Page MenuHome GnuPG
Feed Advanced Search

Mon, Apr 22

gniibe closed T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations as Resolved.

Please continue on T7041. This ticket is going to be closed (as the problem described was fixed already).

Mon, Apr 22, 8:09 AM · gnupg24, yubikey, Bug Report

Tue, Apr 16

mdawar added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

Yes I have pcsc-shared in my scdaemon.conf.
I've just tried removing both pcsc-shared and disable-application piv and PIN caching worked as expected.

Tue, Apr 16, 8:00 AM · gnupg24, yubikey, Bug Report
gniibe added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

Are you using PC/SC shared mode? If so, it may be the case of T7041.

Tue, Apr 16, 7:16 AM · gnupg24, yubikey, Bug Report

Mon, Apr 15

werner edited projects for T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations, added: gnupg24; removed gnupg (gpg23).
Mon, Apr 15, 8:58 PM · gnupg24, yubikey, Bug Report
werner reopened T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations as "Open".
Mon, Apr 15, 8:58 PM · gnupg24, yubikey, Bug Report
mdawar added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

I just wanted to report that I'm having this issue on Fedora 39, with GnuPG version 2.4.4.
I'm being asked for the PIN for every operation (Sign, Decrypt, Authenticate) I'm having this issue on 2 different laptops using YubiKey 5C NFC and YubiKey 5C Nano (Firmware version: 5.4.3).
I tried disabling PIV (disable-application piv) and then PIN caching started working again, so I just wanted to report this as it's marked as resolved.

Mon, Apr 15, 8:20 PM · gnupg24, yubikey, Bug Report

Tue, Apr 9

werner added projects to T7066: Communication with Yubikey hangs in scdaemon: yubikey, Arch.
Tue, Apr 9, 1:44 PM · Arch, yubikey, Bug Report
werner triaged T7041: Yubikey (PGP + PIV) --pcsc-shared: PIN requires every time as Normal priority.
Tue, Apr 9, 1:42 PM · yubikey, gnupg24, scd, Bug Report

Mar 6 2024

werner added a comment to T6843: after enable kdf-setup impossible change user/admin pin.

See also rG40b85d8e8cecadf35e51e84b30de4fac820d714b for gnupg 2.4.

Mar 6 2024, 12:34 PM · gnupg22, scd, yubikey

Jan 26 2024

werner moved T6843: after enable kdf-setup impossible change user/admin pin from Backlog to QA on the gnupg22 board.

We need to test the PIN, PUK and reset code stuff in 2.2

Jan 26 2024, 3:14 PM · gnupg22, scd, yubikey
gniibe closed T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys as Resolved.

For the particular issue reopened for GnuPG 2.2.41 is fixed in GnuPG 2.2.42.
Please note that we can't fix the cause itself, the hardware problem.

Jan 26 2024, 1:08 AM · backport, yubikey, scd, segv, Bug Report

Jan 12 2024

werner edited projects for T6843: after enable kdf-setup impossible change user/admin pin, added: gnupg22; removed backport, gnupg.
Jan 12 2024, 4:26 PM · gnupg22, scd, yubikey

Jan 5 2024

werner moved T4823: Test Yubikey's support for ed25519 from Backlog to done on the gnupg24 board.
Jan 5 2024, 12:04 PM · gnupg24, gnupg (gpg23), yubikey

Dec 27 2023

gniibe changed the status of T6843: after enable kdf-setup impossible change user/admin pin from Open to Testing.

It would be good to apply this to 2.2, so adding "backport" tag.

Dec 27 2023, 1:25 AM · gnupg22, scd, yubikey

Dec 22 2023

gniibe edited projects for T6843: after enable kdf-setup impossible change user/admin pin, added: gnupg, scd; removed Support, Windows.

Thank you for the bug report. Although it's a corner case, it is a discrepancy in the implementation which results unrecoverable situation of the device.

Dec 22 2023, 3:44 AM · gnupg22, scd, yubikey
gniibe claimed T6843: after enable kdf-setup impossible change user/admin pin.
Dec 22 2023, 3:16 AM · gnupg22, scd, yubikey

Nov 28 2023

werner edited projects for T6843: after enable kdf-setup impossible change user/admin pin, added: Support; removed Bug Report.
Nov 28 2023, 1:25 PM · gnupg22, scd, yubikey

Nov 27 2023

Andry created T6843: after enable kdf-setup impossible change user/admin pin.
Nov 27 2023, 12:12 PM · gnupg22, scd, yubikey

Nov 7 2023

gniibe added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

Applied a patch from 2.4/master to 2.2 for SEGV when card gives bogus data. rG600e69b46149: scd:openpgp: Fix a segv for cards supporting unknown curves.

Nov 7 2023, 9:51 AM · backport, yubikey, scd, segv, Bug Report

Nov 6 2023

gniibe added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

@desultory Thank you for your report.
Please open a new ticket for your problem. If you can, please show the result of https://dev.gnupg.org/T5963#157724

Nov 6 2023, 2:06 AM · backport, yubikey, scd, segv, Bug Report

Nov 5 2023

desultory reopened T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys as "Open".

This is still an issue for me:

Nov 5 2023, 12:38 AM · backport, yubikey, scd, segv, Bug Report

Apr 21 2023

werner added a subtask for T6382: keytocard fails to import a nistp384 ECDSA key: T6465: Store the ECDH parameters in the key file.
Apr 21 2023, 3:21 PM · yubikey, scd, Bug Report

Mar 14 2023

werner closed T6382: keytocard fails to import a nistp384 ECDSA key as Resolved.

Closing this one - see T6378

Mar 14 2023, 4:20 PM · yubikey, scd, Bug Report
werner added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

There is actually a regression wit Yubikeys. The fix for 2.2 is in T5100: rG08cc34911470 - for 2.4 I need to check

Mar 14 2023, 11:35 AM · yubikey, scd, Bug Report
werner closed T6406: gpg-agent: Fail on expiring YubiKey PIN as Resolved.
Mar 14 2023, 9:31 AM · Not A Bug, yubikey, gpgagent

Mar 13 2023

danisanti added a comment to T6406: gpg-agent: Fail on expiring YubiKey PIN.

I never made a threat model. But definitely *any* cracker, should be out of my system, either from governmental agencies or from a kiddo in Russia.
I know that I have someone that is remote accessing my machine, since I got some tells. And that this cracker have used my Emacs text editor.

Mar 13 2023, 10:00 PM · Not A Bug, yubikey, gpgagent
werner edited projects for T6406: gpg-agent: Fail on expiring YubiKey PIN, added: Not A Bug; removed Bug Report.

Smartcard PINs are different from passphrase for on-disk keys. Once a PIN is entered the smartcard is unlocked as long as it is powered up. In theory we could power down and power up the card to lock it. The question here is what is your threat model? If you have malware on your system it could simply brick your token or, more common, peek at your PIN.

Mar 13 2023, 7:29 AM · Not A Bug, yubikey, gpgagent

Mar 11 2023

danisanti created T6406: gpg-agent: Fail on expiring YubiKey PIN.
Mar 11 2023, 4:50 PM · Not A Bug, yubikey, gpgagent

Feb 26 2023

werner lowered the priority of T6382: keytocard fails to import a nistp384 ECDSA key from High to Normal.
Feb 26 2023, 7:27 PM · yubikey, scd, Bug Report

Feb 21 2023

ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

The application probably doesn't support this curve, the changelog only mentions Curve25519 and NIST P-256. Also Kleopatra lists only these two curves when generating a key from the card. Upon further inspection, the 0xFA DO listing the supported algorithms only has RSA 2048, RSA 4096, nistp256, ed255519 and cv25519

Feb 21 2023, 5:33 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

This is a Nitrokey 3A with the firmware 1.2.2-alpha.20221130. I'll check with the vendor.

Feb 21 2023, 5:12 PM · yubikey, scd, Bug Report
werner added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Sure that you specific card/implementation of Nitrokey supports this curve? The card application uses a vendor from the test card range - this it is likely that it is some Javacard implementaion or it is an old gnuk firmware on the nitrokey basic.

Feb 21 2023, 4:32 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Changing the key attributes didn't help unfortunately:

Feb 21 2023, 3:32 PM · yubikey, scd, Bug Report
werner added a parent task for T6382: keytocard fails to import a nistp384 ECDSA key: T6378: keytocard: invalid value.
Feb 21 2023, 3:09 PM · yubikey, scd, Bug Report
werner added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

There must be some regression in the code which changes the key attributes. Please try
"gpg --card-edit" admin, key-attr
and switch to nistp384.

Feb 21 2023, 3:08 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

I also tried to import the key with the gpg-card writekey command and I got the same error.

Feb 21 2023, 2:59 PM · yubikey, scd, Bug Report
ebourg added a comment to T6382: keytocard fails to import a nistp384 ECDSA key.

Same error message but probably a different cause, in this case the card was factory reset before importing.

Feb 21 2023, 2:55 PM · yubikey, scd, Bug Report
werner triaged T6382: keytocard fails to import a nistp384 ECDSA key as High priority.
Feb 21 2023, 2:46 PM · yubikey, scd, Bug Report

Jan 17 2023

aheinecke closed T4823: Test Yubikey's support for ed25519 as Resolved.

I am very sure that this is resolved and we support that in Kleopatra.

Jan 17 2023, 1:10 PM · gnupg24, gnupg (gpg23), yubikey

Oct 7 2022

werner reopened T5790: Cannot use "Retired Cert Key Mgm [1-20]” Slots on YubiKey, a subtask of T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys), as Open.
Oct 7 2022, 9:36 AM · yubikey, Feature Request
werner added a subtask for T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys): T5790: Cannot use "Retired Cert Key Mgm [1-20]” Slots on YubiKey.
Oct 7 2022, 9:36 AM · yubikey, Feature Request
werner merged T5790: Cannot use "Retired Cert Key Mgm [1-20]” Slots on YubiKey into T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys).
Oct 7 2022, 9:35 AM · yubikey, Feature Request
werner merged T5790: Cannot use "Retired Cert Key Mgm [1-20]” Slots on YubiKey into T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys).
Oct 7 2022, 9:34 AM · yubikey, Feature Request

Oct 6 2022

manonfgoo added a comment to T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys).

The other key slots are claimed to be used for expired or archived keys as you rightfully mention. We need to figure out the real world semantic behind this before we can repurpose such keys.

Oct 6 2022, 10:44 PM · yubikey, Feature Request
manonfgoo added a comment to T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys).

Pleaee have a look at https://dev.gnupg.org/T5790, i added a patch.

Oct 6 2022, 10:30 PM · yubikey, Feature Request
werner triaged T6229: Include ability to use any/all of the keys stored on YubiKey's PIV applet ("retired" keys) as Low priority.

The other key slots are claimed to be used for expired or archived keys as you rightfully mention. We need to figure out the real world semantic behind this before we can repurpose such keys.

Oct 6 2022, 6:44 PM · yubikey, Feature Request

Jul 12 2022

gniibe added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

And 2.3.7.

Jul 12 2022, 3:22 AM · backport, yubikey, scd, segv, Bug Report
gniibe closed T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys as Resolved.

Fixed in 2.2.36.

Jul 12 2022, 3:19 AM · backport, yubikey, scd, segv, Bug Report

May 18 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Glad to hear. I've also now had time to manually apply the patches and have not seen any issues so far! Thank you! If anything does turn up later down the road I'll let you know.

May 18 2022, 2:10 AM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

No, no apologize needed. You did your best for the bug report, and it helped us a lot to identify the issue, and it certainly helped resulting the fixes. Moreover, your report kicked another fix of T5979 (thanks to the valgrind output).
Thank you.

May 18 2022, 1:37 AM · Info Needed, yubikey, scd, Bug Report

May 17 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

I apologize, you seem to be right. Even though the package build log shows that all patches were applied, it seems there are some hunks missing in the generated sources.
I've attached my patches, but those are most likely correct. There seems to be an issue with my distribution's package manager. I will investigate this and report back afterwards. Maybe I'll just build it manually.

May 17 2022, 1:34 PM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

When compiling the package, I can see that all 4 are applied.

May 17 2022, 2:41 AM · Info Needed, yubikey, scd, Bug Report

May 16 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

I think that it means that you only applied the last two patches.

May 16 2022, 4:14 PM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Thanks again for your update.

May 16 2022, 3:08 AM · Info Needed, yubikey, scd, Bug Report

May 13 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Thanks a lot for your cooperation.

May 13 2022, 2:28 PM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

I put more fix for error handling of key algorithm attribute.
The change: rG53eddf9b9ea0: scd: Fail when no good algorithm attribute.

May 13 2022, 3:21 AM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Thanks a lot for your cooperation.

May 13 2022, 3:15 AM · Info Needed, yubikey, scd, Bug Report

May 12 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Contrary to your expectations, all gpg --card-status fail after yubikey insertion:

May 12 2022, 7:48 PM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Please do experiment again and give us the whole log of scdaemon.log for:

  • insert Yubikey initially
  • run gpg --card-status (success is expected)
  • remove Yubikey
  • insert Yubikey second time
  • run gpg --card-status (failure is expected)
May 12 2022, 5:19 PM · Info Needed, yubikey, scd, Bug Report
oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

In case you need any information, be sure to let me know. Maybe we can add some manual loggers to the patches, to confirm that everything is working as you imagine it to?

May 12 2022, 12:36 PM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Umm... The problem is the last bogus octet from Yubikey. In the log, we see:

May 12 2022, 1:43 AM · Info Needed, yubikey, scd, Bug Report

May 11 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

I'm certain I've applied the patches correctly. This is my current patchset:

May 11 2022, 12:49 PM · Info Needed, yubikey, scd, Bug Report
gniibe added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

The change improve error handling for possible other errors by device: rG53eddf9b9ea0: scd: Fail when no good algorithm attribute.

May 11 2022, 4:31 AM · backport, yubikey, scd, segv, Bug Report
gniibe added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

Thank you for the logs. It seems that scdaemon didn't detect the removal correctly.

May 11 2022, 1:50 AM · Info Needed, yubikey, scd, Bug Report

May 10 2022

oddlama added a comment to T5971: Yubikey: Removal of device is not detected by PC/SC.

I've uploaded the requested information with triple verbose and debug-all setting in the scdaemon.conf as scdaemon.log:

May 10 2022, 10:17 PM · Info Needed, yubikey, scd, Bug Report
gniibe edited projects for T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys, added: Restricted Project; removed gnupg.

Applied to 2.2 branch, too.

May 10 2022, 7:29 AM · backport, yubikey, scd, segv, Bug Report
gniibe removed a project from T5971: Yubikey: Removal of device is not detected by PC/SC: gnupg.
May 10 2022, 7:00 AM · Info Needed, yubikey, scd, Bug Report
gniibe removed a project from T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys: Info Needed.
May 10 2022, 3:50 AM · backport, yubikey, scd, segv, Bug Report
gniibe added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

I examined all log files you gave us, and I think that scdaemon with PC/SC fails to detect the removal of the USB device.

May 10 2022, 3:48 AM · backport, yubikey, scd, segv, Bug Report
gniibe triaged T5971: Yubikey: Removal of device is not detected by PC/SC as Normal priority.
May 10 2022, 2:51 AM · Info Needed, yubikey, scd, Bug Report

May 9 2022

oddlama added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

I've applied the linked patch, but still experience the error. Most of the times, I cannot access my yubikey at all and I am not sure what is blocking it.
I've tried to include as much debugging output as I could below. Please let me know if there is anything else I can do to debug this.

May 9 2022, 12:54 PM · backport, yubikey, scd, segv, Bug Report
gniibe added a project to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys: backport.
May 9 2022, 6:52 AM · backport, yubikey, scd, segv, Bug Report
gniibe added a project to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys: Info Needed.

The patch rG054d14887ef8: scd: Add workaround for ECC attribute on Yubikey. fixes a particular problem of Yubikey implementation where it returns bogus octet for its data object of C1, C2, and C3.

May 9 2022, 4:53 AM · backport, yubikey, scd, segv, Bug Report

May 6 2022

oddlama added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

With the patch and after starting a new gpg-agent, gpg --card-status now works immediately.
But when I re-plug the yubikey, gpg reports gpg: OpenPGP card not available: Card error until either gpg-agent is restarted, or pcscd is restarted.
pcsc-lite in debug mode reports no errors, but one log is obviously much shorter as gpg fails early (I've attached both, same pcscd and gpg-agent instance).

May 6 2022, 1:42 PM · backport, yubikey, scd, segv, Bug Report
gniibe added a comment to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys.

I pushed a workaround.

May 6 2022, 11:28 AM · backport, yubikey, scd, segv, Bug Report
gniibe renamed T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys from scdaemon causes libc segfault and clashes with pcsc-lite despite using disable-ccid to Yubikey: scdaemon causes libc segfault and clashes with ECC keys.
May 6 2022, 11:26 AM · backport, yubikey, scd, segv, Bug Report
gniibe added a project to T5963: Yubikey: scdaemon causes libc segfault and clashes with ECC keys: yubikey.
May 6 2022, 10:07 AM · backport, yubikey, scd, segv, Bug Report

Apr 28 2022

werner triaged T5575: Supplying more than one passphrase or PIN using passphrase-fd as Low priority.
Apr 28 2022, 9:12 AM · gnupg, yubikey, Feature Request

Jan 20 2022

werner closed T5787: GPG 2.3.4, YubiKey - gpg --card-status reports Version 0.0 as Resolved.
Jan 20 2022, 8:39 AM · yubikey

Jan 18 2022

dlbucy added a comment to T5787: GPG 2.3.4, YubiKey - gpg --card-status reports Version 0.0.

Thank you.

Jan 18 2022, 5:57 PM · yubikey
werner added a comment to T5787: GPG 2.3.4, YubiKey - gpg --card-status reports Version 0.0.

This is related to the fix for T5100. We had to to remove the version number from the AID and gpg --card-status takes the version number from the AID. gpg-card was fixed for this but gpg --card-status not.

Jan 18 2022, 7:40 AM · yubikey
dlbucy created T5787: GPG 2.3.4, YubiKey - gpg --card-status reports Version 0.0.
Jan 18 2022, 12:02 AM · yubikey

Nov 22 2021

joelnordell requested review of D542: Patch to add "Push ACK button" prompt while waiting for Yubikey confirm..
Nov 22 2021, 11:22 PM · yubikey

Oct 10 2021

werner closed T5632: gpg-agent 2.3.2 conflicts with pcscd as Resolved.
Oct 10 2021, 7:04 PM · Not A Bug, yubikey, scd, gnupg (gpg23)

Oct 6 2021

werner added a comment to T5487: GnuPG 2.2.28 not working with Yubikey NEO.

You mean Gpg4win. The solution for Gpg4win 3.1.x is to install the latest GnUPG LTS installer for Windows on top of the latest Gpg4win version. See
https://lists.gnupg.org/pipermail/gnupg-announce/2021q3/000464.html
Noet that there will very soon be a 2.2.32 to fix a problem with Let's encrypt protected keyservers (T5639).

Oct 6 2021, 5:53 PM · yubikey, gnupg (gpg22), Bug Report
DanielHabenicht added a comment to T5487: GnuPG 2.2.28 not working with Yubikey NEO.

Just for everbody else who might be waiting for a new release. Workaround is to simply use the previous version: https://www.gpg4win.de/change-history-de.html (3.1.15)

Oct 6 2021, 5:21 PM · yubikey, gnupg (gpg22), Bug Report

Oct 4 2021

gniibe claimed T5632: gpg-agent 2.3.2 conflicts with pcscd.

For 2.3, when you use PC/SC, please use the disable-ccid option in your .gnupg/scdaemon.conf.

Oct 4 2021, 4:07 AM · Not A Bug, yubikey, scd, gnupg (gpg23)

Sep 2 2021

gniibe closed T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7 as Resolved.
Sep 2 2021, 8:29 AM · MacOS, yubikey, Bug Report

Aug 29 2021

sunknudsen added a comment to T5575: Supplying more than one passphrase or PIN using passphrase-fd.

Thanks for helping out @werner.

Aug 29 2021, 5:23 PM · gnupg, yubikey, Feature Request
werner added projects to T5575: Supplying more than one passphrase or PIN using passphrase-fd: yubikey, gnupg.

You can write your own pinentry script instead of the loopback thing. The use the envvar PINENTRY-USER_DATA to communicate with the pinentry.

Aug 29 2021, 5:00 PM · gnupg, yubikey, Feature Request

Aug 25 2021

gniibe changed the status of T5415: YubiKey no longer recognized in GnuPG 2.3.1 on macOS 10.15.7 from Open to Testing.

It must be fixed in 2.3.2. If not, please report.

Aug 25 2021, 3:27 AM · MacOS, yubikey, Bug Report

Aug 24 2021

werner closed T5416: [windows] Smartcards are less reliable under 2.3.1 (requires restarting gpg-agent.exe) as Resolved.
Aug 24 2021, 7:59 PM · yubikey, scd, gnupg (gpg23), Bug Report
werner closed T5442: Serial number detection of Yubikey 5 (Yubikey 5 doesn't work after updating to GnuPG 2.3.1) as Resolved.
Aug 24 2021, 7:58 PM · gnupg (gpg23), yubikey
werner closed T5484: SCDaemon Not reselect applet and reauthenticate when the card send Security Not Sastisfied as Resolved.
Aug 24 2021, 7:58 PM · yubikey, Bug Report, scd
werner closed T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations as Resolved.
Aug 24 2021, 7:57 PM · gnupg24, yubikey, Bug Report

Aug 20 2021

shtrom added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

I added "disable-application piv" to ~/.gnupg/scdaemon.conf and the behavior went back to pin caching working as before. Since I don't use PIV, this is an acceptable workaround for me.

Aug 20 2021, 5:46 AM · gnupg24, yubikey, Bug Report

Aug 14 2021

cnp1234 added a comment to T5436: gpg-agent 2.3.1: PIN caching not working for decrypt operations.

Based on the info about this being caused by the added support of PIV, I poked around on the docs at https://gnupg.org/documentation/manuals/gnupg/gpg_002dcard.html and noticed the disable-application stuff. I added "disable-application piv" to ~/.gnupg/scdaemon.conf and the behavior went back to pin caching working as before. Since I don't use PIV, this is an acceptable workaround for me.

Aug 14 2021, 9:05 PM · gnupg24, yubikey, Bug Report

Jul 28 2021

werner closed T4791: Switch between PIV and OpenPGP app w/o reentering the PIN as Resolved.

Works for a long time now (unless we broke it again;-)

Jul 28 2021, 3:21 PM · scd, yubikey

Jul 4 2021

werner closed T5487: GnuPG 2.2.28 not working with Yubikey NEO as Resolved.
Jul 4 2021, 5:30 PM · yubikey, gnupg (gpg22), Bug Report

Jun 28 2021

Sanmilie added a revision to T5484: SCDaemon Not reselect applet and reauthenticate when the card send Security Not Sastisfied: D535: More general for large scale multi-apps card in pcsc-shared context. .
Jun 28 2021, 6:18 AM · yubikey, Bug Report, scd