-
-
Notifications
You must be signed in to change notification settings - Fork 139
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
yubikey-agent blocks Yubikey Manager #4
Comments
Yup, same with gpg-agent, seems to be a PCSC limitation. We'll definitely document this. There's also go-piv/piv-go#47 upstream to look into ways to make this better. The interface is released on SIGHUP, so you can use |
FYI, this workaround seems to fix a similar issue when using Just so it's searchable here's the error you get when trying this when yubikey-agent is running:
|
Interestingly, my YubiKey 5 seems to persist the PIN cache across sessions, and even yubikey-agent restarts (but not unplug-replug cycles, as expected). In this case it would be far more acceptable to just drop the session every time. I bet using a different applet will still trash the PIN cache, but that's probably ok. |
Huh, it might be that PIN caching has always spanned sessions, but on older firmwares getting the serial number requires switching applets, so effectively we were dropping it at every session. Maybe there's an argument for not taking an exclusive lock, and just not reading the serial on older firmwares. |
Hi! I want to use This issue is a a big pain, especially because I use the yubikey as a FIDO device a lot too as well as for GPG. I wouldn't mind having to type the PIN each time I use yubikey-agent if that's the price for it to not lock my yubikey the rest of the time. Is this approach somehow possible? I think it could be a useful solution for some until upstream unblocks this issue. |
Wouldn't #44 essentially solve this? |
I may not fully understand the context here, but it might be more worthwhile overall to place some efforts on this PR on the upstream This will allow yubikey-agent and piv-agent to |
|
At least on macOS, if I have yubikey-agent running and I have authenticated with it (just starting yubikey-agent does not reproduce the problem), Yubikey Manager hangs. It appears to hang in a call to PCSC, and with some experiments the PIV application seems to be where it blocks - which makes sense obviously.
I'm creating this to make a reminder now to document this behavior in upcoming README (including how to stop the agent if Yubikey Manager is needed). Depending on how setup will work, maybe the Yubikey Manager is not needed by general audience but there needs to be a way to free the interface (easiest to stop the agent). Feel free to close/replace with some other TODO of course.
The text was updated successfully, but these errors were encountered: