On Tue, Jul 11 2023, Jeremie Courreges-Anglas <j...@wxcvbn.org> wrote:
> On Tue, Jul 11 2023, Renato Aguiar <ren...@renatoaguiar.net> wrote:
>> I found out that my Yubikey works on gnupg-2.4.3 after disabling CCID in
>> scdaemon by adding "disable-ccid" to "~/.gnupg/scdaemon.conf" :)
>>
>> $ man scdaemon
>> [...]
>>        --disable-ccid
>>               Disable the integrated support for CCID compliant readers.  
>> This
>>               allows falling back to one of the other drivers even if the
>>               internal CCID driver can handle the reader.  Note, that CCID
>>               support is only available if libusb was available at build 
>> time.
>> [...]
>>
>> $ cat ~/.gnupg/scdaemon.conf
>> reader-port "Yubico YubiKey FIDO+CCID 00 00"
>> disable-ccid
>> $
>
> Hah.  For some reason this had no effect for me.  The Yubikey 5 NFC with
> firmware 5.1.2 still isn't recognized.  Maybe those are two different bugs.
>
>> For some reason that wasn't needed in previous versions. Maybe we should
>> mention that option in the pkg/README.
>
> I'll just revert the update for now.  Between your recent firmware and
> the one found on mine I wonder how many people would be affected by those
> regressions.

After checking again, disable-ccid did indeed fix communication between
scdaemon and my new-old yubikey.  I have added that to the README.
Thanks, Renato !

I wonder how I managed to mistest this, maybe the yubikey was badly
plugged in, as the error message is the same:

shannon ~$ LC_ALL=C.UTF-8 gpg --card-status
gpg: selecting card failed: Operation not supported by device
gpg: OpenPGP card not available: Operation not supported by device

vs

shannon ~$ LC_ALL=C.UTF-8 gpg --card-status
Reader ...........: Yubico YubiKey OTP FIDO CCID 00 00
Application ID ...: <REDACTED>
Application type .: OpenPGP
Version ..........: 2.1
Manufacturer .....: Yubico
Serial number ....: <REDACTED>
Name of cardholder: [not set]
Language prefs ...: [not set]
Salutation .......:
URL of public key : [not set]
Login data .......: [not set]
Signature PIN ....: not forced
Key attributes ...: rsa2048 rsa2048 rsa2048
Max. PIN lengths .: 127 127 127
PIN retry counter : 3 0 3
Signature counter : 0
UIF setting ......: Sign=off Decrypt=off Auth=off
Signature key ....: [none]
Encryption key....: [none]
Authentication key: [none]
General key info..: [none]

-- 
jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF  DDCC 0DFA 74AE 1524 E7EE

Reply via email to