-
Notifications
You must be signed in to change notification settings - Fork 39
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Can't use without root - Unknown error occured #72
Comments
I can see this is an old issue, but none of udev rules are working for me too. I tried this test udev rule, just to make sure if its triggering correctly. And it does. It creates the test file in my home directory, but doesn't seems like MODE=0666 part working (or I'm not really sure what is really going on) |
Is there a daemon running that could use PIV applet on the Yubikey? Is there anything in the scdaemon.log? Because GnuPG foolishly insists on opening the token in Exclusive mode, rather than in Shared. |
ok I couldn't find a scdaemon.log file so I added these lines to /home/blurryflurry/.gnupg/scdaemon.conf and gpg-agent.log file have this |
Found something! |
I finally found the solution. and executed hope this would help to anyone |
I did not realize you had "disable_ccid" there. With that line uncommented, AFAIK you shouldn't be able to use either OpenPGP or PIV with any token, including Yibikey. Glad your found a solution. You might want to try with csc_driver uncommented and report the results here. |
I'm on Debian. The ykman python tool worked by going through the smartcard daemon pcscd. But the yubikey-personalization-gui failed with "unknown error". Digging in a bit the error is actually permission denied trying to access (what I think is) the ccid usb device in /dev/bus/usb. I looked into how systemd is managing granting access to hardware to the logged in user and came up with this udev rule I added as. /etc/udev/rules.d/70-yubikey-ccid.rules
Which worked for me. |
A correct udev rule for the yubikey parts should be installed by libykpers-1-1 on debian (as /lib/udev/rules.d/69-yubikey.rules), for smartcard parts there might be additional udev rules installed by other software (gnupg/scdaemon for instance). |
Looks like someone else found this bug and a fix is pending |
I've read about lots of udev rules to access the yubikey without root, but none of them worked for me and it also feels very unsecure to have 4 of them currently.
I'm running on Arch Linux, I have the yubikey neo with firmware version 3.4.9
The text was updated successfully, but these errors were encountered: