Yubikey 4 is a multi-function device.
It can generate static passwords, yubi-oauth, event totp.
Further more it has multiple applets:
- openpgp card
- PKCS#11 mode (e.g. to have elliptic curve private key for SSL)
- ulimited time & event based tokens (for use with yubioauth desktop app)
- fido U2F

And maybe others.

I have found that Yubikey applets do lock the device up, thus care needs
to be taken when multiple applets access the device. Specifically, pcscd
is probably preventing from scdaemon to use the card. Similarly, after
using yubioauth desktop app to generate OTP tokens i must close
yubioauth app & remove & reinsert the yubikey to get OpenPGP
functionality going again.

I'm not sure if it's a bug in software side stacks, or just the simple
fact of life that yubikey is multi-function device that needs access
mitigation assistance.

I use neo on 16.04. I have not yet upgraded to yubikey 4 yet, but I know
that some people on my team have.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1641746

Title:
  gpg2: gpg2 --card-status: gpg: selecting openpgp failed: Card error

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/1641746/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to