As a last resort you could install docker from apt, build an image from a distro has rar in its arm repos, then run containers ephemerallly, mounting your work dir into the container where rar runs. Try the suggested methods of getting a binary first. 😅
<span style="color:#323232;">docker run --rm -v /your/work/dir:/destination/in/container your_image rar ...
</span>
Haha. Definitely last resort. Having learned what a pain rar is due to its propriety nature, I’m going to see if they care if I convert them to tar or zip first.
I use my Yubikeys all the time in OpenSUSE Tumbleweed and Linux Mint - a Yubikey 5 NFC and a Yubikey 5C NFC (mostly with Firefox). I have never had any problems with them. Mint is Ubuntu-based so they ought to work in Ubuntu. Sorry I can’t advise you on why yours isn’t working, but it should definitely be possible to get it working.
Tumbleweed user here. Thinking of buying a yubikey; is it easy to setup for logins etc or does it involve terminal commands etc. I mean is there a repository app?
There’s an appimage for their manager app there. You might also try using Distrobox to give yourself access to a distro that uses apt, and then add Yubico’s PPA and install the software from there. I don’t know whether it would work but in principle it should.
Random shot, because it’s probably not an issue on Mint like it was on Arch a few months ago, but xdg-desktop-portal problems can cause apps to take forever to load, but run fine once loaded.
Portal basically is an interface/backend for flatpaks to interface with toolkits & DEs. If you don’t use flatpak, xdg-desktop-portal and associated backends should be removable. Even if you do, try removing the gtk and gnome backends w/apt. Hopefully it won’t try to remove a ton of stuff due to dependencies. Then, reboot and see if the slow loading problem goes away. If it does, you can try re-adding one or the other and see if it comes back.
Does logging in take forever as well?
Also after some cursory research, some people have had problems with portal on Mint after updates as well, just like on Arch. So… definitely try it.
wait hold on this is very likely holy shit, check my most recent post. the issue i have only impacts flatpaks. hold on what command do i run exactly and how dangerous is this. also tysm
this is a comment on my new post: it took 30 seconds but this got outputted and then the file ran: dave@dog: ~$ flatpak run org.x.Warpinator Gtx-Message: 14:29:03.389: Failed to load module “xapp-gtk3-module” Using landlock for incoming file isolation
I used to use one without any issues, it wasn’t the 5 series but it had NFC. The worst part was setting up to use it as an ssh key. Just normal 2FA with it worked straight out of the box (firefox/arch). Is that what you’re trying to do?
I am curious about this as I’ve never heard of it however for this use case I’m looking for as mainstream as possible so it’s least likely to break in a way nobody’s seen before
Are you talking about 2FA login for your own user account or U2F/PIV/WebAuthn in your browser? The latter seems to work out of the box on any non-snap or flatpak browser, but the former needs a bit more setup as that is not a standard feature in Ubuntu yet. I recommend using ykman and yubico-piv-tool for configuring yubikeys in linux, but Yubico also provides a GUI application on their website
Definitely the latter. I have only tried using the Flatpak version of Firefox, but the system won’t even detect the key so it’s no shock Firefox can’t either…
It works fine straight out of the box. If you need the totp codes, personalization, setting it up download the yubikey apps (probably in your apt repo or check documentation)
Are you on the open source drivers or in the official ones? You should be using the open source as they are better in this case.
I have the impression it has to do with your monitor as well, could it be some HDR functionality? Try opening the OSD of your monitor and check if something changes when on the application
yubikey works on every linux distro I have tried, and even on freebsd. Some people say it “works out of the box” but that part is not true on every distro. Every distro will recognize the device when it is plugged in, but not every distro will all 2FA actions out of the box, and almost no distro comes with the management tools.
On linux (and BSD) you can install a CCID tool to get the 2FA, which installs software that needs to be running (you can use the yubikey as a keyboard approach if you really need it) On Linux you can install a manager tool like ykman is easy, if you want to manage the tooling on your card On Linux you can setup PAM (authentication) so that yubikey can be used for logins, sudo auth etc On Linux you can use yubikey to do advanced things like manage the encryption keys for encrypted disks
I appreciate the detailed response. I looked at the Arch wiki page and ensured that I have all packages listed. Still, the output of ykman info is “Error: No YubiKey detected!” :P
I do not get any messages. I’m starting to think there is an issue with my motherboard’s USB-C port. If I can get my hands on a USB-C to USB-A adapter, I can test this theory…
I did some weird stuff with a custom Hue CLI Module for my lab. It’s a fun little, fairly kludgey example of something you could spin up super easily.
In Haskell (much of the time), they say if it compiles it ships! It’s a lazily-evaluated language which lends itself well to a config and it slots right into NixOS quite well since Nix is also a lazily evaluated purely functional language.
Both sides are absolutely valid. A complete new install is very easy when you only need to run a few scripts. A small setup with minimal dependencies should also not break that easily when you upgrade your distro release.
I personally always make sure that the way i do things in a distro is the way they intended. That’s how i keep my minimalistic Arch install and multiple larger Debian deployments going for years.
linux
Oldest
This magazine is from a federated server and may be incomplete. Browse more on the original instance.