Bug ID | 1202201 |
---|---|
Summary | gpg2 2.3.7-1.1 doesn't properly detect Yubikey OpenPGP keys |
Classification | openSUSE |
Product | openSUSE Tumbleweed |
Version | Current |
Hardware | Other |
OS | openSUSE Tumbleweed |
Status | NEW |
Severity | Normal |
Priority | P5 - None |
Component | Other |
Assignee | screening-team-bugs@suse.de |
Reporter | db@mail25.net |
QA Contact | qa-bugs@suse.de |
Found By | --- |
Blocker | --- |
After updating gpg2 from 2.3.6-2.2 to 2.3.7-1.1 Yubikey OpenPGP keys aren't properly detected anymore. I use it for SSH and this happens on 3 similar machines running Tumbleweed with the latest snapshot (20220805) and with 2 identical Yubikeys. The only configuration that I set is: >> # cat ~/.gnupg/gpg-agent.conf >> enable-ssh-support >> default-cache-ttl 600 >> max-cache-ttl 7200 ---gpg2-2.3.7-1.1--- --after plugging in the Yubikey-- >> # sudo journalctl -f >> rugp. 07 21:53:33 pc kernel: usb 1-4: new full-speed USB device number 4 using xhci_hcd >> rugp. 07 21:53:33 pc kernel: usb 1-4: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 >> rugp. 07 21:53:33 pc kernel: usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 >> rugp. 07 21:53:33 pc kernel: usb 1-4: Product: YubiKey OTP+FIDO+CCID >> rugp. 07 21:53:33 pc kernel: usb 1-4: Manufacturer: Yubico >> rugp. 07 21:53:33 pc kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:01.3/0000:03:00.0/usb1/1-4/1-4:1.0/0003:1050:0407.0009/input/input28 >> rugp. 07 21:53:33 pc kernel: hid-generic 0003:1050:0407.0009: input,hidraw3: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:03:00.0-4/input0 >> rugp. 07 21:53:33 pc kernel: hid-generic 0003:1050:0407.000A: hiddev97,hidraw4: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:03:00.0-4/input1 >> rugp. 07 21:53:33 pc mtp-probe[7041]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:01.3/0000:03:00.0/usb1/1-4" >> rugp. 07 21:53:34 pc mtp-probe[7041]: bus: 1, device: 4 was not an MTP device >> rugp. 07 21:53:34 pc systemd[2023]: Reached target Smart Card. >> rugp. 07 21:53:34 pc mtp-probe[7069]: checking bus 1, device 4: "/sys/devices/pci0000:00/0000:00:01.3/0000:03:00.0/usb1/1-4" >> rugp. 07 21:53:34 pc mtp-probe[7069]: bus: 1, device: 4 was not an MTP device >> # ssh-add -l >> The agent has no identities. >> # gpg --card-status >> Reader ...........: 1050:0407:X:0 >> Application ID ...: D2760001240100000006137939780000 >> Application type .: OpenPGP >> Version ..........: 1.0 >> Manufacturer .....: ? >> Serial number ....: 13793978 >> Name of cardholder: [not set] >> Language prefs ...: [not set] >> Salutation .......: >> URL of public key : [not set] >> Login data .......: [not set] >> Signature PIN ....: not forced >> Max. PIN lengths .: -1 -2 0 >> PIN retry counter : 0 0 0 >> Signature counter : 0 >> Signature key ....: [none] >> Encryption key....: [none] >> Authentication key: [none] >> General key info..: [none] ---gpg2-2.3.6-2.2--- --after installing gpg2-2.3.6 (https://download.opensuse.org/history/20220802/tumbleweed/repo/oss/x86_64/gpg2-2.3.6-2.2.x86_64.rpm), rebooting and inserting the Yubikey-- >> # sudo journalctl -f >> rugp. 07 22:03:11 pc kernel: usb 1-4: new full-speed USB device number 3 using xhci_hcd >> rugp. 07 22:03:11 pc kernel: usb 1-4: New USB device found, idVendor=1050, idProduct=0407, bcdDevice= 5.43 >> rugp. 07 22:03:11 pc kernel: usb 1-4: New USB device strings: Mfr=1, Product=2, SerialNumber=0 >> rugp. 07 22:03:11 pc kernel: usb 1-4: Product: YubiKey OTP+FIDO+CCID >> rugp. 07 22:03:11 pc kernel: usb 1-4: Manufacturer: Yubico >> rugp. 07 22:03:11 pc kernel: input: Yubico YubiKey OTP+FIDO+CCID as /devices/pci0000:00/0000:00:01.3/0000:03:00.0/usb1/1-4/1-4:1.0/0003:1050:0407.0007/input/input27 >> rugp. 07 22:03:11 pc kernel: hid-generic 0003:1050:0407.0007: input,hidraw6: USB HID v1.10 Keyboard [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:03:00.0-4/input0 >> rugp. 07 22:03:11 pc kernel: hid-generic 0003:1050:0407.0008: hiddev99,hidraw7: USB HID v1.10 Device [Yubico YubiKey OTP+FIDO+CCID] on usb-0000:03:00.0-4/input1 >> rugp. 07 22:03:11 pc mtp-probe[4432]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:01.3/0000:03:00.0/usb1/1-4" >> rugp. 07 22:03:11 pc mtp-probe[4432]: bus: 1, device: 3 was not an MTP device >> rugp. 07 22:03:11 pc systemd[1]: Reached target Smart Card. >> rugp. 07 22:03:11 pc systemd[2002]: Reached target Smart Card. >> rugp. 07 22:03:11 pc mtp-probe[4445]: checking bus 1, device 3: "/sys/devices/pci0000:00/0000:00:01.3/0000:03:00.0/usb1/1-4" >> rugp. 07 22:03:11 pc mtp-probe[4445]: bus: 1, device: 3 was not an MTP device >> # ssh-add -l >> 256 SHA256:**REDACTED** cardno:13 793 978 (ED25519) >> # gpg --card-status >> Reader ...........: 1050:0407:X:0 >> Application ID ...: D2760001240100000006137939780000 >> Application type .: OpenPGP >> Version ..........: 3.4 >> Manufacturer .....: Yubico >> Serial number ....: 13793978 >> Name of cardholder: [not set] >> Language prefs ...: [not set] >> Salutation .......: >> URL of public key : [not set] >> Login data .......: [not set] >> Signature PIN ....: not forced >> Key attributes ...: ed25519 cv25519 ed25519 >> Max. PIN lengths .: 127 127 127 >> PIN retry counter : 3 0 3 >> Signature counter : 4 >> KDF setting ......: off >> UIF setting ......: Sign=off Decrypt=off Auth=off >> Signature key ....: **REDACTED** >> created ....: 2022-05-23 17:27:13 >> Encryption key....: **REDACTED** >> created ....: 2022-05-23 17:27:13 >> Authentication key: **REDACTED** >> created ....: 2022-05-23 17:27:13 >> General key info..: [none]