"Jeremie Courreges-Anglas" <[email protected]> writes:
>
> Indeed, it looks like there was some regression in scdaemon. Can you
> please confirm that your yubikey was usable and useful with
> gnupg-2.2.41?
>
Yes, it was and it is now working again after reinstalling gnupg-2.2.41
using ports.
>
> With a borrowed and otherwise virgin (I think) Yubikey 5 NFC with
> firmware version 5.1.2, I get:
>
> shannon ~$ usbdevs -v
> [...]
> addr 04: 1050:0407 Yubico, YubiKey OTP+FIDO+CCID
> full speed, power 30 mA, config 1, rev 5.12
> [...]
> shannon ~$ ykman info
> WARNING: No OTP HID backend available. OTP protocols will not function.
> ERROR: Unable to list devices for connection
> Device type: YubiKey 5 NFC
> Serial number: <REDACTED>
> Firmware version: 5.1.2
> Form factor: Keychain (USB-A)
> Enabled USB interfaces: OTP, FIDO, CCID
> NFC transport is enabled.
>
> Applications USB NFC
> OTP Enabled Enabled
> FIDO U2F Enabled Enabled
> FIDO2 Enabled Enabled
> OATH Enabled Enabled
> PIV Enabled Disabled
> OpenPGP Enabled Enabled
> YubiHSM Auth Not available Not available
>
> shannon ~$ LC_ALL=C.UTF-8 gpg --card-status
> Reader ...........: Yubico YubiKey OTP FIDO CCID 00 00
> Application ID ...: <REDACTED>
> Application type .: OpenPGP
> Version ..........: 2.1
> Manufacturer .....: Yubico
> Serial number ....: <REDACTED>
> Name of cardholder: [not set]
> Language prefs ...: [not set]
> Salutation .......:
> URL of public key : [not set]
> Login data .......: [not set]
> Signature PIN ....: not forced
> Key attributes ...: rsa2048 rsa2048 rsa2048
> Max. PIN lengths .: 127 127 127
> PIN retry counter : 3 0 3
> Signature counter : 0
> Signature key ....: [none]
> Encryption key....: [none]
> Authentication key: [none]
> General key info..: [none]
Was that output using gnupg-2.4.3?
My Yubikey has a newer firmware (5.4.3). Here is what I get:
$ usbdevs -v
[...]
addr 03: 1050:0406 Yubico, YubiKey FIDO+CCID
full speed, power 30 mA, config 1, rev 5.43
driver: uhidev0
driver: ugen0
[...]
$ ykman info
WARNING: No OTP HID backend available. OTP protocols will not function.
Device type: YubiKey 5C Nano
Serial number: <REDACTED>
Firmware version: 5.4.3
Form factor: Nano (USB-C)
Enabled USB interfaces: FIDO, CCID
Applications
OTP Disabled
FIDO U2F Enabled
FIDO2 Enabled
OATH Enabled
PIV Enabled
OpenPGP Enabled
YubiHSM Auth Disabled
$ gpg --card-status
Reader ...........: Yubico YubiKey FIDO CCID 00 00
Application ID ...: <REDACTED>
Application type .: OpenPGP
Version ..........: 3.4
Manufacturer .....: Yubico
Serial number ....: <REDACTED>
Name of cardholder: <REDACTED>
Language prefs ...: [not set]
Salutation .......:
URL of public key : [not set]
Login data .......: [not set]
Signature PIN ....: not forced
Key attributes ...: ed25519 cv25519 ed25519
Max. PIN lengths .: 127 127 127
PIN retry counter : 3 0 3
Signature counter : 0
KDF setting ......: off
Signature key ....: <REDACTED>
Encryption key....: <REDACTED>
Authentication key: <REDACTED>
General key info..: <REDACTED>
$ gpg --version
gpg (GnuPG) 2.2.41
libgcrypt 1.10.2
Copyright (C) 2022 g10 Code GmbH
License GNU GPL-3.0-or-later <https://gnu.org/licenses/gpl.html>
This is free software: you are free to change and redistribute it.
There is NO WARRANTY, to the extent permitted by law.
Home: <REDACTED>
Supported algorithms:
Pubkey: RSA, ELG, DSA, ECDH, ECDSA, EDDSA
Cipher: IDEA, 3DES, CAST5, BLOWFISH, AES, AES192, AES256, TWOFISH,
CAMELLIA128, CAMELLIA192, CAMELLIA256
Hash: SHA1, RIPEMD160, SHA256, SHA384, SHA512, SHA224
Compression: Uncompressed, ZIP, ZLIB, BZIP2
--
Renato Aguiar