"Jeremie Courreges-Anglas" <j...@wxcvbn.org> writes:
> > Indeed, it looks like there was some regression in scdaemon. Can you > please confirm that your yubikey was usable and useful with > gnupg-2.2.41? > Yes, it was and it is now working again after reinstalling gnupg-2.2.41 using ports. > > With a borrowed and otherwise virgin (I think) Yubikey 5 NFC with > firmware version 5.1.2, I get: > > shannon ~$ usbdevs -v > [...] > addr 04: 1050:0407 Yubico, YubiKey OTP+FIDO+CCID > full speed, power 30 mA, config 1, rev 5.12 > [...] > shannon ~$ ykman info > WARNING: No OTP HID backend available. OTP protocols will not function. > ERROR: Unable to list devices for connection > Device type: YubiKey 5 NFC > Serial number: <REDACTED> > Firmware version: 5.1.2 > Form factor: Keychain (USB-A) > Enabled USB interfaces: OTP, FIDO, CCID > NFC transport is enabled. > > Applications USB NFC > OTP Enabled Enabled > FIDO U2F Enabled Enabled > FIDO2 Enabled Enabled > OATH Enabled Enabled > PIV Enabled Disabled > OpenPGP Enabled Enabled > YubiHSM Auth Not available Not available > > shannon ~$ LC_ALL=C.UTF-8 gpg --card-status > Reader ...........: Yubico YubiKey OTP FIDO CCID 00 00 > Application ID ...: <REDACTED> > Application type .: OpenPGP > Version ..........: 2.1 > Manufacturer .....: Yubico > Serial number ....: <REDACTED> > Name of cardholder: [not set] > Language prefs ...: [not set] > Salutation .......: > URL of public key : [not set] > Login data .......: [not set] > Signature PIN ....: not forced > Key attributes ...: rsa2048 rsa2048 rsa2048 > Max. PIN lengths .: 127 127 127 > PIN retry counter : 3 0 3 > Signature counter : 0 > Signature key ....: [none] > Encryption key....: [none] > Authentication key: [none] > General key info..: [none] Was that output using gnupg-2.4.3? My Yubikey has a newer firmware (5.4.3). Here is what I get: $ usbdevs -v [...] addr 03: 1050:0406 Yubico, YubiKey FIDO+CCID full speed, power 30 mA, config 1, rev 5.43 driver: uhidev0 driver: ugen0 [...] $ ykman info WARNING: No OTP HID backend available. OTP protocols will not function. Device type: YubiKey 5C Nano Serial number: <REDACTED> Firmware version: 5.4.3 Form factor: Nano (USB-C) Enabled USB interfaces: FIDO, CCID Applications OTP Disabled FIDO U2F Enabled FIDO2 Enabled OATH Enabled PIV Enabled OpenPGP Enabled YubiHSM Auth Disabled $ gpg --card-status Reader ...........: Yubico YubiKey FIDO CCID 00 00 Application ID ...: <REDACTED> Application type .: OpenPGP Version ..........: 3.4 Manufacturer .....: Yubico Serial number ....: <REDACTED> Name of cardholder: <REDACTED> Language prefs ...: [not set] Salutation .......: URL of public key : [not set] Login data .......: [not set] Signature PIN ....: not forced Key attributes ...: ed25519 cv25519 ed25519 Max. PIN lengths .: 127 127 127 PIN retry counter : 3 0 3 Signature counter : 0 KDF setting ......: off Signature key ....: <REDACTED> Encryption key....: <REDACTED> Authentication key: <REDACTED> General key info..: <REDACTED> $ gpg --version gpg (GnuPG) 2.2.41 libgcrypt 1.10.2 Copyright (C) 2022 g10 Code GmbH License GNU GPL-3.0-or-later <https://gnu.org/licenses/gpl.html> This is free software: you are free to change and redistribute it. There is NO WARRANTY, to the extent permitted by law. Home: <REDACTED> Supported algorithms: Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH, CAMELLIA128, CAMELLIA192, CAMELLIA256 Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224 Compression: Uncompressed, ZIP, ZLIB, BZIP2 -- Renato Aguiar