Yubikey 4 is a multi-function device. It can generate static passwords, yubi-oauth, event totp. Further more it has multiple applets: - openpgp card - PKCS#11 mode (e.g. to have elliptic curve private key for SSL) - ulimited time & event based tokens (for use with yubioauth desktop app) - fido U2F
And maybe others. I have found that Yubikey applets do lock the device up, thus care needs to be taken when multiple applets access the device. Specifically, pcscd is probably preventing from scdaemon to use the card. Similarly, after using yubioauth desktop app to generate OTP tokens i must close yubioauth app & remove & reinsert the yubikey to get OpenPGP functionality going again. I'm not sure if it's a bug in software side stacks, or just the simple fact of life that yubikey is multi-function device that needs access mitigation assistance. I use neo on 16.04. I have not yet upgraded to yubikey 4 yet, but I know that some people on my team have. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1641746 Title: gpg2: gpg2 --card-status: gpg: selecting openpgp failed: Card error To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/gnupg2/+bug/1641746/+subscriptions -- ubuntu-bugs mailing list [email protected] https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
