source/components/storage/windows/2fa-odoo.rst deleted file mode 100644 index dc5f45a3f0..0000000000 --- a/source/components/storage/windows/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/2fa-odoo.rst.inc diff --git a/source/components/storage/windows/change-pins.rst b/source/components/storage/windows/change-pins.rst deleted file mode 100644 index c14cd241e1..0000000000 --- a/source/components/storage/windows/change-pins.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/change-pins.rst.inc diff --git a/source/components/storage/windows/ecc.rst b/source/components/storage/windows/ecc.rst deleted file mode 100644 index f9d9992dca..0000000000 --- a/source/components/storage/windows/ecc.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/ecc.rst.inc diff --git a/source/components/storage/windows/eidauthenticate.rst b/source/components/storage/windows/eidauthenticate.rst deleted file mode 100644 index 62f3a2a39f..0000000000 --- a/source/components/storage/windows/eidauthenticate.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/eidauthenticate.rst.inc diff --git a/source/components/storage/windows/encrypted-mobile-storage.rst b/source/components/storage/windows/encrypted-mobile-storage.rst deleted file mode 100644 index cc9287dae7..0000000000 --- a/source/components/storage/windows/encrypted-mobile-storage.rst +++ /dev/null @@ -1,4 +0,0 @@ -Encrypted Mobile Storage -======================== - -.. include:: ../encrypted-mobile-storage.rst diff --git a/source/components/storage/windows/factory-reset.rst b/source/components/storage/windows/factory-reset.rst deleted file mode 100644 index 1fadfcfeee..0000000000 --- a/source/components/storage/windows/factory-reset.rst +++ /dev/null @@ -1,4 +0,0 @@ -Factory Reset -============= - -.. include:: ../factory-reset.rst diff --git a/source/components/storage/windows/firmware-update-manually.rst b/source/components/storage/windows/firmware-update-manually.rst deleted file mode 100644 index 1f0848f0f0..0000000000 --- a/source/components/storage/windows/firmware-update-manually.rst +++ /dev/null @@ -1,4 +0,0 @@ -Activate Update Mode Manually -============================= - -.. include:: ../firmware-update-manually.rst diff --git a/source/components/storage/windows/firmware-update.rst b/source/components/storage/windows/firmware-update.rst deleted file mode 100644 index 73d4fbc991..0000000000 --- a/source/components/storage/windows/firmware-update.rst +++ /dev/null @@ -1,44 +0,0 @@ -Firmware Update -=============== - -.. contents:: :local: - -.. warning:: - - You should backup all data from the device before upgrading, as - firmware upgrades may destroy all data on the device (especially - coming from firmware version <0.45)! - -.. important:: - Never disconnect the Nitrokey Start or abort the process while updating, - this will likely render your device useless - - -1. Download the `Nitrokey App `__ and the `Nitrokey Update Tool `__. The Nitrokey Update Tool is currently available for macOS and Windows only. - -2. Download the latest firmware ".hex" file from `here `__. Older releases are `here `__. - -3. Right click on the icon of the Nitrokey App and go to “Configure” -> “Enable Firmware Update”. The default firmware password is ‘12345678’. - - .. figure:: /components/storage/images/enable-firmware-update.png - :alt: Enable firmware update - - .. note:: - - The Nitrokey Storage is not detected by Nitrokey App anymore once update mode got - activated. You have to proceed with the instructions described below - to make it work again. - - .. note:: - - If you are using Microsoft Windows Build 1809 and Nitrokey Storage - Firmware 0.52 or lower, you need to use another system or if this is not - feasible use `these - instructions `_ to - enable the Firmware Update mode. - -4. Start the Nitrokey Update Tool and click “Select firmware file”. Select the previously downloaded firmware ".hex" file. Click on “Update firmware” to start the update process. Your device should get detected by the Nitrokey App again as soon as the update is finished. - - .. figure:: /components/storage/windows/images/nitrokey-update-tool.png - :alt: Nitrokey Update Tool - diff --git a/source/components/storage/windows/gpa.rst b/source/components/storage/windows/gpa.rst deleted file mode 100644 index 398ae468bc..0000000000 --- a/source/components/storage/windows/gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/gpa.rst diff --git a/source/components/storage/windows/hard-disk-encryption.rst b/source/components/storage/windows/hard-disk-encryption.rst deleted file mode 100644 index 7a15e069ec..0000000000 --- a/source/components/storage/windows/hard-disk-encryption.rst +++ /dev/null @@ -1,4 +0,0 @@ -Hard Disk Encryption -=========================== - -.. include:: ../../pro/hard-disk-encryption.rst.inc diff --git a/source/components/storage/windows/hidden.rst b/source/components/storage/windows/hidden.rst deleted file mode 100644 index 8dad5732e6..0000000000 --- a/source/components/storage/windows/hidden.rst +++ /dev/null @@ -1,19 +0,0 @@ -.. include:: ../hidden.rst - -Using hidden volumes --------------------- - -1. Unlock the encrypted volume. - -2. Select "unlock hidden volume" and enter any of the hidden volume's passwords. - -3. If this is the first time you unlock the hidden volume, you may need to create a partition on the hidden volume. In this case, Windows will prompt you to do so. You can then format the hidden volume using FAT32, for compatibility with most operating systems. - - -.. figure:: ./images/format-dialog.png - :alt: Windows formating prompt - -.. figure:: ./images/format-tool.png - :alt: Windows formating tool - -4. Make sure to unmount/eject all partitions on the hidden volumes before locking or disconnecting the Nitrokey. diff --git a/source/components/storage/windows/index.rst b/source/components/storage/windows/index.rst deleted file mode 100644 index 4e973c3959..0000000000 --- a/source/components/storage/windows/index.rst +++ /dev/null @@ -1,46 +0,0 @@ -Nitrokey Storage, Windows -========================= - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -1. Connect your Nitrokey to your computer and confirm all dialogs so that the USB smart card device driver gets installed almost automatically. - - .. note:: - - Windows may fail to install an additional device driver for the smart card. Its safe to ignore this warning. - -2. Download and start the `Nitrokey App `__. Perhaps you want to store it on the unencrypted partition of your Nitrokey Storage. There won’t open a window, but an icon appears in the system tray (see screenshot below). Please right-click on this icon to use all the options of the App. - - .. figure:: ./images/Windows10-Systemtray.png - :alt: img1 - - -3. Open the About window from Nitrokey App’s menu and check if you have the `latest firmware `__ installed. If it’s not the latest, please - `update `_. - -4. Use the Nitrokey App to change the default User PIN (default: 123456) - and Admin PIN (default: 12345678) to your own choices. - -Your Nitrokey is now ready to use. - -.. note:: - - For many use cases described, it is necessary to have either OpenPGP or S/MIME keys installed on the device (see below). - -Key Creation with OpenPGP or S/MIME ------------------------------------ - -There are two widely used standards for email encryption. While OpenPGP/GnuPG is popular among individuals, S/MIME/x.509 is mostly used by enterprises. If you are in doubt which one to choose, you should use OpenPGP. - -To learn more about how to use OpenPGP for email encryption with the Nitrokey, -please refer to chapter `OpenPGP Email Encryption `_. - -To learn more about how to use S/MIME for email encryption with the Nitrokey, -please refer to chapter `S/MIME Email Encryption `_. diff --git a/source/components/storage/windows/openpgp-csp.rst b/source/components/storage/windows/openpgp-csp.rst deleted file mode 100644 index 947e69d379..0000000000 --- a/source/components/storage/windows/openpgp-csp.rst +++ /dev/null @@ -1,2 +0,0 @@ -.. include:: ../../pro/windows/openpgp-csp.rst - diff --git a/source/components/storage/windows/openpgp-keygen-backup.rst b/source/components/storage/windows/openpgp-keygen-backup.rst deleted file mode 100644 index b4528e0139..0000000000 --- a/source/components/storage/windows/openpgp-keygen-backup.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-backup.rst.inc diff --git a/source/components/storage/windows/openpgp-keygen-gpa.rst b/source/components/storage/windows/openpgp-keygen-gpa.rst deleted file mode 100644 index 472d298006..0000000000 --- a/source/components/storage/windows/openpgp-keygen-gpa.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-gpa.rst.inc diff --git a/source/components/storage/windows/openpgp-keygen-on-device.rst b/source/components/storage/windows/openpgp-keygen-on-device.rst deleted file mode 100644 index fc90850b8e..0000000000 --- a/source/components/storage/windows/openpgp-keygen-on-device.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-keygen-on-device.rst.inc diff --git a/source/components/storage/windows/openpgp-outlook.rst b/source/components/storage/windows/openpgp-outlook.rst deleted file mode 100644 index fa4e7dd855..0000000000 --- a/source/components/storage/windows/openpgp-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-outlook.rst.inc diff --git a/source/components/storage/windows/openpgp-thunderbird.rst b/source/components/storage/windows/openpgp-thunderbird.rst deleted file mode 100644 index 59e0956c63..0000000000 --- a/source/components/storage/windows/openpgp-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp-thunderbird.rst.inc diff --git a/source/components/storage/windows/openpgp.rst b/source/components/storage/windows/openpgp.rst deleted file mode 100644 index fb8b25042e..0000000000 --- a/source/components/storage/windows/openpgp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/openpgp.rst.inc diff --git a/source/components/storage/windows/otp.rst b/source/components/storage/windows/otp.rst deleted file mode 100644 index 3954bcb99d..0000000000 --- a/source/components/storage/windows/otp.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/otp.rst.inc diff --git a/source/components/storage/windows/putty.rst b/source/components/storage/windows/putty.rst deleted file mode 100644 index 6f0427a82f..0000000000 --- a/source/components/storage/windows/putty.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/putty.rst.inc diff --git a/source/components/storage/windows/smart-policy.rst b/source/components/storage/windows/smart-policy.rst deleted file mode 100644 index 7f85805135..0000000000 --- a/source/components/storage/windows/smart-policy.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smart-policy.rst.inc diff --git a/source/components/storage/windows/smime-outlook.rst b/source/components/storage/windows/smime-outlook.rst deleted file mode 100644 index acd45a24a9..0000000000 --- a/source/components/storage/windows/smime-outlook.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-outlook.rst.inc diff --git a/source/components/storage/windows/smime-thunderbird.rst b/source/components/storage/windows/smime-thunderbird.rst deleted file mode 100644 index 4ae43d43ba..0000000000 --- a/source/components/storage/windows/smime-thunderbird.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../pro/smime-thunderbird.rst.inc diff --git a/source/components/storage/windows/smime.rst b/source/components/storage/windows/smime.rst deleted file mode 100644 index cd746658c8..0000000000 --- a/source/components/storage/windows/smime.rst +++ /dev/null @@ -1,9 +0,0 @@ -.. include:: ../../pro/smime.rst.inc - :end-line: 20 - -.. note:: - Windows users with 64-bit system (standard) need to install both, the 32-bit and the 64-bit version of OpenSC! - -.. include:: ../../pro/smime.rst.inc - :start-line: 20 - diff --git a/source/components/u2f/index.rst b/source/components/u2f/index.rst deleted file mode 100644 index 6e856a75bf..0000000000 --- a/source/components/u2f/index.rst +++ /dev/null @@ -1,15 +0,0 @@ -Nitrokey FIDO U2F -================= - -.. contents:: :local: - -Choose your operating system: - -.. toctree:: - :maxdepth: 1 - :glob: - - Windows - macOS - Linux - diff --git a/source/components/u2f/linux/2fa-nextcloud.rst b/source/components/u2f/linux/2fa-nextcloud.rst deleted file mode 100644 index eed3ad9899..0000000000 --- a/source/components/u2f/linux/2fa-nextcloud.rst +++ /dev/null @@ -1,4 +0,0 @@ -Two-Factor Authentication And Passwordless Login For Nextcloud Accounts -======================================================================= - -.. include:: ../../fido2/2fa-nextcloud.rst diff --git a/source/components/u2f/linux/2fa-odoo.rst b/source/components/u2f/linux/2fa-odoo.rst deleted file mode 100644 index 5bf7237e31..0000000000 --- a/source/components/u2f/linux/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../fido2/2fa-odoo.rst.inc diff --git a/source/components/u2f/linux/desktop-login.rst b/source/components/u2f/linux/desktop-login.rst deleted file mode 100644 index 3cf97f3894..0000000000 --- a/source/components/u2f/linux/desktop-login.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../fido2/linux/desktop-login.rst \ No newline at end of file diff --git a/source/components/u2f/linux/index.rst b/source/components/u2f/linux/index.rst deleted file mode 100644 index f89717d489..0000000000 --- a/source/components/u2f/linux/index.rst +++ /dev/null @@ -1,27 +0,0 @@ -Nitrokey FIDO U2F With Linux -============================ - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/index-content1.rst - -Troubleshooting ---------------- - -- If the Nitrokey is not accepted immediately, you may need to copy - this file - `41-nitrokey.rules `__ - to ``etc/udev/rules.d/``. In very rare cases, the system will need - the `older - version `__ - of this file. - -- After copying the file, restart udev via - ``sudo service udev restart``. diff --git a/source/components/u2f/mac/2fa-nextcloud.rst b/source/components/u2f/mac/2fa-nextcloud.rst deleted file mode 100644 index eed3ad9899..0000000000 --- a/source/components/u2f/mac/2fa-nextcloud.rst +++ /dev/null @@ -1,4 +0,0 @@ -Two-Factor Authentication And Passwordless Login For Nextcloud Accounts -======================================================================= - -.. include:: ../../fido2/2fa-nextcloud.rst diff --git a/source/components/u2f/mac/2fa-odoo.rst b/source/components/u2f/mac/2fa-odoo.rst deleted file mode 100644 index 5bf7237e31..0000000000 --- a/source/components/u2f/mac/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../fido2/2fa-odoo.rst.inc diff --git a/source/components/u2f/mac/index.rst b/source/components/u2f/mac/index.rst deleted file mode 100644 index 826477b989..0000000000 --- a/source/components/u2f/mac/index.rst +++ /dev/null @@ -1,13 +0,0 @@ -Nitrokey FIDO U2F With macOS -============================ - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -.. include:: ../shared/index-content1.rst diff --git a/source/components/u2f/shared/index-content1.rst b/source/components/u2f/shared/index-content1.rst deleted file mode 100644 index 5e9088f110..0000000000 --- a/source/components/u2f/shared/index-content1.rst +++ /dev/null @@ -1,25 +0,0 @@ -The Nitrokey FIDO U2F supports **two-factor authentication (2FA)**. With -two-factor authentication (2FA), the Nitrokey FIDO U2F is checked in -addition to the password. - -The Nitrokey FIDO U2F can be used with any current browser. - -Two-Factor Authentication (2FA) -------------------------------- - -1. Open one of the `websites that support FIDO - U2F `__. -2. Log in to the website and enable two-factor authentication in your - account settings. (In most cases you will find a link to the - documentation of the supported web service at - `dongleauth.com `__.) -3. Register your Nitrokey FIDO U2F in the account settings by touching - the button to activate the Nitrokey FIDO U2F. After you have - successfully configured the device, you must activate the Nitrokey - FIDO U2F this way each time you log in. - -You are now ready to go. - -.. important:: - - The Nitrokey App can not be used for the Nitrokey FIDO U2F. diff --git a/source/components/u2f/windows/2fa-nextcloud.rst b/source/components/u2f/windows/2fa-nextcloud.rst deleted file mode 100644 index eed3ad9899..0000000000 --- a/source/components/u2f/windows/2fa-nextcloud.rst +++ /dev/null @@ -1,4 +0,0 @@ -Two-Factor Authentication And Passwordless Login For Nextcloud Accounts -======================================================================= - -.. include:: ../../fido2/2fa-nextcloud.rst diff --git a/source/components/u2f/windows/2fa-odoo.rst b/source/components/u2f/windows/2fa-odoo.rst deleted file mode 100644 index 5bf7237e31..0000000000 --- a/source/components/u2f/windows/2fa-odoo.rst +++ /dev/null @@ -1 +0,0 @@ -.. include:: ../../fido2/2fa-odoo.rst.inc diff --git a/source/components/u2f/windows/index.rst b/source/components/u2f/windows/index.rst deleted file mode 100644 index 534a0c8720..0000000000 --- a/source/components/u2f/windows/index.rst +++ /dev/null @@ -1,16 +0,0 @@ -Nitrokey FIDO U2F With Windows -============================== - -.. contents:: :local: - -.. toctree:: - :maxdepth: 1 - :glob: - :hidden: - - * - -The first time you plug in the Nitrokey FIDO U2F Windows may need some -time to configure the device. - -.. include:: ../shared/index-content1.rst diff --git a/source/index.rst b/source/index.rst index 0bcc4b25a3..e8a5188530 100644 --- a/source/index.rst +++ b/source/index.rst @@ -5,14 +5,7 @@ Nitrokey Documentation :maxdepth: 1 :titlesonly: - components/nitrokey3/index - components/nkpk/index - components/fido2/index - components/u2f/index - components/hsm/index - components/pro/index - components/start/index - components/storage/index + components/nitrokeys/index components/nitropad/index components/nitropc/index components/nitrophone/index From be2ff06292017147c5e1187c96194cff4e2dd21f Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Mon, 11 Nov 2024 13:12:13 +0100 Subject: [PATCH 2/7] openpgp-card: fix change-pins image locations --- .../nitrokeys/features/openpgp-card/change-pins.rst | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/source/components/nitrokeys/features/openpgp-card/change-pins.rst b/source/components/nitrokeys/features/openpgp-card/change-pins.rst index bf3126d3b0..5b949f65e3 100644 --- a/source/components/nitrokeys/features/openpgp-card/change-pins.rst +++ b/source/components/nitrokeys/features/openpgp-card/change-pins.rst @@ -36,7 +36,7 @@ The user PIN is at least 6-digits long and is used to get access to the content You can change the user PIN with the Nitrokey App if using a Nitrokey Pro or Nitrokey Storage. In the `Nitrokey `__ App open ‘Menu -> Configure -> Change User PIN’ to open the dialog to change the PIN. -.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/1.png +.. figure:: /components/nitrokeys/features/openpgp-card/images/change-pins/1.png :alt: img1 @@ -45,7 +45,7 @@ You can change the User PIN in the dialog window now. The user PIN can have up to 20 digits and other characters (e.g. alphabetic and special characters). But as the user PIN is blocked as soon three wrong PIN attempts were done, it is sufficiently secure to only have a 6 digits PIN. The default PIN is 123456. -.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/2.png +.. figure:: /components/nitrokeys/features/openpgp-card/images/change-pins/2.png :alt: img2 @@ -58,7 +58,7 @@ The admin PIN is at least 8-digits long and is used to change contents/settings You can change the admin PIN with the Nitrokey App if using a Nitrokey Pro or Nitrokey Storage. In the `Nitrokey App `__ open ‘Menu -> Configure -> Change Admin PIN’ to open the dialog to change the PIN. -.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/3.png +.. figure:: /components/nitrokeys/features/openpgp-card/images/change-pins/3.png :alt: img3 @@ -67,7 +67,7 @@ You can change the admin PIN in the dialog window now. The admin PIN can have up to 20 digits and other characters (e.g. alphabetic and special characters). But as the admin PIN is blocked as soon three wrong PIN attempts were done, it is sufficiently secure to only have 8 digits PIN. The default PIN is 12345678. -.. figure:: /nitrokeys/features/openpgp-card/images/change-pins/4.png +.. figure:: /components/nitrokeys/features/openpgp-card/images/change-pins/4.png :alt: img4 From 1cdeb3e406487c4508731d551e8386ea78baf73c Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Mon, 11 Nov 2024 13:31:20 +0100 Subject: [PATCH 3/7] fix more paths --- .../software/nitropy/all-platforms/installation.rst | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/source/components/software/nitropy/all-platforms/installation.rst b/source/components/software/nitropy/all-platforms/installation.rst index 7a60638186..bde528ddbd 100644 --- a/source/components/software/nitropy/all-platforms/installation.rst +++ b/source/components/software/nitropy/all-platforms/installation.rst @@ -135,6 +135,6 @@ Next Steps You can find more information on using nitropy in these guides: -- For Linux: :doc:`../../../nitrokey3/linux/firmware-update` -- For Mac: :doc:`../../../nitrokey3/mac/firmware-update` -- For Windows: :doc:`../../../nitrokey3/windows/firmware-update` +- For Linux: :doc:`../../../nitrokeys/nitrokey3/firmware-update` +- For Mac: :doc:`../../../nitrokeys/nitrokey3/firmware-update` +- For Windows: :doc:`../../../nitrokeys/nitrokey3/firmware-update` From c86e88b0a316530615dfb3813e7ff8d3c1b68af5 Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Mon, 11 Nov 2024 13:40:43 +0100 Subject: [PATCH 4/7] #314: features/u2f remove pro2 from compatibility --- source/components/nitrokeys/features/u2f/index.rst | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/source/components/nitrokeys/features/u2f/index.rst b/source/components/nitrokeys/features/u2f/index.rst index 921cd6159c..b225612369 100644 --- a/source/components/nitrokeys/features/u2f/index.rst +++ b/source/components/nitrokeys/features/u2f/index.rst @@ -21,7 +21,7 @@ U2F - ✓ - ✓ - ⨯ - - ✓ + - ⨯ - ⨯ - ✓ .. section products-end @@ -31,4 +31,4 @@ U2F Desktop Login (Linux only) Odoo Login - Two Factor Authentication <2fa> \ No newline at end of file + Two Factor Authentication <2fa> From fa24c6efa54485c6cf44abf719b153e3d7f3c4f6 Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Mon, 11 Nov 2024 14:01:30 +0100 Subject: [PATCH 5/7] #314: remove reference to update.nitrokey.com --- source/components/nitrokeys/features/fido2/website.rst | 5 ----- 1 file changed, 5 deletions(-) diff --git a/source/components/nitrokeys/features/fido2/website.rst b/source/components/nitrokeys/features/fido2/website.rst index a35f009d74..0e4deda8fa 100644 --- a/source/components/nitrokeys/features/fido2/website.rst +++ b/source/components/nitrokeys/features/fido2/website.rst @@ -23,11 +23,6 @@ The Nitrokey FIDO2 can be used with any current browser. The Nitrokey App can not be used for the Nitrokey FIDO2. -.. tip:: - - `Check online `__ if your Nitrokey - FIDO2 has the latest firmware installed. - Passwordless Authentication --------------------------- From 85ca818821738a12318ce68713d4c32c64abcce2 Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Mon, 11 Nov 2024 14:06:06 +0100 Subject: [PATCH 6/7] #314: update totp to also list nk3 and add a note to use nk-app2 --- source/components/nitrokeys/features/totp/general.rst | 3 +++ source/components/nitrokeys/features/totp/index.rst | 4 ++-- 2 files changed, 5 insertions(+), 2 deletions(-) diff --git a/source/components/nitrokeys/features/totp/general.rst b/source/components/nitrokeys/features/totp/general.rst index 83f83da1e3..20b5941557 100644 --- a/source/components/nitrokeys/features/totp/general.rst +++ b/source/components/nitrokeys/features/totp/general.rst @@ -9,6 +9,9 @@ Two-factor Authentication with One-Time Passwords (OTP) The use of One-time Passwords (OTP) is called very differently on the various services supporting it. Sometimes it is referred to as Multi-factor Authentication (MFA), sometimes it is Two-factor Authentication (2FA) or just “authentication via authenticator app” like Google Authenticator. Most of these services are compatible for usage with the Nitrokey Pro and Nitrokey Storage. The following instructions show how to enable OTP on our `support forum `__. The procedure is quite similar on most services. For a list of websites supporting OTP have a look at `dongleauth.com `__. +.. note:: + For the Nitrokey 3 the Nitrokey App 2 has to be used to set up TOTP. See :doc:`../../../software/nk-app2/index`. + You need to have the `Nitrokey App `__ installed to use the OTP feature of the Nitrokey Pro and Nitrokey Storage. Configure a Website/Application to Use OTP diff --git a/source/components/nitrokeys/features/totp/index.rst b/source/components/nitrokeys/features/totp/index.rst index 4e053eed01..c70a65aec6 100644 --- a/source/components/nitrokeys/features/totp/index.rst +++ b/source/components/nitrokeys/features/totp/index.rst @@ -16,7 +16,7 @@ Two-factor Authentication with One-Time Passwords (OTP) - `Nitrokey Start `_ - `Nitrokey Storage 2 `_ - * - ⨯ + * - ✓ - ⨯ - ⨯ - ⨯ @@ -32,4 +32,4 @@ Two-factor Authentication with One-Time Passwords (OTP) General Instructions Microsoft Google - Nextcloud \ No newline at end of file + Nextcloud From 57f1a6044c51d9f02eaed46e514e69a680e3ff56 Mon Sep 17 00:00:00 2001 From: Markus Meissner Date: Mon, 11 Nov 2024 14:14:04 +0100 Subject: [PATCH 7/7] #314: move adsk to nks/features --- .../{nitrokey3 => features/openpgp-card}/adsk.rst | 11 ++++++++--- .../nitrokeys/features/openpgp-card/index.rst | 4 +++- source/components/nitrokeys/nitrokey3/index.rst | 1 - 3 files changed, 11 insertions(+), 5 deletions(-) rename source/components/nitrokeys/{nitrokey3 => features/openpgp-card}/adsk.rst (97%) diff --git a/source/components/nitrokeys/nitrokey3/adsk.rst b/source/components/nitrokeys/features/openpgp-card/adsk.rst similarity index 97% rename from source/components/nitrokeys/nitrokey3/adsk.rst rename to source/components/nitrokeys/features/openpgp-card/adsk.rst index 73e9131ec0..700cfb80b5 100644 --- a/source/components/nitrokeys/nitrokey3/adsk.rst +++ b/source/components/nitrokeys/features/openpgp-card/adsk.rst @@ -1,6 +1,11 @@ Additional Decryption Subkeys (ADSK) with GnuPG =============================================== +.. include:: index.rst + :start-after: products-begin + :end-before: products-end + + .. contents:: :local: `Additional Decryption Subkeys (ADSK) `__ can be used to automatically add recipients when encrypting a message with GnuPG. @@ -27,9 +32,9 @@ Preparing the Keys Follow one of these guides to generate the two keys: -- :doc:`../features/openpgp-card/openpgp-keygen-backup` -- :doc:`../features/openpgp-card/openpgp-keygen-on-device` -- :doc:`../features/openpgp-card/openpgp-keygen-gpa` +- :doc:`openpgp-keygen-backup` +- :doc:`openpgp-keygen-on-device` +- :doc:`openpgp-keygen-gpa` Make sure that you can list both keys with ``gpg --list-keys``, for example:: diff --git a/source/components/nitrokeys/features/openpgp-card/index.rst b/source/components/nitrokeys/features/openpgp-card/index.rst index 11b1e142c0..49379782db 100644 --- a/source/components/nitrokeys/features/openpgp-card/index.rst +++ b/source/components/nitrokeys/features/openpgp-card/index.rst @@ -50,4 +50,6 @@ OpenPGP Card EID Certificate-authority GnuPG with Fedora - Change Pins \ No newline at end of file + Change Pins + Additional Decryption Subkeys (ADSK) with GnuPG + diff --git a/source/components/nitrokeys/nitrokey3/index.rst b/source/components/nitrokeys/nitrokey3/index.rst index 3011f84f17..5aefa4d5c0 100644 --- a/source/components/nitrokeys/nitrokey3/index.rst +++ b/source/components/nitrokeys/nitrokey3/index.rst @@ -24,7 +24,6 @@ and the product guides: nitropy Reset Troubleshooting - Additional Decryption Subkeys (ADSK) with GnuPG or check out the features: